• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back
What are examples of why a company would use a transaction processing system?
Tracking purchases, Inventory control, Payroll
What is the term used to describe the use of information to provide a company with predictive view of its operations and environments?
Business Intelligence
_________ is not a major component of an information system
Networks
(T/F) Data are raw facts that have processed in a meaningful way.
False
To be useful, information must have the following characteristics
Accurate, Relevant, Consistent, Timely
The most important resource in any organization is ________.
People
A private network between a company and its suppliers that uses Internet technology is called_______.
Extranet
(T/F) Forecasting models are part of an information system's process component.
True
Apple's unique products are an example of a company using what type of strategy?
Differentiated
What are Porter's Five Forces?
Buyer power, threat of new entrants, threat of substitute products, competitive rivalry, supplier power
The most important resource in any organization is ________.
People
A private network between a company and its suppliers that uses Internet technology is called_______.
Extranet
(T/F) Forecasting models are part of an information system's process component.
True
Apple's unique products are an example of a company using what type of strategy?
Differentiated
What are Porter's Five Forces?
Buyer power, threat of new entrants, threat of substitute products, competitive rivalry, supplier power
_____ is a 4th generation, non-procedural language used to develop database structures and write queries.
SQL
________ devices, such as the hard drive, are the equipment designed to store large volumes of data for long-term storage; and are considered non-volatile.
Secondary memory
____________ is the type of software used for specific information processing needs such as payroll and project management.
Application software
(T/F) The two components of the CPU are the arithmetic unit and the control unit.
True
(T/F) A bit is equivalent to 8 bytes
False - 8 bits is equivalent to 1 byte
(T/F) In the binary system, a "1" represents "on" and "0" represents "off".
True
Examples of input devices
Optical Character Recognition (OCR), Trackball, Barcode Reader, mouse, ect.
(T/F) RAM is a type of main memory that is considered "volatile" because data stored in RAM is lost when the computer is turned off.
True
A large financial company might use a(n) _______ when storing vast amounts of digital data in an off site location for backup.
Storage area network
The ________ is the set of programs that control and manage computer hardware and other software applicatoins.
Operating System
Natural language processing is considered a _____ generation language because codes are automatically generated and designed to make the computer solve a given problem without a programmer, or with minimum programming efforts.
Natural language processing is a 5th generation language
A ________ is a column or group of columns that uniquely identifies a given row in a table. For example, a SSN uniquely identifies an individual.
Primary key
The process known as _________ is used on database tables to eliminate redundant data and ensures that only related data is stored in a table.
Normalization
The most popular computer language used to add, delete, modify, and retrieve data in a database is __________.
SQL
A _______ stores historical data used for strategic decision making, whereas a _______ provides focused information to a given business unit such as a finance department.
data warehouse, data mart
The first step in database design is defining a(n) ___________ which determines how data is created, represented, organized, and maintained. The Entity-Relationship Diagram is one example.
Data model
Items stored in a data dictionary include:
Field names, default values, data types, summary data NOT validation rules
____________ is the computer program responsible for data storage, manipulation, and retrieval.
Database Management System
________ is the database model that uses two-dimensional tables of rows and columns and is currently the most commonly used database model today.
Relational model
Which is not stored in a database:
A. Metadata
B. Information
C. Summary data
D. Raw data
Information is not stored in a database - only data is stored
The column in a table that establishes the relationships between other tables is called the __________.
Linking key
(T/F) The basic format of an SQL query is: SELECT table FROM field
False
(T/F) Cookies cause harm to your computer by erasing files on your hard drive
False
_________ is one way individuals can gain unauthorized personal information by sending fraudulent emails that appear legitimate.
Phishing
_________ is one way individuals can capture and record network traffic.
Sniffing
A(n) _________ is a type of computer crime that floods a website or network with so much traffic that it overloads the system and prevents users from accessing its resources
denial-of-service attack
___________ is the set of rules all organizations should develop to specify the legal and ethical uses of its system and the possible consequences for noncompliance
Acceptable use policy
A banker selling the data supplied by its customers to another firm without the customers' consent is considered
neither ethical nor legal
__________ provides a legal umbrella covering copyrights, trademarks, and patents.
Intellectual property
The separation of people who can afford and have access to computers and the internet versus those who cannot is called the ________.
Social divide