• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/90

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

90 Cards in this Set

  • Front
  • Back

T or F: data is free.

False

What is the difference between IT and IS?

IT (hardware & software) + Procedures & People = IS (all 5 components)

In the five component framework of an IS, which is the most important?

People

What is the order in which each component appears (from left to right) in the Five-Component Model?

Hardware, Software, Data, Procedures, People

What is the difference between data and information?

Data: recorded facts or figures.


Information: knowledge derived from data

T or F: In order for data to be timely, it must be delivered in real time.

False

T or F: Good data are always worth the cost, no matter how expensive.

False

Keeping track of data involving multiple themes should be done with what?

Relational database




(lists of data involving a single theme should be stored in a spreadsheet)

The data displayed in Design View of a table in an Access database is an example of...

metadata


(data that describes data)

T or F: A database is simply a group of files or tables.

False.




(a database also includes relationships among the rows in the tables and metadata)

Match the data elements with the term in which they are often referred.




(bytes, records, fields, tables)


(file, characters, columns, rows)



Fields --> columns


Bytes --> characters


Table --> file


Records --> row

T or F: Businesses often purchase Information Systems to increase efficiency of their business processes.

False

What is good data?

Accurate


Timely (for your purpose)


Relevant (to context & subject)


Just sufficient


Worth its cost

T or F: In order for any organization to consider data "timely" it must be up to the second

False

Database Management System (DBMS)

a program used to create, process, and administer a database

What is the difference between a DBMS and a database?

DBMS: software program


Database: collection of tables, relationships, and metadata

Entity

Some thing that the users want to track


(have relationships to eachother)

Attributes

describe characteristics of the entity

I:N

one-to-many relationships

N:M

many-to-many relationships

Normalization

Process of converting a poorly structured table into two or more well-structured tables (by using a primary key)




Goal: to construct tables such that every table has a single topic/theme (eliminate data duplication)

How many primary functions does a DBMS have?

3: to create, process, and administer

What is a structured query language (SQL)?

an international standard language for processing a database

T or F: The lost-update problem can be resolved by implementing multi-user database processing.

False.


(this is what actually causes the problem. It must be resolved by implementing some type of locking to coordinate activities among multiple users)

Which DBMS category does Microsoft Access belong to?

Personal DBMS (meant for a single user)

Data Model

Describes the data and relationships that will be stored in a database.

What type of relationship does this describe?


>------<

N:M, many-to-many

T or F: A table containing normalized data should have 3 or fewer themes.

False


(it should contain only one theme)

What is the most important phase of the SDLC?

Determine Requirements

If a project is determined to be feasible in the SDLC, the immediate next step is to....

maintain the system

The situation that occurs when adding more resources creates inefficiencies is known as....

Diseconomies of scale

Why are forms important?

important for data entry (prevents mistakes & ensures data confidentiality)

Is Microsoft Access considered a database?

No.


(it is a DBMS)

Reports

display data in a meaningful way

Cardinality

Max./min. amount of entities that can be involved in a relationship

Which type of relationship would be between a student table and a class table?

N:M, many-to-many

Business intelligence (BI) systems

information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals.




(contains hardware, software, data, procedures, and people)

BI application

Software component of a BI system


(analyze data)

What are the primary activities in the BI process?

acquire data, perform analysis, publish results

The patterns, trends, and relationships produced by BI systems are referred to as...

Business Intelligence

T or F: An inventory report set to run automatically when an item reaches a critical low point is pull publishing

False


(this is push publishing since it's executed automatically)

What is the first primary activity in the BI process?

acquire data

T or F: One of the main benefits of BI analysis is that there are no discrepencies in the data acquired from multiple sources.

False

Data mining

the application of statistical techniques to find patterns & relationships among data for classification and prediction.

What is true of unsupervised data mining?

analysts don't create a model/hypothesis before running the analysis

Supervised data mining

data miners develop a model prior to the analysis and apply statistical techniques to estimate parameters of the model

T or F: A common business application of decision trees is to classify loans by likelihood of default

True

T or F: The process by which netflix recommends movies/ TV shows is an example of BI systems being utilized in the entertainment industry.

True

Manage risk

to proactively balance trade off between risk and cost

Technical Safeguards

involve the hardware & software components of an IS

Identification

identifies the user (username)

Authentication

authenticates the user (password)

Encryption

process of transforming clear text into coded, unintelligible text for secure storage or communication

https

most secure communications over internet use this protocol.




data is encrypted using Secure Sockets Layer (SSL): uses a combination of public key and symmetric encryption

Firewall

computing device that prevents unauthorized network access

Malware

category of software that includes viruses, spyware, and adware

Worm

Virus that self-propogates using internet or other network

Design Secure Applications

Prevent common attacks like SQL injection attacks

Data Safeguards

protect databases & organizational data

Data administration

In charge of developing data policies and enforcing data standards (organization-wide function)

Database administration

Function that pertains to a particular database.




Develop procedures & practices to ensure efficient & orderly multiuser processing, control changes, and protect databases.

Human Safeguards

Involve people & procedure components of an IS.




hiring & screening, termination policies, position definitions, dissemination of policies & enforcement

A _____ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission or knowledge

Threat

Pretexting, sniffing, spoofing, and phishing are all examples of....

unauthorized data disclosure

In order to access your student records, you must authenticate with your IU username & passphrase. This is an example of which safeguard?

Technical

T or F: Encryption is a type of data safeguard

False and true..?

Nonword passwords are vulnerable to a _____ attack in which the password cracker tries every possible combination

Brute Force

What will be displayed in the address bar to let you know you're using SSL protocal?

https

________ refers to an organization-wide function in charge of developing data policies & enforcing data standards

Data administration

_______ protect databases and other organizational data

Data safeguards

What is true about human safeguards for employees?

user accounts should give users the least possible privilege needed to perform their jobs

T or F: Email spoofing is a synonym for phishing

True

How should organizations respond to security threats?

Establish a company-wide security policy


(technical, data, and human safeguards)




Manage Risk


(proactively balance trade- off's between risk and cost)

Cooperation

group of people working together to accomplish a job

Collaboration

group of people working together to achieve a common goal via a process of feedback and iteration

Primary purposes of collaboration

become informed *


make decisions


solve problems


manage projects

Operational decisions

support day-to-day activities

Managerial decisions

about the allocation & utilization of resources

Strategic decisions

support broad-scope, organizational issues

Synchronous Communication

occurs when all team members meet at the same time


(conference calls, video calls, chat room)

Asynchronous Communication

occurs when team members do not meet at the same time


(e-mail, text messages, etc)

What is the difference between version management and version control?

Version Management: tracks changes to documents and provides features/functions to accommodate concurrent work




Version Control: process that occurs when the collaboration tool limits, and sometimes directs, user activity

What is the key difference between collaboration & cooperation?

Collaboration gives importance to iteration & feedback

Which is a primary purpose of collaboration?

Becoming informed

Kyra, a plant supervisor, orders 500 units of Type-2 steel beams for the coming month. She has made a ________ decision.

Operational

Project leaders have to make decisions on the allocation & utilization of materials and labor. Such decisions are called _________.

Managerial decisions

An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a _______ decision process.

structured

The need for collaboration is greatest for ________ decisions.

strategic

T or F: Margaret arranges for a multiparty text chatting session. This is an example of asynchronous communication.

False.


(this is an example of synchronous communication because all have agreed to text at the same time)

Version-management systems _______.

track changes to shared documents