Deck 17: Managing Information

ملء الشاشة (f)
exit full mode
سؤال
InfoQEN is a Wi-Fi router developer.A customer asked InfoQEN to develop a Wi-Fi router that can connect 10 devices simultaneously.InfoQEN developed the router and delivered it to the customer.After a day,the customer came back saying that the devices were not getting connected to the router as the router was located on a different floor.InfoQEN replied that if the distance between the router and devices is more than 10 meters,the devices will not get connected to the router.The device was built based on the number of devices to be connected and not on the possible distance between the devices and the router.To solve this problem,InfoQEN must now either redesign the router at additional costs or ask the customer to relocate the router.Which of the following is most likely the reason for this problem? 

A) ​The information provided to InfoQEN was untimely. 
B) ​The information provided to InfoQEN was irrelevant. 
C) ​The information provided to InfoQEN was incomplete. 
D) ​The information provided to InfoQEN was inestimable.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Innove Tech is a technological firm that wants to build a global service delivery system.It has consulted a larger firm,Ziff Corp.,to obtain the proven technology required to establish this system.In the context of the costs of useful information,Innove Tech incurred _____ costs.

A) ​processing 
B) ​retrieval 
C) ​acquisition 
D) ​storage
سؤال
In 1965,one of the founders of Intel Corporation predicted that computer-processing power would double and that its cost would drop by 50 percent every two years.This is known as _____.

A) ​Moore's law 
B) ​Amdahl's law 
C) ​Metcalfe's law 
D) ​Haitz's law
سؤال
Data mining is the process of collecting large amounts of raw data from different sources.
سؤال
A company that has earned first-mover advantage is immune to competition.
سؤال
Shop Ahead,a retail mart,conducted a survey on how long a customer waits in a queue for billing.Based on the results of the survey,the company planned to modify the number of employees at the billing counter.While checking out of the mart,Shop Ahead asked all its customers to fill a form indicating the time they spent in the queue.All customers reported that they waited for 2,5,or 10 minutes.Majority reported that they waited for 10 minutes.Based on the results,Shop Ahead added 10 cash counters to its existing 20.After a month,the management realized that the mart had more cash counters and employees than required.Which of the following is most likely the reason for the loss incurred due to overemployment in the mart? 

A) ​The information provided in the survey was inaccurate. 
B) ​The information provided in the survey was irrelevant. 
C) ​The information provided in the survey was incomplete. 
D) ​The information provided in the survey was inestimable.
سؤال
Ziff Corp.,a computer cabinet manufacturer,recently employed a new supply chain management system,which has never been used before.This system enables the company to produce more computer cabinets than its competitors at considerably lower costs.By employing this new supply chain management system,Ziff Corp.has achieved _____.

A) ​competitive inertia 
B) ​strategic dissonance 
C) ​first-mover advantage 
D) ​informational advantage
سؤال
Which of the following best describes storage costs? 

A) ​It is the cost of obtaining data that an organization does not possess. 
B) ​It is the cost of transforming data into meaningful information. 
C) ​It is the cost of physically or electronically archiving information. 
D) ​It is the cost of transmitting information from one place to another.
سؤال
Extranets allow companies to exchange information and conduct transactions with outsiders by providing them direct,web-based access to authorized parts of a company's information system.
سؤال
Fuine Corp.,a multinational corporation,has a data management system that contains raw data about the firm,its employees,business processes,subdivisions,etc.The data management system is outdated and inefficient in converting the data into useable information.This significantly costs the company.In this case,which of the following costs is Fuine Corp.incurring? 

A) ​Processing costs 
B) ​Retrieval costs 
C) ​Acquisition costs 
D) ​Storage costs
سؤال
Most expert systems work by using a collection of "if-then" rules to sort through information and recommend a course of action.
سؤال
Data and information are the same as knowledge.
سؤال
Lailey Tech,a global customer service provider,spent $25 million on a new data center to keep its data safe at a single location.Which of the following costs best illustrates the expenditure on the new data center? 

