Deck 16: Section 2: Control

ملء الشاشة (f)
exit full mode
سؤال
Pioneering differential refers to the strategic advantage that companies earn by being the first in an industry to use new information technology to substantially lower costs or to differentiate a product or service from competitors.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The two activities necessary to properly secure data and data networks are the use of firewalls and antivirus software.
سؤال
A data warehouse stores raw data that have been collected from a variety of sources for later use.
سؤال
The key to sustaining a competitive advantage is using information technology to continuously improve and support the core functions of a business.
سؤال
Protecting information is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users but no one else.
سؤال
According to the resource-based view of information technology, sustainable competitive advantage occurs when information technology adds value, is different across firms, and is difficult to create or acquire.
سؤال
Moore's law accounts for the rapid increase in power and reduction in both size and price of computer equipment over the past 35 years.
سؤال
The first airline that used technology to allow passengers to buy their plane tickets and reserve their seats online had a first-mover advantage.
سؤال
Information has strategic importance for organizations because it can be used to obtain first-mover advantage and to sustain a competitive advantage once it has been created.
سؤال
The first company to gain first-mover advantage typically benefits from higher profits and larger market share.
سؤال
The two basic methods of capturing information are continuous and periodic.
سؤال
The term data mining refers to the process of discovering unknown patterns and relationships in large amounts of data.
سؤال
Data mining typically splits a data set in half, finds patterns in one half, and then tests the validity of those patterns by trying to find them again in the second half of the data set.
سؤال
The primary difference between raw data and information is meaning to the user.
سؤال
Association patterns are also called sequence patterns.
سؤال
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
سؤال
Unsupervised data mining is unethical.
سؤال
In today's hypercompetitive business environments, capital (i.e., money) is still more important than information for business success.
سؤال
Bar codes and document scanners are common methods of electronically capturing data.
سؤال
Moore's law refers to the prediction that the cost of computing will drop by 50 percent every 2 years as computer- processing power doubles.
سؤال
According to_____ , the cost of computing will drop by 50 percent as computer-processing power doubles every 18months.

A) Moore's law
B) Gordon's law
C) the Peter principle
D) the rule of e-commerce
E) Gresham's Law
سؤال
Data encryption transforms data into complex, scrambled digital codes that can only be unencrypted by authorized users who possess unique decryption keys.
سؤال
Most expert systems work by using a collection of "if-then" rules to sort through information and recommend a course of action.
سؤال
A table showing the order frequencies as well as the average dollar value of the orders of different segments of a catalog retailer's market would be an example of___________ .

A) an MIS
B) perceived knowledge
C) raw data
D) information
E) influential knowledge
سؤال
The first company to use new information technology to substantially lower costs or differentiate products or services often gains ___________.

A) first-mover advantage
B) lower profits
C) less market adaptability
D) increased synergy
E) all of these
سؤال
Understanding that consumers wanted clean, convenient food when they were away from home was the information the first fast food restaurant founder used to___________ .

A) acquire a source of perceived knowledge
B) create a tactical advantage
C) create a first-mover advantage
D) pioneer sales in the consumer food industry
E) sustain a competitive advantage
سؤال
Why is information strategically important for organizations?

A) Information can be used to obtain first-mover advantage.
B) Information is derived from perceived knowledge, which limits its availability.
C) Information cannot be used as a medium of exchange.
D) Information creates suboptimization opportunities.
E) All of these are examples of why information is strategically important for organizations.
سؤال
Pages listing all of the felony crimes perpetrated in a given city during the last decade would be an example of ____.

A) a resource allocation table
B) traditional knowledge
C) raw data
D) perceived knowledge
E) information
سؤال
The key to sustaining competitive advantage is___________ .

A) faster computers with more memory
B) using information technology to continuously improve and support the core functions of a business
C) the Internet
D) the ability of the managers to delegate
E) how important the company's culture perceives conceptual skills
سؤال
Virtual private networks (VPN) and secure sockets layer (SSL) encryption perform basically the same function.
سؤال
Which of the following is one of the critical issues companies need to address in order to sustain a competitive advantage through information technology?

