Deck 17: Managing Information
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/115
العب
ملء الشاشة (f)
Deck 17: Managing Information
1
Rectang Corp., an e-commerce firm, recently adopted a new supply chain management system. By virtue of the new system, the company is able to deliver products to customers in a shorter period of time than other e-commerce companies. The supply chain management system may become outdated in the near future; however, it has presently led Rectang Corp. to becoming the industry leader. In the given scenario, Rectang Corp. has achieved _____.
A) first-mover advantage
B) competitive inertia
C) quality assurance
D) vertical integration
A) first-mover advantage
B) competitive inertia
C) quality assurance
D) vertical integration
A
2
TEFCO, a computer processor manufacturing company, recently adopted a new fabrication process to manufacture microprocessors. The microprocessors made using this new process have higher computing power and clock speed than other processors available in the market. Although the new process has made TEFCO the industry leader, there is a threat that competitors will be able to match this feat in the near future. It is evident that TEFCO has achieved _____.
A) competitive inertia
B) vertical integration
C) first-mover advantage
D) quality assurance
A) competitive inertia
B) vertical integration
C) first-mover advantage
D) quality assurance
C
3
A firm can establish a sustainable competitive advantage over competitors if:
A) the firm has access to the same information technology as its competitors.
B) the firm focuses solely on productivity rather than quality and service.
C) the firm uses information technology to continuously improve the core functions of its business.
D) there is a high potential for competing firms to create or buy the firm's information technology.
A) the firm has access to the same information technology as its competitors.
B) the firm focuses solely on productivity rather than quality and service.
C) the firm uses information technology to continuously improve the core functions of its business.
D) there is a high potential for competing firms to create or buy the firm's information technology.
C
4
Zuze, an information technology firm, recently developed a data compression system. By virtue of this system, the company can compress and store more data in its cloud than any of its competitors, without affecting the quality of the data. Although the data compression system can be acquired by other companies in the future, it has presently enabled Zuze to compress and store its data in a more economical manner than its competitors. It is evident that Zuze has achieved _____.
A) competitive inertia
B) organizational agility
C) vertical integration
D) first-mover advantage
A) competitive inertia
B) organizational agility
C) vertical integration
D) first-mover advantage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
5
One-Stop, a national bank, conducted a survey on how long a customer usually has to wait at its bank. According to the survey, on an average, customers waited five to ten minutes in the queue to deposit their cash into a deposit machine. Based on the survey results, the bank decided to add five more deposit machines. A month later, the management realized that the bank had more machines than it required. Which of the following is most likely the reason for the bank to add more machines than required?
A) The information provided by the survey was incomplete.
B) The information provided by the survey was irrelevant.
C) The information provided by the survey was inaccurate.
D) The information provided by the survey was inestimable.
A) The information provided by the survey was incomplete.
B) The information provided by the survey was irrelevant.
C) The information provided by the survey was inaccurate.
D) The information provided by the survey was inestimable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
6
Identify a difference between raw data and information.
A) Unlike information, raw data mean the same as knowledge.
B) Unlike raw data, information consists of facts and figures.
C) Unlike information, raw data can influence someone's choices and behavior.
D) Unlike raw data, information has context.
A) Unlike information, raw data mean the same as knowledge.
B) Unlike raw data, information consists of facts and figures.
C) Unlike information, raw data can influence someone's choices and behavior.
D) Unlike raw data, information has context.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
7
Brenda bought an automatic vegetable chopper from a local retail store. After a month of use, the vegetable chopper stopped working. She sent an email to the customer service department of the store describing the details of the problem. The store sent a technician to Brenda's house the next day to address the issue. The technician realized that the repair tool that he brought with him was not compatible with the vegetable chopper. On examining the appliance, the technician discovered that the model number of the vegetable chopper was different from what was stated in the complaint email sent by Brenda. In this scenario, it is likely that:
A) the information provided by Brenda was untimely.
B) the information provided by Brenda was irrelevant.
C) the information provided by Brenda was inaccurate.
D) the information provided by Brenda was incomplete.
A) the information provided by Brenda was untimely.
B) the information provided by Brenda was irrelevant.
C) the information provided by Brenda was inaccurate.
D) the information provided by Brenda was incomplete.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is a characteristic of information?
A) It solely contains facts and figures.