A) ​Acquisition costs 
B) ​Processing costs 
C) ​Storage costs 
D) ​Retrieval costs
سؤال
Which of the following leads to sustainable competitive advantage? 

A) ​A similarity in information technology used across competing firms 
B) ​A high potential for competing firms to create or buy a company's information technology 
C) ​Continuous improvement of the hardware and software used by a company 
D) ​Using information technology to continuously improve the core functions of a company
سؤال
Association patterns help identify database elements that are different.
سؤال
Retrieval cost is the cost of transmitting information from one place to another.
سؤال
Intranets use standardized protocols to describe and transfer data from one company in such a way that those data can automatically be read,understood,transcribed,and processed by different computer systems in another company.
سؤال
Competitive advantage does not depend on using information technology to continuously improve and support the core functions of a business.
سؤال
Which of the following is a characteristic of information? 

A) ​Information specifically contains figures. 
B) ​Information is useful even when it is inaccurate. 
C) ​Information has context attached to it. 
D) ​Incomplete information helps in recognizing problems.
سؤال
Expert systems do not permit nonexpert employees to draw on the expert knowledge base to make decisions.
سؤال
A(n)_____ can be used to convert digitized documents into ASCII (American Standard Code for Information Interchange)text that can be edited by word processing software.

A) ​electronic bar scanner 
B) ​radio frequency analogue software 
C) ​optical character recognition software 
D) ​electromagnetic wave imager
سؤال
Which of the following best describes radio frequency identification (RFID)tags? 

A) ​They represent numerical data of a product by varying the thickness and pattern of vertical bars. 
B) ​They require direct line-of-sight scanning for the radio waves to scan a product perfectly.  
C) ​They require a reader that tunes into a specific frequency to determine the number and location of products. 
D) ​They are installed in a handheld or pen-type scanner that reads and records data instantly.
سؤال
The two basic requirements for a good electronic scanner are a document feeder and a(n)_____.

A) ​digital printing software 
B) ​optical character recognition software 
C) ​radio wave transmitter 
D) ​bar code imager
سؤال
A decision support system (DSS): 

A) ​speeds up and simplifies the acquisition of information. 
B) ​uses external sources of data to provide managers the information to analyze organizational performance. 
C) ​is designed to help managers deal with specific kinds of problems. 
D) ​is a hybrid of executive information systems and intranets.
سؤال
By examining customer checkout details,a supermarket has learned that people who buy beer,typically,also buy a packet of salted snacks.As a result,the manager of the supermarket decides to place beer near the shelf with chips and pretzels.In this case,which of the following tools for processing information has the supermarket most likely used? 

A) ​Data integration 
B) ​Data mining 
C) ​Bar coding 
D) ​Radio frequency tagging
سؤال
_____ are private company networks that allow employees to easily access,share,and publish information using Internet software.

A) ​Extranets 
B) ​Data clusters 
C) ​Intranets 
D) ​Firewalls
سؤال
Affinity patterns occur when: 

A) ​two or more database elements occur together in a significant pattern in which one of the elements precedes the other. 
B) ​two or more database elements tend to occur together in a significant way. 
C) ​three or more database elements occur intermittently in an unstructured way. 
D) ​three or more database elements occur together in a significant pattern in which one of the elements precedes the other.
سؤال
A manufacturer of pharmaceuticals can access information about its sales and share confidential product information with drug store chains through the use of _____.

A) ​an extranet 
B) ​an electronic data interchange 
C) ​a corporate portal 
D) ​two-factor authentication
سؤال
The three kinds of information technology used by executives,managers,and workers inside a company to access and share information are: 

A) ​executive information systems, portals, and intranets. 
B) ​local area networks, extranets, and management control systems. 
C) ​electronic data interchange, web services, and extranets. 
D) ​expert systems, decision support systems, and virtual private networks.
سؤال
Which of the following best describes communication costs? 

