Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
What are examples of why a company would use a transaction processing system?
|
Tracking purchases, Inventory control, Payroll
|
|
What is the term used to describe the use of information to provide a company with predictive view of its operations and environments?
|
Business Intelligence
|
|
_________ is not a major component of an information system
|
Networks
|
|
(T/F) Data are raw facts that have processed in a meaningful way.
|
False
|
|
To be useful, information must have the following characteristics
|
Accurate, Relevant, Consistent, Timely
|
|
The most important resource in any organization is ________.
|
People
|
|
A private network between a company and its suppliers that uses Internet technology is called_______.
|
Extranet
|
|
(T/F) Forecasting models are part of an information system's process component.
|
True
|
|
Apple's unique products are an example of a company using what type of strategy?
|
Differentiated
|
|
What are Porter's Five Forces?
|
Buyer power, threat of new entrants, threat of substitute products, competitive rivalry, supplier power
|
|
The most important resource in any organization is ________.
|
People
|
|
A private network between a company and its suppliers that uses Internet technology is called_______.
|
Extranet
|
|
(T/F) Forecasting models are part of an information system's process component.
|
True
|
|
Apple's unique products are an example of a company using what type of strategy?
|
Differentiated
|
|
What are Porter's Five Forces?
|
Buyer power, threat of new entrants, threat of substitute products, competitive rivalry, supplier power
|
|
_____ is a 4th generation, non-procedural language used to develop database structures and write queries.
|
SQL
|
|
________ devices, such as the hard drive, are the equipment designed to store large volumes of data for long-term storage; and are considered non-volatile.
|
Secondary memory
|
|
____________ is the type of software used for specific information processing needs such as payroll and project management.
|
Application software
|
|
(T/F) The two components of the CPU are the arithmetic unit and the control unit.
|
True
|
|
(T/F) A bit is equivalent to 8 bytes
|
False - 8 bits is equivalent to 1 byte
|
|
(T/F) In the binary system, a "1" represents "on" and "0" represents "off".
|
True
|
|
Examples of input devices
|
Optical Character Recognition (OCR), Trackball, Barcode Reader, mouse, ect.
|
|
(T/F) RAM is a type of main memory that is considered "volatile" because data stored in RAM is lost when the computer is turned off.
|
True
|
|
A large financial company might use a(n) _______ when storing vast amounts of digital data in an off site location for backup.
|
Storage area network
|
|
The ________ is the set of programs that control and manage computer hardware and other software applicatoins.
|
Operating System
|
|
Natural language processing is considered a _____ generation language because codes are automatically generated and designed to make the computer solve a given problem without a programmer, or with minimum programming efforts.
|
Natural language processing is a 5th generation language
|
|
A ________ is a column or group of columns that uniquely identifies a given row in a table. For example, a SSN uniquely identifies an individual.
|
Primary key
|
|
The process known as _________ is used on database tables to eliminate redundant data and ensures that only related data is stored in a table.
|
Normalization
|
|
The most popular computer language used to add, delete, modify, and retrieve data in a database is __________.
|
SQL
|
|
A _______ stores historical data used for strategic decision making, whereas a _______ provides focused information to a given business unit such as a finance department.
|
data warehouse, data mart
|
|
The first step in database design is defining a(n) ___________ which determines how data is created, represented, organized, and maintained. The Entity-Relationship Diagram is one example.
|
Data model
|
|
Items stored in a data dictionary include:
|
Field names, default values, data types, summary data NOT validation rules
|
|
____________ is the computer program responsible for data storage, manipulation, and retrieval.
|
Database Management System
|
|
________ is the database model that uses two-dimensional tables of rows and columns and is currently the most commonly used database model today.
|
Relational model
|
|
Which is not stored in a database:
A. Metadata B. Information C. Summary data D. Raw data |
Information is not stored in a database - only data is stored
|
|
The column in a table that establishes the relationships between other tables is called the __________.
|
Linking key
|
|
(T/F) The basic format of an SQL query is: SELECT table FROM field
|
False
|
|
(T/F) Cookies cause harm to your computer by erasing files on your hard drive
|
False
|
|
_________ is one way individuals can gain unauthorized personal information by sending fraudulent emails that appear legitimate.
|
Phishing
|
|
_________ is one way individuals can capture and record network traffic.
|
Sniffing
|
|
A(n) _________ is a type of computer crime that floods a website or network with so much traffic that it overloads the system and prevents users from accessing its resources
|
denial-of-service attack
|
|
___________ is the set of rules all organizations should develop to specify the legal and ethical uses of its system and the possible consequences for noncompliance
|
Acceptable use policy
|
|
A banker selling the data supplied by its customers to another firm without the customers' consent is considered
|
neither ethical nor legal
|
|
__________ provides a legal umbrella covering copyrights, trademarks, and patents.
|
Intellectual property
|
|
The separation of people who can afford and have access to computers and the internet versus those who cannot is called the ________.
|
Social divide
|