A) Who will have access to the information technology?
B) Will the purchase of the information technology be viewed as an expense or as an investment?
C) Does the firm's use of the information technology violate any ethical standards?
D) Is the firm's use of information technology difficult for another company to create or buy?
E) What government regulations may influence the company's use of information technology?
سؤال
Intranets are private company networks that allow employees to easily access, share, and publish information using Internet software.
سؤال
Electronic data interchange, or EDI, is the direct electronic transmission of purchase and ordering information from one company's computer system to another company's computer system.
سؤال
Data mining often reveals data clusters where three or more database elements occur together.
سؤال
It is important to understand that DSS programs should not replace managerial decision making.
سؤال
Extranets are used to handle organizational transactions with suppliers and distributors.
سؤال
Electronic data interchange (EDI), extranets, and the Internet have proven to provide such a competitive advantage that managers are scrambling to find ways to use them in their own companies.
سؤال
The term___________ refers to facts and figures that are in an unusable form.

A) nonspecific information
B) processed data
C) raw data
D) perceived knowledge
E) relevant information
سؤال
Data and information are the same as knowledge.
سؤال
Three major types of information technology are used by executives, managers, and workers inside the company to access and share information. They are executive information systems, intranets, and corporate portals.
سؤال
The three methods of tracing products through a distribution system are paper records, bar codes, and radio frequency identification tags. Which of the following statements about the tracing of products is true?

A) RFID tags need direct line-of-sight scanning.
B) Bar codes would be the easiest and most economical method to use.
C) Until technological improvements are made, paper records are the best way to trace recalled products.
D) RFID tags are most efficient because they can be read by a radio that has been tuned to a specific
frequency.
E) Bar codes are the most efficient because they make use of optical character recognition.
سؤال
Unsupervised data mining is particularly good at identifying___________ .

A) association or affinity patterns
B) sequence patterns
C) predictive patterns
D) data clusters
E) all of these
سؤال
Using ___________data mining, the user usually begins by telling the data mining software to look and test for specific patterns and relationships in a data set.

A) supervised
B) specific
C) comprehensive
D) unsupervised
E) homogenous
سؤال
The two basic methods of capturing information are ___________.

A) systematic and unsystematic
B) planned and unplanned
C) continuous and intermittent
D) functional and hierarchical
E) manual and electronic
سؤال
The data used in data mining typically come from___________ that store huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy.

A) Internet databases
B) competitive intelligence sources
C) data warehouses
D) data extractions
E) information clearinghouses
سؤال
By examining checkout data, supermarkets have learned that people who are buying beer typically also buy a bag of salty snacks. As a result of this finding from___________ , supermarkets often place displays of beer near the chips and pretzel aisle.

A) optical scanning
B) electronic data interchange
C) bar coding
D) data mining
E) data warehousing
, supermarkets often place displays of beer near the chips and
سؤال
When Billy Ingram founded White Castle, much of the public thought that hamburgers were made from rotten beef and not fit for human consumption. Ingram ground fresh beef in front of customers to prove it was safe and was the first to successfully sell hamburgers to the middle class. Today Ingram is credited as the founder of the fast- food industry. Yet, today White Castle has 330 locations, and McDonald's has 25,000 stores. From this information, you know___________ .

A) tactics are more influential than strategies
B) the competitive advantage White Castle achieved from being first was not sustainable
C) White Castle lost its pioneering differential
D) product diffusion rates were slow
E) none of these
سؤال
Using ___________data mining, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set.

A) supervised
B) specific
C) comprehensive
D) heterogeneous
E) unsupervised
سؤال
___________occur in data mining when two or more database elements occur together in a significant pattern, with one of the elements preceding the other.

A) Data clusters
B) Affinity patterns
C) Association patterns
D) Sequence patterns
E) Logic clusters
سؤال
Because they are inexpensive and easy to use, ___________, which convert printed text and pictures into digital images, have become an increasingly popular method for capturing data electronically.

A) electronic data interchanges
B) electronic scanners
C) radio frequency information digitizers (RFIDs)
D) data digitalization
E) bar coding devices
سؤال
The two major types of data mining are___________ .

A) supervised and unsupervised
B) random and sequence
C) affinity and association
D) sequence and affinity
E) ASCII and digital
سؤال
___________is the process of discovering unknown patterns and relationships in large amounts of data.