A) ​It is the cost of obtaining data that an organization does not possess. 
B) ​It is the cost of transforming data into meaningful information. 
C) ​It is the cost of transmitting information from one place to another. 
D) ​It is the cost of physically or electronically archiving information.
سؤال
_____ represent numerical data by varying the thickness and pattern of vertical lines.

A) ​Radio frequency identification tags 
B) ​Bar codes 
C) ​Morse codes 
D) ​Optical character recognition tags
سؤال
Which of the following statements is true about knowledge? 

A) ​Knowledge is similar to data and information. 
B) ​Knowledge resides in information. 
C) ​Knowledge is the understanding that one gains from information. 
D) ​Knowledge is easier to acquire than data and information.
سؤال
A(n)_____ allows companies to exchange information and conduct transactions by purposely providing outsiders with direct,web browser-based access to authorized parts of a company's information system.

A) ​extranet 
B) ​corporate portal 
C) ​executive information system 
D) ​intranet
سؤال
Baxton Courier Services recently gave all its employees electronic tablets to accurately track the whereabouts of its ​shipments.In this process,the costs that Baxton Courier Services incurred is an example of _____ costs.

A) ​acquisition 
B) ​processing 
C) ​communication 
D) ​retrieval
سؤال
Which of the following is a software that encrypts Internet data at both ends of the transmission process? 

A) ​Cookie manipulator 
B) ​Virtual private network 
C) ​Executive information system 
D) ​Data insulator
سؤال
Which of the following web-based tools provides secure off-site access to data and programs? 

A) ​Decision support system 
B) ​Electronic data interchange 
C) ​Secure sockets layer encryption 
D) ​Executive information system
سؤال
Sequence patterns appear when: 

A) ​two or more database elements occur together in a significant pattern in which one of the elements precedes the other. 
B) ​two or more database elements tend to occur together in a significant way. 
C) ​three or more database elements occur together in a significant way. 
D) ​three or more database elements occur together in an insignificant pattern in which two of the elements precede the other.
سؤال
The two critical steps required to make sure that data can be accessed by approved users and no one else are: 

A) ​authentication and authorization. 
B) ​authorization and empowerment. 
C) ​authentication and encryption. 
D) ​authorization and encryption.
سؤال
Soundwave Communication Services has processed and archived a large amount of data on its servers.Due to a technical fault in its servers, it could not access the data.The company had to pay $3 million to technicians to regain access to the data.This is an example of _____ costs.

A) ​acquisition cost 
B) ​processing cost 
C) ​storage cost 
D) ​retrieval cost
سؤال
_____ usually begins with the user telling the data mining software to look and test for specific patterns and relationships in a data set.

A) ​Data integration 
B) ​Data binding 
C) ​Supervised data mining 
D) ​Unsupervised data mining
سؤال
_________ occur when two or more database elements tend to occur together in a significant way.A.Association patterns
B.Data clustersC.Time seriesD.Predictive patterns
سؤال
The two basic methods of capturing information are _________.
A.systematic and unsystematic
B.manual and electronic
C.continuous and intermittent
D.functional and hierarchical
سؤال
In the context of protecting information,_________ makes sure that users are who they claim to be.A.encryption
B.authorizationC.decryptionD.authentication
سؤال
_________ are the two information technologies to capture and share the knowledge of consultants,specialists,and experts with other managers and workers.
A.Decision support systems and expert systems
B.Executive information systems and electronic data interchange
C.Virtual private networks and secure socket layer encryption
D.Data mining and two-factor authentication
سؤال
While completing an online banking transaction,David was asked to type his Internet banking password followed by a one-time password that was sent to his registered cell phone number to authenticate the transaction.This type of authentication is called _________.
سؤال
_________ transforms data into complex,scrambled digital codes that can be decrypted only by authorized users who possess unique decryption keys.
سؤال
_________ stores huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy.
سؤال
The term _________ refers to facts and figures that are unusable unless they have meaning.
سؤال
_________ is the process of granting authenticated users approved access to data,software,and systems.
سؤال
_________ allow managers and employees to use a web browser to gain access to customized company information and to complete specialized transactions.
A.Extranets
B.Firewalls
C.Corporate portals
D.Executive information systems
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 17: Managing Information
1
InfoQEN is a Wi-Fi router developer.A customer asked InfoQEN to develop a Wi-Fi router that can connect 10 devices simultaneously.InfoQEN developed the router and delivered it to the customer.After a day,the customer came back saying that the devices were not getting connected to the router as the router was located on a different floor.InfoQEN replied that if the distance between the router and devices is more than 10 meters,the devices will not get connected to the router.The device was built based on the number of devices to be connected and not on the possible distance between the devices and the router.To solve this problem,InfoQEN must now either redesign the router at additional costs or ask the customer to relocate the router.Which of the following is most likely the reason for this problem? 