B) It is useful even when it is inaccurate.
C) It has context.
D) It is cheap to retrieve after a company has it.
A) It solely contains facts and figures.
B) It is useful even when it is inaccurate.
C) It has context.
D) It is cheap to retrieve after a company has it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
9
Kanska, an application development firm, received a contract to develop a mobile application for a company. The brief mentioned that the application should enable employees to share up to 30 files at a time from anywhere within the company. After delivering the application, the client informed Kanska that its employees were not able to share more than 20 files at a time. After analyzing the situation, Kanska replied that the application could only transfer files with a total size of up to 2 gigabytes. The application was built with regard to the number of files that can be sent and not built according to the size of each file. In this scenario, it is likely that the client faced the issues with the application because the information it provided to Kanska was _____.
A) untimely
B) irrelevant
C) incomplete
D) inaccurate
A) untimely
B) irrelevant
C) incomplete
D) inaccurate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
10
Estelle Inc., a manufacturer of stationery products, decides to supply free stationery box sets to all the school children in the town of Belwick. The company asks the local authorities to provide information about the total number of school children in the town. However, during the delivery of the boxes, Estelle Inc. realizes that it is short of approximately 100 boxes. If Estelle Inc. manufactured the exact number of boxes based on the information given by the local authorities, it can be concluded that the information was _____.
A) inaccurate
B) incomplete
C) irrelevant
D) untimely
A) inaccurate
B) incomplete
C) irrelevant
D) untimely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
11
Unidice, an information technology firm, recently installed a new data system that provides seamless access to data. This data system has a higher storage capacity and processing speed than other data systems available in the market. Although the data system can be acquired by other companies in the future, it has presently enabled Unidice to process its data faster and in a more economical manner than its competitors. It is evident that Unidice has achieved _____.
A) competitive inertia
B) first-mover advantage
C) vertical integration
D) quality assurance
A) competitive inertia
B) first-mover advantage
C) vertical integration
D) quality assurance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
12
TimTam Steel, a steel manufacturing company, recently adopted a new supply chain management system. By virtue of the new system, the company is able to acquire raw materials from suppliers in a shorter period of time than its competitors. The supply chain management system may become outdated in the near future; however, it has presently drastically reduced costs associated with material procurement for TimTam Steel. In the given scenario, TimTam Steel has achieved _____.
A) first-mover advantage
B) competitive inertia
C) vertical integration
D) quality assurance
A) first-mover advantage
B) competitive inertia
C) vertical integration
D) quality assurance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
13
Adam ordered a 15.6" laptop from an e-commerce website. After the delivery of the laptop, Adam discovered that the laptop didn't have the same specifications as mentioned in the website. Adam asked for a refund, and the e-commerce company had to bear all the shipping charges. In this scenario, the e-commerce company incurred losses because the information provided on the website was _____.
A) inaccurate
B) irrelevant
C) untimely
D) incomplete
A) inaccurate
B) irrelevant
C) untimely
D) incomplete
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
14
Verdure Westerns, a retailer, recently employed a unique data management system that automatically transfers order information to the relevant vendor. Unlike its competitors, this system enables the company to smoothly convey information without any manual effort, thereby reducing the labor costs of the company. By employing this new data management system, Verdure Westerns has most likely achieved _____.
A) competitive inertia
B) strategic dissonance
C) first-mover advantage
D) second-mover advantage
A) competitive inertia
B) strategic dissonance
C) first-mover advantage
D) second-mover advantage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
15
Colbert Solutions, an electronic equipment manufacturer, recently manufactured a new digital soil moisture meter for the farmers in Lucitona. The equipment measures the moisture content in soil and also states the amount of water that needs to be added to the soil. After collecting the readings from the equipment, the farmers added the exact amount of water indicated by the meter; however, this led to waterlogging-saturation of soil with water. It can be concluded that the information provided by the digital soil moisture meter was _____.
A) incomplete
B) inaccurate
C) irrelevant
D) untimely
A) incomplete
B) inaccurate
C) irrelevant
D) untimely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is one of the three critical questions that a firm needs to address to sustain a competitive advantage through information technology?
A) Is the information technology simple enough for the firm's workers to adapt to it?
B) Is it easy to integrate the new information technology with the technology already being used by the firm?
C) Is it difficult for another company to create or buy the information technology used by the firm?