A) Information keystoning
B) Data mining
C) Data warehousing
D) Data outsourcing
E) Patterning
سؤال
The manual capture of information is___________ .

A) slow
B) expensive
C) labor-intensive
D) often inaccurate
E) all of these
سؤال
The Food and Drug Administration (FDA) could use data it has collected from millions of suspected drug-related adverse event reports and other electronic medical information to identify a pattern of adverse drug events in a specific population. This data collected by the FDA would be held in a(n)___________ .

A) Internet database
B) competitive intelligence source
C) data warehouse
D) data extraction
E) information clearinghouse
سؤال
In the process of capturing information, ASCII text is generated by___________ .

A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
سؤال
According to the resource-based view of information technology, sustainable competitive advantage .

A) is difficult to create or acquire
B) can be created by using information technology to continuously improve and support the core functions of a business
C) differs across firms
D) occurs when information technology adds value
E) is accurately described by all of these
سؤال
Have you ever purchased a book or CD on Amazon.com and noticed that as soon as you put your selection in the shopping cart, you were offered a series of other items that people who made the same purchase as you did also bought? This would be an example of___________ data mining.

A) sequence
B) association
C) predictive
D) adjacency
E) extrapolative
سؤال
By examining checkout data, supermarkets have learned that people who are buying beer often also buy a bag of salty snacks. The use of data mining led to the discovery of a(n) ___________pattern.

A) sequential
B) affinity
C) predictive
D) adjacency
E) extrapolative
سؤال
Data mining is the___________ .

A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
سؤال
Text and pictures that have been digitized cannot be searched or edited like text and pictures found in word processing software.___________can be used to convert digitized documents into ASCII code that can be edited by word processing software.

A) Electronic bar scanners can be used to convert digitized documents into ASCII code that can be edited by word
B) Optical numerical readers
C) Optical character recognition software
D) Radio frequency analog systems
E) Analog scanners
سؤال
Although firewalls can protect personal computers and network services connected to the corporate network, people away from their offices who interact with their company networks via the Internet face a safety risk. Which of the following technologies has proven to be an inexpensive solution to this problem?

A) safe software for logic (SSL) encryption
B) virtual private networks
C) local area networks
D) firewall reassignment
E) reengineered applets
سؤال
The establishment of___________is an information security procedure that encrypts Internet data at both ends of the transmission process.

A) cookie manipulators
B) virtual private networks
C) cookie managers
D) firewall
E) data insulators
Is an information security procedure that encrypts Internet data at both ends of the
سؤال
Unsupervised data mining can be used to recognize ___________patterns.

A) association, affinity, and sequence
B) association, extrapolative, and predictive
C) affinity, predictive, and adjacency
D) progressive, predictive, and accommodative
E) affinity, sequence, and predictive
سؤال
__________are a hybrid of executive information systems and intranets.

A) Corporate portals
B) Extranets
C) Expert systems
D) Virtual private networks
E) Electronic data interchanges
سؤال
A(n)__________ is a private company network that allows employees to easily access, share, and publish information using Internet software.

A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
سؤال
Which of the following statements about firewalls is true?

A) Firewalls are a way to protect data.
B) Firewalls can be in the form of hardware or software.
C) Firewalls prevent unauthorized use of data.
D) Firewalls sit between the computers in an internal organizational network and outside networks.
E) All of these statements about firewalls are true.
سؤال
Which of the following are included in intranets?

A) Instant messaging
B) Presence awareness
C) Simultaneous access to files for team members
D) Customizable email accounts
E) All of the above
سؤال
Baseball management discovered that its sales increased by almost 100 percent in those seasons when it held an open house prior to the opening game and allowed people to see the box seats and examine the view of the stadium from those seats. In terms of data mining, the management discovered a(n)___________ pattern.

A) affinity
B) sequence
C) association
D) adjacency
E) collaborative
سؤال
Three kinds of information technology are used by executives, managers, and workers inside the company to access and share information. They are__________ .

A) executive information systems, portals, and intranets
B) local area networks, extranets, and management information systems
C) intranets, local area networks, and portals
D) expert systems, decision support system, and virtual private networks
E) Internet-accesses, SSL encryption, and intranets
سؤال
Although firewalls can protect personal computers and network services connected to the corporate network, people away from their offices who interact with their company networks via the Internet face a safety risk. Which of the following technologies has proven to be a viable solution to this problem?