A) ​The information provided to InfoQEN was untimely. 
B) ​The information provided to InfoQEN was irrelevant. 
C) ​The information provided to InfoQEN was incomplete. 
D) ​The information provided to InfoQEN was inestimable.
  C
2
Innove Tech is a technological firm that wants to build a global service delivery system.It has consulted a larger firm,Ziff Corp.,to obtain the proven technology required to establish this system.In the context of the costs of useful information,Innove Tech incurred _____ costs.

A) ​processing 
B) ​retrieval 
C) ​acquisition 
D) ​storage
  C
3
In 1965,one of the founders of Intel Corporation predicted that computer-processing power would double and that its cost would drop by 50 percent every two years.This is known as _____.

A) ​Moore's law 
B) ​Amdahl's law 
C) ​Metcalfe's law 
D) ​Haitz's law
  A
4
Data mining is the process of collecting large amounts of raw data from different sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
A company that has earned first-mover advantage is immune to competition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Shop Ahead,a retail mart,conducted a survey on how long a customer waits in a queue for billing.Based on the results of the survey,the company planned to modify the number of employees at the billing counter.While checking out of the mart,Shop Ahead asked all its customers to fill a form indicating the time they spent in the queue.All customers reported that they waited for 2,5,or 10 minutes.Majority reported that they waited for 10 minutes.Based on the results,Shop Ahead added 10 cash counters to its existing 20.After a month,the management realized that the mart had more cash counters and employees than required.Which of the following is most likely the reason for the loss incurred due to overemployment in the mart? 

A) ​The information provided in the survey was inaccurate. 
B) ​The information provided in the survey was irrelevant. 
C) ​The information provided in the survey was incomplete. 
D) ​The information provided in the survey was inestimable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Ziff Corp.,a computer cabinet manufacturer,recently employed a new supply chain management system,which has never been used before.This system enables the company to produce more computer cabinets than its competitors at considerably lower costs.By employing this new supply chain management system,Ziff Corp.has achieved _____.

A) ​competitive inertia 
B) ​strategic dissonance 
C) ​first-mover advantage 
D) ​informational advantage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following best describes storage costs? 

A) ​It is the cost of obtaining data that an organization does not possess. 
B) ​It is the cost of transforming data into meaningful information. 
C) ​It is the cost of physically or electronically archiving information. 
D) ​It is the cost of transmitting information from one place to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Extranets allow companies to exchange information and conduct transactions with outsiders by providing them direct,web-based access to authorized parts of a company's information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Fuine Corp.,a multinational corporation,has a data management system that contains raw data about the firm,its employees,business processes,subdivisions,etc.The data management system is outdated and inefficient in converting the data into useable information.This significantly costs the company.In this case,which of the following costs is Fuine Corp.incurring? 