D) Is the company using ethical procedures to implement the information technology?
A) Is the information technology simple enough for the firm's workers to adapt to it?
B) Is it easy to integrate the new information technology with the technology already being used by the firm?
C) Is it difficult for another company to create or buy the information technology used by the firm?
D) Is the company using ethical procedures to implement the information technology?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
17
The term _____ refers to facts and figures that are useless unless they have meaning.
A) variable
B) knowledge
C) raw data
D) census data
A) variable
B) knowledge
C) raw data
D) census data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
18
InfoQEN received an order to supply Wi-Fi routers for a company. The brief mentioned that the router should connect up to 10 devices simultaneously. After delivery, the client informed InfoQEN that the devices were not connecting to the router. After analyzing the situation, InfoQEN replied that the router could cover devices only up to a range of 10 meters. The router that was supplied was built with regard to the number of devices to be connected and not built considering the possible distance between the devices and the router (in accordance with the client's wishes). In this scenario, the most likely reason for the client's problem is:
A) untimely information provided to InfoQEN.
B) irrelevant information provided to InfoQEN.
C) incomplete information provided to InfoQEN.
D) inestimable information provided to InfoQEN.
A) untimely information provided to InfoQEN.
B) irrelevant information provided to InfoQEN.
C) incomplete information provided to InfoQEN.
D) inestimable information provided to InfoQEN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
19
Charlie's Haven, a retail store, conducted a survey on how long a customer waits in a billing queue. Based on the results of the survey, the company decided to add more number of employees in the billing counters. While checking out of its store, Charlie's Haven asked all its customers to fill a form stating the time they spent standing in the queue. All customers reported that they waited for two, five, or ten minutes. About 90 percent of the customers reported that they waited for ten minutes. Based on the results, Charlie's Haven added five cash counters to its existing 20 cash counters. After a month, the management realized that the store had more cash counters and employees than required. Which of the following is most likely the reason for the loss incurred due to overemployment in the store?
A) The information provided in the survey was inaccurate.
B) The information provided in the survey was irrelevant.
C) The information provided in the survey was incomplete.
D) The information provided in the survey was inestimable.
A) The information provided in the survey was inaccurate.
B) The information provided in the survey was irrelevant.
C) The information provided in the survey was incomplete.
D) The information provided in the survey was inestimable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
20
_____ is the prediction that about every two years, computer processing power would double and its cost would drop by 50 percent.
A) Moore's law
B) Amdahl's law
C) Metcalfe's law
D) Haitz's law
A) Moore's law
B) Amdahl's law
C) Metcalfe's law
D) Haitz's law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
21
Accel Techs, an information technology firm, recently invested $50 million to construct a data center to keep all its data securely. In this scenario, the cost incurred by Accel Techs is an example of _____.
A) acquisition cost
B) storage cost
C) processing cost
D) retrieval cost
A) acquisition cost
B) storage cost
C) processing cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
22
Gamaz, a video games developer, collects data regarding consumer purchase behaviors, consumer preferences, and product searches. It provides these data to ASZ Analytics. Gamaz pays $100,000 per transaction to ASZ Analytics in exchange for complete information regarding market analytics and sales trends based on the data provided by Gamaz. In the given scenario, Gamaz incurs _____.
A) processing cost
B) retrieval cost
C) acquisition cost
D) communication cost
A) processing cost
B) retrieval cost
C) acquisition cost
D) communication cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
23
Windsor Corp., a technology firm, has an internal search engine that helps employees find answers to queries. The search engine provides results depending on the preferences of the employees. These preferences are automatically learned as the employees continue to use the search engine. The search engine is maintained by an expensive data management system. The company allocates half its budget for the maintenance of the data management system. In this scenario, the cost incurred by Windsor Corp. is an example of _____.
A) processing cost
B) retrieval cost
C) acquisition cost
D) communication cost
A) processing cost
B) retrieval cost
C) acquisition cost
D) communication cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
24
A group of investigators are investigating a recent airplane crash in Lucitona. The investigators discovered debris of the aircraft, which provided them the information regarding the nature of the plane crash. But because the flight data recorder (a device that preserves the recent history of the flight) of the airplane was completely destroyed in the crash, the investigators were unable to determine what exactly went wrong. The absence of the flight data recorder led the investigators to call off the investigation. It can be concluded that the investigation was called off because:
A) the information at disposal was inaccurate.