A) safe software for logic (SSL) encryption
B) firewall reengineering
C) secure sockets layer (SSL) encryption
D) secure logistical LAN (SLL) encryption
E) virus protected networks (VPNs)
سؤال
__________allow managers and employees to use a Web browser to gain access to customized company information and to complete specialized transactions.

A) Corporate portals
B) Extranets
C) Expert systems
D) Virtual private networks
E) Electronic data interchanges
سؤال
To properly secure data and data networks, a manager should use all of the following EXCEPT___________ .

A) roadblocks
B) firewalls
C) data encryption
D) antivirus software
E) virtual private networks
سؤال
Data clusters ____.

A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
سؤال
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are ____.

A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
سؤال
The goal of an executive information system (EIS) is to___________ .

A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
سؤال
For the purposes of data mining,___________ patterns are just the opposite of association patterns.

A) sequence
B) adjacency
C) predictive
D) affinity
E) asymmetrical
سؤال
A system that requires employees to scan their thumbprints as they start work is called a(n)___________ .

A) intangible cookies
B) biometrics
C) personal RFID tags
D) individual bar codes
E) optical scanners
سؤال
Which of the following is NOT an example of a security problem that may threaten data and data networks?

A) email snooping
B) phishing
C) keystroke monitoring
D) mob flashing
E) password cracking
سؤال
___________is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users, but no one else.

A) Decryption
B) Roadblocking
C) Data insulation
D) Protecting information
E) Cookie manipulation
سؤال
Which of the following statements about data mining is true?

A) Data mining is the specific process used to match buyers and sellers.
B) Data mining is too expensive for most companies to use at this time.
C) The two forms of data mining are centralized and decentralized.
D) Data mining typically uses data from a data warehouse.
E) All of these statements about data mining are true.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/118
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Section 2: Control
1
Pioneering differential refers to the strategic advantage that companies earn by being the first in an industry to use new information technology to substantially lower costs or to differentiate a product or service from competitors.
False
2
The two activities necessary to properly secure data and data networks are the use of firewalls and antivirus software.
False
3
A data warehouse stores raw data that have been collected from a variety of sources for later use.
False
4
The key to sustaining a competitive advantage is using information technology to continuously improve and support the core functions of a business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
5
Protecting information is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users but no one else.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
6
According to the resource-based view of information technology, sustainable competitive advantage occurs when information technology adds value, is different across firms, and is difficult to create or acquire.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
7
Moore's law accounts for the rapid increase in power and reduction in both size and price of computer equipment over the past 35 years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
8
The first airline that used technology to allow passengers to buy their plane tickets and reserve their seats online had a first-mover advantage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
9
Information has strategic importance for organizations because it can be used to obtain first-mover advantage and to sustain a competitive advantage once it has been created.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
10
The first company to gain first-mover advantage typically benefits from higher profits and larger market share.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
11
The two basic methods of capturing information are continuous and periodic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
12
The term data mining refers to the process of discovering unknown patterns and relationships in large amounts of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
13
Data mining typically splits a data set in half, finds patterns in one half, and then tests the validity of those patterns by trying to find them again in the second half of the data set.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
14
The primary difference between raw data and information is meaning to the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
15
Association patterns are also called sequence patterns.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
16
Raw data contain useful information that communicate a clear and readily understandable message to the person for which the data were gathered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
17
Unsupervised data mining is unethical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
18
In today's hypercompetitive business environments, capital (i.e., money) is still more important than information for business success.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
19
Bar codes and document scanners are common methods of electronically capturing data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
20
Moore's law refers to the prediction that the cost of computing will drop by 50 percent every 2 years as computer- processing power doubles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
21
According to_____ , the cost of computing will drop by 50 percent as computer-processing power doubles every 18months.

A) Moore's law
B) Gordon's law
C) the Peter principle
D) the rule of e-commerce
E) Gresham's Law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
22
Data encryption transforms data into complex, scrambled digital codes that can only be unencrypted by authorized users who possess unique decryption keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
23
Most expert systems work by using a collection of "if-then" rules to sort through information and recommend a course of action.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
24
A table showing the order frequencies as well as the average dollar value of the orders of different segments of a catalog retailer's market would be an example of___________ .