A) ​Processing costs 
B) ​Retrieval costs 
C) ​Acquisition costs 
D) ​Storage costs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Most expert systems work by using a collection of "if-then" rules to sort through information and recommend a course of action.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Data and information are the same as knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Lailey Tech,a global customer service provider,spent $25 million on a new data center to keep its data safe at a single location.Which of the following costs best illustrates the expenditure on the new data center? 

A) ​Acquisition costs 
B) ​Processing costs 
C) ​Storage costs 
D) ​Retrieval costs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following leads to sustainable competitive advantage? 

A) ​A similarity in information technology used across competing firms 
B) ​A high potential for competing firms to create or buy a company's information technology 
C) ​Continuous improvement of the hardware and software used by a company 
D) ​Using information technology to continuously improve the core functions of a company
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Association patterns help identify database elements that are different.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Retrieval cost is the cost of transmitting information from one place to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Intranets use standardized protocols to describe and transfer data from one company in such a way that those data can automatically be read,understood,transcribed,and processed by different computer systems in another company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Competitive advantage does not depend on using information technology to continuously improve and support the core functions of a business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is a characteristic of information? 

A) ​Information specifically contains figures. 
B) ​Information is useful even when it is inaccurate. 
C) ​Information has context attached to it. 
D) ​Incomplete information helps in recognizing problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Expert systems do not permit nonexpert employees to draw on the expert knowledge base to make decisions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n)_____ can be used to convert digitized documents into ASCII (American Standard Code for Information Interchange)text that can be edited by word processing software.

A) ​electronic bar scanner 
B) ​radio frequency analogue software 
C) ​optical character recognition software 
D) ​electromagnetic wave imager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following best describes radio frequency identification (RFID)tags? 

A) ​They represent numerical data of a product by varying the thickness and pattern of vertical bars. 
B) ​They require direct line-of-sight scanning for the radio waves to scan a product perfectly.  
C) ​They require a reader that tunes into a specific frequency to determine the number and location of products. 
D) ​They are installed in a handheld or pen-type scanner that reads and records data instantly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
The two basic requirements for a good electronic scanner are a document feeder and a(n)_____.

A) ​digital printing software 
B) ​optical character recognition software 
C) ​radio wave transmitter 
D) ​bar code imager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
A decision support system (DSS): 

A) ​speeds up and simplifies the acquisition of information. 
B) ​uses external sources of data to provide managers the information to analyze organizational performance. 
C) ​is designed to help managers deal with specific kinds of problems. 
D) ​is a hybrid of executive information systems and intranets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
By examining customer checkout details,a supermarket has learned that people who buy beer,typically,also buy a packet of salted snacks.As a result,the manager of the supermarket decides to place beer near the shelf with chips and pretzels.In this case,which of the following tools for processing information has the supermarket most likely used? 

A) ​Data integration 
B) ​Data mining 
C) ​Bar coding 
D) ​Radio frequency tagging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
_____ are private company networks that allow employees to easily access,share,and publish information using Internet software.

A) ​Extranets 
B) ​Data clusters 
C) ​Intranets 
D) ​Firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Affinity patterns occur when: 

A) ​two or more database elements occur together in a significant pattern in which one of the elements precedes the other. 
B) ​two or more database elements tend to occur together in a significant way. 
C) ​three or more database elements occur intermittently in an unstructured way. 
D) ​three or more database elements occur together in a significant pattern in which one of the elements precedes the other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
A manufacturer of pharmaceuticals can access information about its sales and share confidential product information with drug store chains through the use of _____.

A) ​an extranet 
B) ​an electronic data interchange 
C) ​a corporate portal 
D) ​two-factor authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
The three kinds of information technology used by executives,managers,and workers inside a company to access and share information are: 

A) ​executive information systems, portals, and intranets. 
B) ​local area networks, extranets, and management control systems. 
C) ​electronic data interchange, web services, and extranets. 
D) ​expert systems, decision support systems, and virtual private networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following best describes communication costs? 