B) the information at disposal was incomplete.
C) the information at disposal was irrelevant.
D) the information at disposal was untimely.
A) the information at disposal was inaccurate.
B) the information at disposal was incomplete.
C) the information at disposal was irrelevant.
D) the information at disposal was untimely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
25
ZitFi, a Wi-Fi router manufacturing company, recently received an order for 15 Wi-Fi routers. The client wanted each router to be able to connect to 10 devices. Although the brief mentioned almost all the specifications of the required router, ZitFi was not able to start the manufacturing process because the client did not provide any specifications regarding the range of each router. It is likely that ZitFi faced this issue because the information provided by the client was _____.
A) inaccurate
B) incomplete
C) irrelevant
D) inestimable
A) inaccurate
B) incomplete
C) irrelevant
D) inestimable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
26
Smooth Tide, a surfboard manufacturer, recently received an order to manufacture 30 identical surfboards made of aluminum alloy. During the course of the project, Smooth Tide received a brief to make 14 of the surfboards using aluminum alloy and the rest using carbon fiber. Although the brief from the client was sent before Smooth Tides could start working on the project, the delivery was made after a two week delay. Since Smooth Tide had almost finished the production of the base of the surfboards using aluminum alloy, modifying the order was not feasible. The reason behind this problem is the _____ information provided by the client to Smooth Tide.
A) untimely
B) irrelevant
C) inestimable
D) incomplete
A) untimely
B) irrelevant
C) inestimable
D) incomplete
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
27
To manage its inventories efficiently, KC Mart, a supermarket, enters into a five-year contract with Ziff Corp., an information technology firm. As per the contract, KC Mart has to pay $125,000 per year to Ziff Corp. in exchange for the information regarding consumer purchase behaviors. In the given scenario, the cost that KC Mart has to incur is the _____.
A) processing cost
B) acquisition cost
C) retrieval cost
D) storage cost
A) processing cost
B) acquisition cost
C) retrieval cost
D) storage cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
28
Innove Tech is a technological firm that wants to build a global service delivery system. It has consulted a larger firm, Ziff Corp., to obtain the proven technology required to establish this system. In the context of the costs of useful information, Innove Tech has incurred _____.
A) processing cost
B) retrieval cost
C) acquisition cost
D) storage cost
A) processing cost
B) retrieval cost
C) acquisition cost
D) storage cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
29
Dextron Customs, a custom automobile shop, received an order for a customized motorcycle. The client specified that it needed a motorcycle with an 800 cc engine that delivered at least 70 PS power. Since the client did not provide details about the number of cylinders required in the engine, Dextron Customs chose to include a two-cylinder engine. Although the motorcycle was made as per the specifications provided by the client, the client was not satisfied because it featured a two-cylinder engine instead of a four-cylinder engine. In this scenario, the most likely reason for the client's dissatisfaction with the product is that the:
A) information provided to Dextron Customs was incomplete.
B) information provided to Dextron Customs was irrelevant.
C) information provided to Dextron Customs was inestimable.
D) information provided to Dextron Customs was inaccurate.
A) information provided to Dextron Customs was incomplete.
B) information provided to Dextron Customs was irrelevant.
C) information provided to Dextron Customs was inestimable.
D) information provided to Dextron Customs was inaccurate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
30
Skoot, an e-commerce startup company, recently paid $300,000 to Widget Corp., a company that provides Internet services and products including cloud computing and online searches, to gain access to the data regarding online product searches. In the context of the costs of useful information, it can be concluded that Skoot incurred _____.
A) processing cost
B) retrieval cost
C) storage cost
D) acquisition cost
A) processing cost
B) retrieval cost
C) storage cost
D) acquisition cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
31
Lailey Tech, a global customer service provider, spent $250 million on a new data center to keep its data safe at a single location. In this scenario, the cost that Lailey Tech incurred is an example of _____.
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
32
Powell Motors, an automobile manufacturing company, spent $30 million to purchase new servers to archive all its data safely. In this scenario, the cost incurred by Powell Motors is an example of _____.