A) an MIS
B) perceived knowledge
C) raw data
D) information
E) influential knowledge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
25
The first company to use new information technology to substantially lower costs or differentiate products or services often gains ___________.

A) first-mover advantage
B) lower profits
C) less market adaptability
D) increased synergy
E) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
26
Understanding that consumers wanted clean, convenient food when they were away from home was the information the first fast food restaurant founder used to___________ .

A) acquire a source of perceived knowledge
B) create a tactical advantage
C) create a first-mover advantage
D) pioneer sales in the consumer food industry
E) sustain a competitive advantage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
27
Why is information strategically important for organizations?

A) Information can be used to obtain first-mover advantage.
B) Information is derived from perceived knowledge, which limits its availability.
C) Information cannot be used as a medium of exchange.
D) Information creates suboptimization opportunities.
E) All of these are examples of why information is strategically important for organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
28
Pages listing all of the felony crimes perpetrated in a given city during the last decade would be an example of ____.

A) a resource allocation table
B) traditional knowledge
C) raw data
D) perceived knowledge
E) information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
29
The key to sustaining competitive advantage is___________ .

A) faster computers with more memory
B) using information technology to continuously improve and support the core functions of a business
C) the Internet
D) the ability of the managers to delegate
E) how important the company's culture perceives conceptual skills
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
30
Virtual private networks (VPN) and secure sockets layer (SSL) encryption perform basically the same function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is one of the critical issues companies need to address in order to sustain a competitive advantage through information technology?

A) Who will have access to the information technology?
B) Will the purchase of the information technology be viewed as an expense or as an investment?
C) Does the firm's use of the information technology violate any ethical standards?
D) Is the firm's use of information technology difficult for another company to create or buy?
E) What government regulations may influence the company's use of information technology?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
32
Intranets are private company networks that allow employees to easily access, share, and publish information using Internet software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
33
Electronic data interchange, or EDI, is the direct electronic transmission of purchase and ordering information from one company's computer system to another company's computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
34
Data mining often reveals data clusters where three or more database elements occur together.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
35
It is important to understand that DSS programs should not replace managerial decision making.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
36
Extranets are used to handle organizational transactions with suppliers and distributors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
37
Electronic data interchange (EDI), extranets, and the Internet have proven to provide such a competitive advantage that managers are scrambling to find ways to use them in their own companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
38
The term___________ refers to facts and figures that are in an unusable form.

A) nonspecific information
B) processed data
C) raw data
D) perceived knowledge
E) relevant information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
39
Data and information are the same as knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
40
Three major types of information technology are used by executives, managers, and workers inside the company to access and share information. They are executive information systems, intranets, and corporate portals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
41
The three methods of tracing products through a distribution system are paper records, bar codes, and radio frequency identification tags. Which of the following statements about the tracing of products is true?

A) RFID tags need direct line-of-sight scanning.
B) Bar codes would be the easiest and most economical method to use.
C) Until technological improvements are made, paper records are the best way to trace recalled products.
D) RFID tags are most efficient because they can be read by a radio that has been tuned to a specific
frequency.
E) Bar codes are the most efficient because they make use of optical character recognition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
42
Unsupervised data mining is particularly good at identifying___________ .

A) association or affinity patterns
B) sequence patterns
C) predictive patterns
D) data clusters
E) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
43
Using ___________data mining, the user usually begins by telling the data mining software to look and test for specific patterns and relationships in a data set.

A) supervised
B) specific
C) comprehensive
D) unsupervised
E) homogenous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
44
The two basic methods of capturing information are ___________.

A) systematic and unsystematic
B) planned and unplanned
C) continuous and intermittent
D) functional and hierarchical
E) manual and electronic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
45
The data used in data mining typically come from___________ that store huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy.

A) Internet databases
B) competitive intelligence sources
C) data warehouses
D) data extractions
E) information clearinghouses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
46
By examining checkout data, supermarkets have learned that people who are buying beer typically also buy a bag of salty snacks. As a result of this finding from___________ , supermarkets often place displays of beer near the chips and pretzel aisle.