A) ​It is the cost of obtaining data that an organization does not possess. 
B) ​It is the cost of transforming data into meaningful information. 
C) ​It is the cost of transmitting information from one place to another. 
D) ​It is the cost of physically or electronically archiving information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____ represent numerical data by varying the thickness and pattern of vertical lines.

A) ​Radio frequency identification tags 
B) ​Bar codes 
C) ​Morse codes 
D) ​Optical character recognition tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following statements is true about knowledge? 

A) ​Knowledge is similar to data and information. 
B) ​Knowledge resides in information. 
C) ​Knowledge is the understanding that one gains from information. 
D) ​Knowledge is easier to acquire than data and information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n)_____ allows companies to exchange information and conduct transactions by purposely providing outsiders with direct,web browser-based access to authorized parts of a company's information system.

A) ​extranet 
B) ​corporate portal 
C) ​executive information system 
D) ​intranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Baxton Courier Services recently gave all its employees electronic tablets to accurately track the whereabouts of its ​shipments.In this process,the costs that Baxton Courier Services incurred is an example of _____ costs.

A) ​acquisition 
B) ​processing 
C) ​communication 
D) ​retrieval
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is a software that encrypts Internet data at both ends of the transmission process? 

A) ​Cookie manipulator 
B) ​Virtual private network 
C) ​Executive information system 
D) ​Data insulator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following web-based tools provides secure off-site access to data and programs? 

A) ​Decision support system 
B) ​Electronic data interchange 
C) ​Secure sockets layer encryption 
D) ​Executive information system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Sequence patterns appear when: 

A) ​two or more database elements occur together in a significant pattern in which one of the elements precedes the other. 
B) ​two or more database elements tend to occur together in a significant way. 
C) ​three or more database elements occur together in a significant way. 
D) ​three or more database elements occur together in an insignificant pattern in which two of the elements precede the other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The two critical steps required to make sure that data can be accessed by approved users and no one else are: 

A) ​authentication and authorization. 
B) ​authorization and empowerment. 
C) ​authentication and encryption. 
D) ​authorization and encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Soundwave Communication Services has processed and archived a large amount of data on its servers.Due to a technical fault in its servers, it could not access the data.The company had to pay $3 million to technicians to regain access to the data.This is an example of _____ costs.

A) ​acquisition cost 
B) ​processing cost 
C) ​storage cost 
D) ​retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
_____ usually begins with the user telling the data mining software to look and test for specific patterns and relationships in a data set.

A) ​Data integration 
B) ​Data binding 
C) ​Supervised data mining 
D) ​Unsupervised data mining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
_________ occur when two or more database elements tend to occur together in a significant way.A.Association patterns
B.Data clustersC.Time seriesD.Predictive patterns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
The two basic methods of capturing information are _________.
A.systematic and unsystematic
B.manual and electronic
C.continuous and intermittent
D.functional and hierarchical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
In the context of protecting information,_________ makes sure that users are who they claim to be.A.encryption
B.authorizationC.decryptionD.authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
_________ are the two information technologies to capture and share the knowledge of consultants,specialists,and experts with other managers and workers.
A.Decision support systems and expert systems
B.Executive information systems and electronic data interchange
C.Virtual private networks and secure socket layer encryption
D.Data mining and two-factor authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
While completing an online banking transaction,David was asked to type his Internet banking password followed by a one-time password that was sent to his registered cell phone number to authenticate the transaction.This type of authentication is called _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
_________ transforms data into complex,scrambled digital codes that can be decrypted only by authorized users who possess unique decryption keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
_________ stores huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
The term _________ refers to facts and figures that are unusable unless they have meaning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
_________ is the process of granting authenticated users approved access to data,software,and systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
_________ allow managers and employees to use a web browser to gain access to customized company information and to complete specialized transactions.
A.Extranets
B.Firewalls
C.Corporate portals
D.Executive information systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.