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
33
Cameron Mart conducted a survey to determine the number of shopping baskets required for its supermarket to function in a smooth manner. The survey required customers to provide data regarding their most frequently purchased items, the quality of service provided by the supermarket's staff, and the ambience of the supermarket. However, Cameron Mart failed to determine the number of shopping baskets required on a daily basis. This is because the information provided in the survey was _____.
A) inestimable
B) inaccurate
C) irrelevant
D) untimely
A) inestimable
B) inaccurate
C) irrelevant
D) untimely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following statements defines storage cost?
A) It is the cost of obtaining data that an organization does not have.
B) It is the cost of transforming raw data into meaningful information.
C) It is the cost of physically or electronically archiving information for later use.
D) It is the cost of transmitting information from one place to another.
A) It is the cost of obtaining data that an organization does not have.
B) It is the cost of transforming raw data into meaningful information.
C) It is the cost of physically or electronically archiving information for later use.
D) It is the cost of transmitting information from one place to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
35
Cold Stone, a floor tile manufacturing company, pays $100,000 per year to a real estate firm to obtain information regarding construction companies (potential clients) with new and upcoming projects. In the context of the costs of useful information, it can be concluded that Cold Stone incurs _____.
A) processing cost
B) acquisition cost
C) retrieval cost
D) storage cost
A) processing cost
B) acquisition cost
C) retrieval cost
D) storage cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
36
Fuine Corp., a multinational corporation, has spent $1 billion on a new data center that allows the firm to manage and transform raw data into useful information at a very fast speed. This enables the smooth functioning of the firm's operations. In this case, the cost that Fuine Corp. has incurred is an example of _____.
A) processing cost
B) retrieval cost
C) acquisition cost
D) communication cost
A) processing cost
B) retrieval cost
C) acquisition cost
D) communication cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
37
Allied Corp., a multinational corporation, has spent $500 million on a new data center that allows the firm to transform raw data into useful information at a very high speed. This enables the smooth functioning of the firm's operations. In this case, the cost that Allied Corp. has incurred is an example of _____.
A) retrieval cost
B) processing cost
C) acquisition cost
D) communication cost
A) retrieval cost
B) processing cost
C) acquisition cost
D) communication cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
38
Alex Timbers, a wood supplier, receives an order of 10 wooden logs from a furniture manufacturing company. The client brief mentioned that the logs should be made of teak wood and be identically sized. After receiving the consignment, the quality specialist of the furniture manufacturing company observed that the logs were too big to be used for building furniture. In this scenario, it is likely that the information provided by the furniture manufacturing company to Alex Timbers was _____.
A) untimely
B) irrelevant
C) inaccurate
D) incomplete
A) untimely
B) irrelevant
C) inaccurate
D) incomplete
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
39
Kamara Jobs, a recruitment company, decides to launch its own global online application. It pays $200,000 to obtain the proven technology required to launch this application from an information technology firm. In the context of the costs of useful information, Kamara Jobs has incurred _____.
A) processing cost
B) retrieval cost
C) acquisition cost
D) storage cost
A) processing cost
B) retrieval cost
C) acquisition cost
D) storage cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
40
Prodeff, an online project management software, is available at a price of $1 per use. The software requires the user to enter the initiation date, the number of resources, the time allotted to each resource, the cost per resource, and the number of tasks in the project. Based on the input provided by the user, the software determines the duration of the task and the total cost of the project. In this scenario, the cost incurred by users while using Prodeff is the _____.
A) communication cost
B) retrieval cost
C) acquisition cost
D) processing cost
A) communication cost
B) retrieval cost
C) acquisition cost
D) processing cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following statements is true of radio frequency identification (RFID) tags?
A) They represent numerical data of a product by varying the thickness and pattern of vertical bars printed on the product's packaging.
B) They require direct line-of-sight scanning for the radio waves to scan a product perfectly.
C) They require a reader that tunes into a specific frequency to determine the number and location of products.
D) They are installed in a handheld or pen-type scanner that reads and records data instantly.
A) They represent numerical data of a product by varying the thickness and pattern of vertical bars printed on the product's packaging.
B) They require direct line-of-sight scanning for the radio waves to scan a product perfectly.
C) They require a reader that tunes into a specific frequency to determine the number and location of products.
D) They are installed in a handheld or pen-type scanner that reads and records data instantly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
42
Richard wants to share his hand-written class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email?
