The Most Important Component of an information System: People
Unlock all answers in this set
Unlock answersquestion
According to your textbook, in the five-component framework of an information system, which is the most important?
answer
People
question
Each Information System is comprised of five components. Match the component with the order in which it appears (from left to right) in the Five-Component Model.
answer
Hardware, Software, Data, Procedures, People
question
The number of components in the Five Component Model increases in proportion to an Information System's complexity and/or size.
answer
False
question
A graph of a stock price fluctuation is an example of...
answer
Data
question
In order for data to be considered timely it must be delivered in real time.
answer
False
question
Good data are always worth the cost, no matter how expensive.
answer
False
question
Keeping track of data involving multiple themes such as employees, transactions, customers, supplies, etc. should be done with which of the following?
answer
A relational database
question
The data displayed in Design View of a table in an Access database is an example of ______
answer
Metadata
question
A database is simply a group of tables or files.
answer
False, also contains relationships
question
Fields are considered...
answer
Columns
question
Bytes are considered...
answer
Characters
question
Tables are considered...
answer
Files
question
Records are considered...
answer
Rows
question
Businesses often purchase IS to enhance efficiency
answer
False, they purchase IT
question
In order for any organization to consider data timely it must be up to the second
answer
False
question
In Pre-Lab this week you created a relationship between the Employees table and the Employee_Training table. Both tables contain an Employee_ID field. What type of Key is the Employee_ID field in the Employee_Training table?
answer
Foreign Key
question
How many primary functions does a database management system (DBMS) have?
answer
3. Create, Process, and Administer
question
Which of the following is an international standard language for processing a database?
answer
SQL
question
The lost-update problem can be resolved by implementing multi-user database processing.
answer
False, the problem is caused by multiple users
question
Microsoft Access is a database
answer
False, DBMS
question
A ___________ makes databases more useful for obtaining information.
answer
database application
question
A ________ describes the data and relationships that will be stored in a database.
answer
data model
question
Relationships: Many to many
answer
>---------<
question
A table containing normalized data should have 3 or fewer themes.
answer
False, only one
question
N:M relationships should be represented in a data model the same way a 1:N relationship is represented.
answer
False
question
Which of the following should be responsible for signing off on the data model before a database is developed?
answer
end users
question
One to many
answer
1:N
question
Many to many
answer
N:M
question
The forked lines on the right side of a line on an E-R diagram that indicates a 1:N relationship between two entities is referred to as...
answer
Crow's feet
question
What type of relationship would be a student table and a classes table
answer
Many to many
question
In this database what type of relationship would be between a Supplier table and a Food item table that has info on every specific food item
answer
One to many
question
Information systems that process operational, social, and other data to identify patterns, trends, and relationships for use by business professionals are known as_______.
answer
Business Intelligence Systems
question
The patterns, trends, and relationships produced by these information systems are referred to as ________.
answer
Business Intelligence
question
An inventory report set to run automatically when an item reaches a critical low point is an example of pull publishing.
answer
False, push
question
Which of the following is the first primary activity in the BI process?
answer
Acquire data
question
One of the main benefits of BI Analysis is that there are no discrepancies in the data acquired from multiple sources.
answer
False, no matter how advanced
question
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
answer
Data mining
question
Which of the following is true of unsupervised data mining?
answer
Analysts do not create a model or hypothesis before running the analysis
question
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.
answer
supervised data mining
question
A common business application of decision trees is to classify loans by likelihood of default.
answer
True
question
The process by which Netflix recommends movies and TV shows that you may like is an example of business intelligence systems being utilized in the entertainment industry.
answer
True
question
What is the software component of a BI System called?
answer
BI Application
question
Workers speak into mic and ask where to put package
answer
Pull Publish Report
question
One benefit from effective supervised data mining techniques is to determine sales patterns which can result in increased sales through cross-selling
answer
False, it is unsupervised
question
Regression Analysis, which is statistical method of measuring the effects of a set of variables on another variable is an example of a supervised data mining technique
answer
True
question
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
answer
threat
question
Which of the following is considered a threat caused by human error
answer
an employee inadvertently installing an old database on top of the current one
question
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
answer
unauthorized data disclosure
question
In order to access your student records, you must authenticate with your IU username and passphrase. This is an example of which caregory of safeguard?
answer
Technical
question
Encryption, the process of transforming clear text into coded, unintelligible text for secure storage or communication is a type of human safeguard.
answer
False, data and techincal
question
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.
answer
brute force
question
When transferring funds online through the website of a reputed bank. Which of the following will be displayed in the address bar of your browser that will let you know that the bank is using the Secure Sockets Layer (SSL) protocol?
answer
https
question
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards
answer
Data administration
question
________ protect databases and other organizational data.
answer
Data safeguards
question
Which of the following statements is true about human safeguards for employees?
answer
User accounts should be defined to give users the least possible privilege needed to perform their jobs.
question
Email spoofing is a synonym of phishing
answer
True
question
In information security which of the following is true about managing risk
answer
Organizations should implement safeguards that balance the trade-off between risk and cost
question
_______ is a type of virus that self propagates using the internet or other computer network
answer
Worm
question
__________involve the people and procedure components of IS
answer
Human safeguards
question
A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following is lacking in this activity?
answer
collaboration
question
Which of the following is a key difference between collaboration and cooperation?
answer
Unlike cooperation, collaboration gives importance to iteration and feedback.
question
Which of the following is a primary purpose of collaboration?
answer
becoming informed
question
Kyra, a plant supervisor, orders 500 units of Type-2 steel beams for the coming month. In doing so, she has made a(n) ________ decision.
answer
operational
question
Project leaders have to make decisions on the allocation and utilization of materials and labor. Such decisions are called ________ decisions.
answer
managerial
question
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.
answer
structured
question
Which of the following questions is best answered through unstructured decision making?
answer
Should we continue to outsource our bookkeeping processes?
question
The need for collaboration is greatest for ________ decisions.
answer
strategic
question
Margaret finds that calling all her senior supervisors and quality managers for a face-to-face meeting is not feasible. She arranges for a multiparty text chatting session involving all of them. This is an example of asynchronous communication.
answer
False, synchronous
question
Version-management systems ________.
answer
track changes to shared documents
question
A team of ALDI District Managers working to increase the overall Q3 sales in the US is an example of...
answer
cooperation
question
When all team members meet over skype to discuss a plan for the xP assignment, they are participating in
answer
synchronous communication
question
Versions Managements tools limit, and sometimes even direct user activity to control workflow
answer
False