A) optical scanning
B) electronic data interchange
C) bar coding
D) data mining
E) data warehousing
, supermarkets often place displays of beer near the chips and
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
47
When Billy Ingram founded White Castle, much of the public thought that hamburgers were made from rotten beef and not fit for human consumption. Ingram ground fresh beef in front of customers to prove it was safe and was the first to successfully sell hamburgers to the middle class. Today Ingram is credited as the founder of the fast- food industry. Yet, today White Castle has 330 locations, and McDonald's has 25,000 stores. From this information, you know___________ .

A) tactics are more influential than strategies
B) the competitive advantage White Castle achieved from being first was not sustainable
C) White Castle lost its pioneering differential
D) product diffusion rates were slow
E) none of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
48
Using ___________data mining, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set.

A) supervised
B) specific
C) comprehensive
D) heterogeneous
E) unsupervised
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
49
___________occur in data mining when two or more database elements occur together in a significant pattern, with one of the elements preceding the other.

A) Data clusters
B) Affinity patterns
C) Association patterns
D) Sequence patterns
E) Logic clusters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
50
Because they are inexpensive and easy to use, ___________, which convert printed text and pictures into digital images, have become an increasingly popular method for capturing data electronically.

A) electronic data interchanges
B) electronic scanners
C) radio frequency information digitizers (RFIDs)
D) data digitalization
E) bar coding devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
51
The two major types of data mining are___________ .

A) supervised and unsupervised
B) random and sequence
C) affinity and association
D) sequence and affinity
E) ASCII and digital
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
52
___________is the process of discovering unknown patterns and relationships in large amounts of data.

A) Information keystoning
B) Data mining
C) Data warehousing
D) Data outsourcing
E) Patterning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
53
The manual capture of information is___________ .

A) slow
B) expensive
C) labor-intensive
D) often inaccurate
E) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
54
The Food and Drug Administration (FDA) could use data it has collected from millions of suspected drug-related adverse event reports and other electronic medical information to identify a pattern of adverse drug events in a specific population. This data collected by the FDA would be held in a(n)___________ .

A) Internet database
B) competitive intelligence source
C) data warehouse
D) data extraction
E) information clearinghouse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
55
In the process of capturing information, ASCII text is generated by___________ .

A) bar codes
B) electronic scanners
C) optical character recognition software
D) e-tools
E) data mining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
56
According to the resource-based view of information technology, sustainable competitive advantage .

A) is difficult to create or acquire
B) can be created by using information technology to continuously improve and support the core functions of a business
C) differs across firms
D) occurs when information technology adds value
E) is accurately described by all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
57
Have you ever purchased a book or CD on Amazon.com and noticed that as soon as you put your selection in the shopping cart, you were offered a series of other items that people who made the same purchase as you did also bought? This would be an example of___________ data mining.

A) sequence
B) association
C) predictive
D) adjacency
E) extrapolative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
58
By examining checkout data, supermarkets have learned that people who are buying beer often also buy a bag of salty snacks. The use of data mining led to the discovery of a(n) ___________pattern.

A) sequential
B) affinity
C) predictive
D) adjacency
E) extrapolative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
59
Data mining is the___________ .

A) automated, electronic capture of data
B) process of hypothesis testing in large databases
C) process of verifying known relationships in large amounts of data
D) process of discovering unknown patterns and relationships in large amounts of data
E) method used to identify and eliminate perishable data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
60
Text and pictures that have been digitized cannot be searched or edited like text and pictures found in word processing software.___________can be used to convert digitized documents into ASCII code that can be edited by word processing software.

A) Electronic bar scanners can be used to convert digitized documents into ASCII code that can be edited by word
B) Optical numerical readers
C) Optical character recognition software
D) Radio frequency analog systems
E) Analog scanners
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
61
Although firewalls can protect personal computers and network services connected to the corporate network, people away from their offices who interact with their company networks via the Internet face a safety risk. Which of the following technologies has proven to be an inexpensive solution to this problem?

A) safe software for logic (SSL) encryption
B) virtual private networks
C) local area networks
D) firewall reassignment
E) reengineered applets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
62
The establishment of___________is an information security procedure that encrypts Internet data at both ends of the transmission process.