A) An electronic scanner
B) A digital printing software
C) A radio frequency identification tag
D) A bar coding device
A) An electronic scanner
B) A digital printing software
C) A radio frequency identification tag
D) A bar coding device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
43
Omaco, a technological firm, recently invested $20 million to design a data system that can access the already-stored information in the company servers at a higher speed than previous data systems. In this scenario, the money invested in the data system can be considered to be_____.
A) acquisition cost
B) processing cost
C) retrieval cost
D) storage cost
A) acquisition cost
B) processing cost
C) retrieval cost
D) storage cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
44
Unlike radio frequency identification (RFID) tags, bar codes:
A) require a reader that tunes into a specific frequency to determine the location of products.
B) increase data entry errors by 75 percent.
C) require direct line-of-sight scanning.
D) cannot be read using a handheld or pen-type scanner that reads and records data instantly.
A) require a reader that tunes into a specific frequency to determine the location of products.
B) increase data entry errors by 75 percent.
C) require direct line-of-sight scanning.
D) cannot be read using a handheld or pen-type scanner that reads and records data instantly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
45
Magnet Dot, a printer manufacturing company, set up a website to enable its customers to place orders online. It also set up an intranet website to enable its employees to convey order and shipping information to the relevant departments within the firm. However, to ensure an effective and smooth exchange of information, Magnet Dot has to pay $100,000 annually for fast Internet access. In this scenario, the cost that Magnet Dot incurs is an example of _____.
A) acquisition cost
B) processing cost
C) retrieval cost
D) communication cost
A) acquisition cost
B) processing cost
C) retrieval cost
D) communication cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
46
Oreva, a multinational corporation, pays $100,000 per year to an information technology firm to archive and secure all of its data into the information technology firm's cloud platform. In this scenario, the cost incurred by Oreva is an example of _____.
A) storage cost
B) processing cost
C) acquisition cost
D) retrieval cost
A) storage cost
B) processing cost
C) acquisition cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
47
In the context of capturing information, _____ represent numerical data by varying the thickness and pattern ofvertical lines.
A) radio frequency identification tags
B) bar codes
C) Morse codes
D) optical character recognition tags
A) radio frequency identification tags
B) bar codes
C) Morse codes
D) optical character recognition tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is a difference between manual capture of information and electronic capture of information?
A) Manual capture of information is a slow process, whereas electronic capture records information at high speed.
B) Manual capture of information is an inexpensive way to collect information, whereas electronic capture of information results in huge costs.
C) Manual capture of information is a labor-intensive, often accurate process, whereas electronic capture of information is an automated, often inaccurate process.
D) Manual capture of information involves the use of radio frequency identification tags, whereas electronic capture of information involves the use of bar codes.
A) Manual capture of information is a slow process, whereas electronic capture records information at high speed.
B) Manual capture of information is an inexpensive way to collect information, whereas electronic capture of information results in huge costs.
C) Manual capture of information is a labor-intensive, often accurate process, whereas electronic capture of information is an automated, often inaccurate process.
D) Manual capture of information involves the use of radio frequency identification tags, whereas electronic capture of information involves the use of bar codes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
49
A(n) _____ converts printed text and pictures into digital images.
A) bar code reader
B) electronic scanner
C) autonomous recording unit
D) perceptual filter
A) bar code reader
B) electronic scanner
C) autonomous recording unit
D) perceptual filter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
50
_____ can be used to convert digitized documents into ASCII(American Standard Code for Information Interchange) text that can be searched, read, and edited with standard word processing, email, desktop publishing, database management, and spreadsheet software.
A) Proximity cards
B) Radio frequency analog software
C) Optical character recognition software
D) Neural machine translation technology
A) Proximity cards
B) Radio frequency analog software
C) Optical character recognition software
D) Neural machine translation technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
51
Cosmo Techno, a new technology firm, invested $50,000 to obtain high-speed Internet services for fast and efficient transmission of information across its branches. In this scenario, the investment cost incurred by Cosmo Techno is an example of _____.
A) storage cost
B) processing cost
C) communication cost
D) retrieval cost
A) storage cost
B) processing cost
C) communication cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
52
Magnira Corp., a small-scale e-learning firm, recently bought a three-year license of a cloud-based software. The software provides email services and social networking services on a secure platform. In this scenario, it is evident that Magnira Corp. has incurred _____.
