Info Systems 2 – Flashcards
Unlock all answers in this set
Unlock answersquestion
deskilling
answer
Job _____ occurs when skilled labor is eliminated by high technology or when a job is downgraded from a skilled to a semiskilled or unskilled position.
question
lack of necessary supplies or equipment
answer
Which of the following is a potential drawback of telecommuting?
question
data definition
answer
The _____ component of a database management system is used to create and maintain the data dictionary.
question
Normalization
answer
________ improves database efficiency by eliminating redundant data and ensuring that only related dada is stored in a table.
question
Sales records
answer
Which of the following is a source of internal data?
question
data dictionary
answer
A _____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
question
net neutrality
answer
According to the principle of _____, Internet service providers (ISPs) and government agencies should treat all data on the Internet equally.
question
nonrepudiation
answer
In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.
question
Significant improvements in storage technology
answer
Which of the following factors has made big data analytics accessible to nearly all types of organizations?
question
AND
answer
The _____ operator is used when all the conditions in a query by example (QBE) form are required to be met.
question
data manipulation
answer
The _____ component of a database management system is used to add, delete, modify, and retrieve records from a database.
question
data mining tools
answer
Business analytics uses _____ to support decision-making activities.
question
integrity rules
answer
The _____ of a data model defines the boundaries of a database, such as maximum and minimum values allowed for a field.
question
database engine
answer
The _____ component is responsible for data storage, manipulation, and retrieval.
question
accountability
answer
In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
question
data administration
answer
The _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management.
question
Trademarks
answer
In the context of intellectual property, which of the following is categorized as industrial property?
question
Despite being smaller, data marts can usually perform the same type of analysis as data warehouses.
answer
Which of the following statements is true of data marts and data warehouses?
question
legal but unethical
answer
Clement applies for home loan at Global Bank Inc. As part of the process, he is required to provide personal details. The banker uses Clements's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.
question
Enterprise resource planning system
answer
Which of the following data sources provides the input a data warehouse needs to perform analyses and generate reports?
question
sent in bulk using automated mailing software.
answer
Usually, junk e-mail or spam is:
question
foreign
answer
In a relational model, when a primary key for one table appears in another table, it is called a _____ key.
question
Metadata
answer
_____ is information about data—its content, quality, condition, origin, and other characteristics.
question
illegal but ethical
answer
Aaron bought a photo-editing software package. He makes two copies of the software and keeps it with himself in case the original software fails and he needs a backup. In this scenario, Aaron's actions are considered _____.
question
extraction
answer
In a data warehouse, ______ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.
question
project
answer
A(n) _____ operation pares down a table by eliminating columns according to certain criteria.
question
Artistic works
answer
In the context of intellectual property, which of the following is categorized as copyrighted material?
question
Summary data
answer
______ gives users subtotals of various categories, which can be useful.
question
use verification procedures to ensure data accuracy
answer
To minimize the invasion of privacy, users and organizations should:
question
Raw data
answer
_____ is information in its original form.
question
Cookies
answer
______ provide information about a user's location and computer equipment, and this information can be used for unauthorized purposes, such as corporate espionage.
question
Copyright Act
answer
The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
question
legal but unethical
answer
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.
question
it reduces employee turnover.
answer
A potential benefit of telecommuting is that:
question
illegal and unethical
answer
Jared makes two copies of an antivirus software package he just bought and gives one of the copies to Joshua. In this scenario, Jared's actions are considered _____.
question
accountability
answer
In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
question
more sophisticated security measures can be seen
answer
In comparison to a flat file system, in a database, _____.
question
Tax records
answer
Which of the following is a source of external data?
question
illegal but ethical
answer
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _______.
question
legal but unethical
answer
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.
question
Cookies
answer
Which of the following is a commonly used technology for data collection?
question
Lack of necessary supplies or equipment
answer
Which of the following is a potential drawback of telecommuting?
question
Copyright
answer
_____ laws give only the creator exclusive rights, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.
question
deskilling
answer
Job _____ occurs when skilled labor is eliminated by high technology or when a job is downgraded from a skilled to a semiskilled or unskilled position.
question
store multidimensional data
answer
Data warehouses are sometimes called "hypercubes" because they_____.
question
Operations
answer
Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data?
question
Public
answer
_____ information can be censored if the content is deemed offensive to a political, religious, or cultural group
question
Cybersquatting
answer
_____ is registering, selling, or using a domain name to profit from someone else's trademark.
question
be kept secret.
answer
To minimize the invasion of privacy, the existence of record-keeping systems storing personal data should not:
question
not charge different rates on data.
answer
According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should:
question
select
answer
In a relational data model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria.
question
data warehouse
answer
A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
question
database engine
answer
The _____ component is responsible for data storage, manipulation, and retrieval.
question
allocation
answer
The _____ approach to setting up a distributed database management system (DDBMS) combines fragmentation and replication.
question
network
answer
In a(n) _____ data model, each record can have multiple parent and child records.
question
It is a result of exponential growth of data in both public and private organizations.
answer
Which of the following statements is true of big data?
question
it is needed for the stated purpose.
answer
Organizations should keep collected information only as long as:
question
structured data and unstructured data
answer
The variety dimension of big data refers to a combination of _____.
question
upgrading
answer
Clerical workers using computers for word-processing tasks is an example of job _____.
question
Green computing
answer
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
question
physical
answer
The _____ view of a database involves how data is stored on and retrieved from storage media.
question
volume
answer
The _____ dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes.
question
copyright laws
answer
Generally, _____ protect tangible material, such as books and drawings.
question
logical structure
answer
To begin designing a relational database, one must define the _____ by defining each table and the fields in it.
question
reliability
answer
To minimize the invasion of privacy, any organization creating, maintaining, using, or disseminating records of personal data must ensure the data's _____.
question
data mart
answer
A _____ is usually a smaller version of a data warehouse, used by a single department or function.
question
Fair Use Doctrine
answer
The _____ is an exception to copyright laws that means that a person can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
question
Using video conferencing, electronic meeting systems, and groupware
answer
In which of the following ways can green computing be achieved?
question
data model
answer
The first step in database design is defining a _____, which defines how data is created, represented, organized, and maintained.
question
Spamming
answer
_____ has created decency concerns, because these e-mails often contain explicit language or nudity.
question
Communications Decency Act
answer
The _____ was partially overturned in the 1997 Reno v. ACLU case, in which the U.S. Supreme Court unanimously voted to strike down the act's anti-obscenity provisions, finding they violated the freedom of speech provisions of the First Amendment.
question
Log files
answer
_____, which are generated by Web server software, record a user's actions on a Web site.
question
products are customized more to respond to customers' needs.
answer
An advantage of virtual organizations is that:
question
digital divide
answer
Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____.
question
Mobile and wireless technology
answer
Which of the following is a key factor that has contributed to the growth and popularity of big data?
question
Operations
answer
Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data?
question
is focused on a specific area
answer
Data in a data warehouse can be differentiated from data in a database in that the former _____.