A) cookie manipulators
B) virtual private networks
C) cookie managers
D) firewall
E) data insulators
Is an information security procedure that encrypts Internet data at both ends of the
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
63
Unsupervised data mining can be used to recognize ___________patterns.

A) association, affinity, and sequence
B) association, extrapolative, and predictive
C) affinity, predictive, and adjacency
D) progressive, predictive, and accommodative
E) affinity, sequence, and predictive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
64
__________are a hybrid of executive information systems and intranets.

A) Corporate portals
B) Extranets
C) Expert systems
D) Virtual private networks
E) Electronic data interchanges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
65
A(n)__________ is a private company network that allows employees to easily access, share, and publish information using Internet software.

A) LAN portal
B) private company network (PCN)
C) intranet
D) electronic data sharing system
E) information network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which of the following statements about firewalls is true?

A) Firewalls are a way to protect data.
B) Firewalls can be in the form of hardware or software.
C) Firewalls prevent unauthorized use of data.
D) Firewalls sit between the computers in an internal organizational network and outside networks.
E) All of these statements about firewalls are true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following are included in intranets?

A) Instant messaging
B) Presence awareness
C) Simultaneous access to files for team members
D) Customizable email accounts
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
68
Baseball management discovered that its sales increased by almost 100 percent in those seasons when it held an open house prior to the opening game and allowed people to see the box seats and examine the view of the stadium from those seats. In terms of data mining, the management discovered a(n)___________ pattern.

A) affinity
B) sequence
C) association
D) adjacency
E) collaborative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
69
Three kinds of information technology are used by executives, managers, and workers inside the company to access and share information. They are__________ .

A) executive information systems, portals, and intranets
B) local area networks, extranets, and management information systems
C) intranets, local area networks, and portals
D) expert systems, decision support system, and virtual private networks
E) Internet-accesses, SSL encryption, and intranets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
70
Although firewalls can protect personal computers and network services connected to the corporate network, people away from their offices who interact with their company networks via the Internet face a safety risk. Which of the following technologies has proven to be a viable solution to this problem?

A) safe software for logic (SSL) encryption
B) firewall reengineering
C) secure sockets layer (SSL) encryption
D) secure logistical LAN (SLL) encryption
E) virus protected networks (VPNs)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
71
__________allow managers and employees to use a Web browser to gain access to customized company information and to complete specialized transactions.

A) Corporate portals
B) Extranets
C) Expert systems
D) Virtual private networks
E) Electronic data interchanges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
72
To properly secure data and data networks, a manager should use all of the following EXCEPT___________ .

A) roadblocks
B) firewalls
C) data encryption
D) antivirus software
E) virtual private networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
73
Data clusters ____.

A) result from the use of internal data mining
B) are a statistical technique used for trend analysis
C) are used to create samples for statistical analyses
D) occur when three or more database elements occur together in a significant way
E) are accurately described by all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
74
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are ____.

A) authentication and authorization
B) authorization and empowerment
C) delegation and empowerment
D) encryption and empowerment
E) authentication and encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
75
The goal of an executive information system (EIS) is to___________ .

A) replace the need for intuition in decision making
B) create a link among authorized data and network users
C) protect organizational data from hackers
D) provide accurate, complete, relevant, and timely information to managers
E) do none of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
76
For the purposes of data mining,___________ patterns are just the opposite of association patterns.

A) sequence
B) adjacency
C) predictive
D) affinity
E) asymmetrical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
77
A system that requires employees to scan their thumbprints as they start work is called a(n)___________ .

A) intangible cookies
B) biometrics
C) personal RFID tags
D) individual bar codes
E) optical scanners
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following is NOT an example of a security problem that may threaten data and data networks?

A) email snooping
B) phishing
C) keystroke monitoring
D) mob flashing
E) password cracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
79
___________is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users, but no one else.

A) Decryption
B) Roadblocking
C) Data insulation
D) Protecting information
E) Cookie manipulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following statements about data mining is true?

A) Data mining is the specific process used to match buyers and sellers.
B) Data mining is too expensive for most companies to use at this time.
C) The two forms of data mining are centralized and decentralized.
D) Data mining typically uses data from a data warehouse.
E) All of these statements about data mining are true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 118 في هذه المجموعة.