A) communication cost
B) acquisition cost
C) processing cost
D) retrieval cost
A) communication cost
B) acquisition cost
C) processing cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
53
Bramo Courier Services has set up an extranet website to enable its customers to place orders directly. It has also set up an intranet website to enable its employees to convey order and shipping information to the relevant departments within the firm. However, to ensure an effective and smooth exchange of information, Bramo Courier Services has to pay $100 million annually for Internet access. In this scenario, the cost that Bramo Courier Services incurs is an example of _____.
A) acquisition cost
B) processing cost
C) communication cost
D) retrieval cost
A) acquisition cost
B) processing cost
C) communication cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following statements defines communication cost?
A) It is the cost of obtaining data that an organization does not have.
B) It is the cost of transforming raw data into meaningful information.
C) It is the cost of transmitting information from one place to another.
D) It is the cost of physically or electronically archiving information.
A) It is the cost of obtaining data that an organization does not have.
B) It is the cost of transforming raw data into meaningful information.
C) It is the cost of transmitting information from one place to another.
D) It is the cost of physically or electronically archiving information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
55
Identify a true statement about manual capture of information.
A) It involves recording and entering data by hand into a data storage device.
B) It is often an accurate process.
C) It involves the use of bar codes and document scanners.
D) It is a cheap and fast process.
A) It involves recording and entering data by hand into a data storage device.
B) It is often an accurate process.
C) It involves the use of bar codes and document scanners.
D) It is a cheap and fast process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
56
The two basic requirements for a good electronic scanner are:
A) a radio frequency identification tag and a digital printing software.
B) a document feeder and optical character recognition software.
C) a virtual private network and a radio wave transmitter.
D) a bar code imager and an executive information system.
A) a radio frequency identification tag and a digital printing software.
B) a document feeder and optical character recognition software.
C) a virtual private network and a radio wave transmitter.
D) a bar code imager and an executive information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
57
Global Networcks has processed and archived a large amount of data on its servers. Due to technical faults in its servers, it could not access the data. The company had to pay $300,000 to external technicians to regain access to its data. The cost incurred by Global Networcks is an example of _____.
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
58
Soundwave Communication Services has processed and archived a large amount of data on its servers. However, due to a technical fault in its servers,it was unable to access the information. It had to spend a large sum of money to regain access to the information. In this scenario, the cost borne by Soundwave Communication Services is an example of _____.
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
59
Kandriva, a fitness equipment manufacturer, runs a small-scale customer service center with thirty customer service representatives. The company invests around $5000 annually toward repair and maintenance of telephones and telephone lines catering to its customer service center. In this scenario, it is evident that Kandriva incurs _____.
A) communication cost
B) processing cost
C) storage cost
D) retrieval cost
A) communication cost
B) processing cost
C) storage cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
60
ABD Tech has invested $20 million to install business intelligence software (BIS) at all of its branches across the globe so that it can access stored information in its servers for business analysis and decision-making purposes. In this scenario, the cost incurred by ABD Tech is an example of _____.
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
A) acquisition cost
B) processing cost
C) storage cost
D) retrieval cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
61
Unlike spamming, email snooping involves:
A) reading another person's emails from intermediate servers or packets or physically accessing their machine.
B) encrypting personal or corporate data to make it inaccessible.
C) sending fake but real-looking emails and websites that trick users into sharing personal information.
D) clogging and overloading email servers and inboxes with junk mail.
A) reading another person's emails from intermediate servers or packets or physically accessing their machine.
B) encrypting personal or corporate data to make it inaccessible.
C) sending fake but real-looking emails and websites that trick users into sharing personal information.
D) clogging and overloading email servers and inboxes with junk mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
62
The two critical stepsthat are required to make sure that data can be accessed byapproved users and no one else are:
A) authentication and authorization.
B) empowerment and authorization.
C) empowerment and encryption.
D) authentication and encryption.
A) authentication and authorization.
B) empowerment and authorization.
C) empowerment and encryption.
D) authentication and encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
63
Unlike spamming, phishing involves:
A) sending fake but real-looking emails and websites that trick users into sharing personal information.
B) tracing web usage and permitting the creation of personalized web pages that track behavior.
C) recording everything typed at the keyboard and intercepting keystrokes before password masking occurs.
D) clogging and overloading email servers and inboxes with junk mail.
A) sending fake but real-looking emails and websites that trick users into sharing personal information.
B) tracing web usage and permitting the creation of personalized web pages that track behavior.
C) recording everything typed at the keyboard and intercepting keystrokes before password masking occurs.
D) clogging and overloading email servers and inboxes with junk mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
64
_____ usually begins with the user telling the data mining software to look and test for specific patterns and relationships in a data set.
A) Undirected data mining
B) Descriptive data mining
C) Supervised data mining
D) Unsupervised data mining
A) Undirected data mining
B) Descriptive data mining
C) Supervised data mining
D) Unsupervised data mining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
65
In the context of protecting information, _____ is defined as the process of making sure users are who they claim to be.
A) encryption
B) authorization
C) decryption
D) authentication
A) encryption
B) authorization
C) decryption
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
66
KST Mart retains large amounts of customer data. To understand customer purchase behavior, the company uses a process that automatically discovers correlations in the collected data. Through this process, the company learns that people who buy bread, typically also buy a packet of butter. As a result, the manager of the supermarket places butter near the shelf that stocks bread. In this scenario, KST Mart has most likely used _____ to process information.
A) data integration
B) data mining
C) bar coding
D) radio frequency tagging
A) data integration
B) data mining
C) bar coding
D) radio frequency tagging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
67
Sequence patterns appear when:
A) two or more database elements occur together in a significant pattern in which one of the elements precedes the other.
B) four or more database elements tend to occur together in a significant way.
C) three or more database elements occur together in a significant way.
D) three or more database elements occur together in an insignificant pattern in which two of the elements precede the other.
A) two or more database elements occur together in a significant pattern in which one of the elements precedes the other.
B) four or more database elements tend to occur together in a significant way.
C) three or more database elements occur together in a significant way.
D) three or more database elements occur together in an insignificant pattern in which two of the elements precede the other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
68
A _____ stores huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy.
A) data model
B) data warehouse
C) data cluster
D) data set
A) data model
B) data warehouse
C) data cluster
D) data set
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
69
In the context of data mining, _____ occur when two or more database elements tend to occur together in a significant way.
A) association patterns
B) data clusters
C) time series
D) predictive patterns
A) association patterns
B) data clusters
C) time series
D) predictive patterns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
70
After analyzing the data on cab services in Lucitona, the Transport Authority of Lucitona discovered that there was an 85 percent increase in the number of people using cab services on rainy days. In the context of data mining, the Transport Authority of Lucitona discovered a(n) _____.
A) predictive pattern
B) data cluster pattern
C) sequence pattern
D) extrapolative pattern
A) predictive pattern
B) data cluster pattern
C) sequence pattern
D) extrapolative pattern
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
71
ATT Supermarket has collected a large amount of data regarding its customers. To understand customer purchase behavior, the company uses a process that automatically identifies correlations in the collected data. Through this process, the company learns that people who wait for more than 10 minutes in the billing queue, tend to remove a few items from their shopping cart. Consequently, this leads to reduced sales. The manager of the supermarket decides to install five more billing counters, which could reduce the estimated wait time by a considerable amount. In this scenario, ATT Supermarket has most likely used _____ to process information.
A) data mining
B) data integration
C) bar coding
D) radio frequency tagging
A) data mining
B) data integration
C) bar coding
D) radio frequency tagging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
72
Jack found an old photograph of his family. He wanted to upload the picture as a digital image on a social networking website. In this scenario, which of the following can help Jack convert the photograph into a digital image?
A) A bar coding device
B) A digital printing software
C) A radio frequency identification tag
D) An electronic scanner
A) A bar coding device
B) A digital printing software
C) A radio frequency identification tag
D) An electronic scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
73
Sumptuous Supermarket has large amounts of data about its customers. To understand customer buying behavior, the company uses a process that automatically discovers connections in the collected data. Through this process, the company learns that people who buy carbonated drinks, typically also buy a pack of salted snacks. As a result, the manager of the supermarket places carbonated drinks near the shelf with chips and pretzels. In this scenario, Sumptuous Supermarket has most likely used _____.
A) data integration
B) data mining
C) bar coding
D) radio frequency tagging
A) data integration
B) data mining
C) bar coding
D) radio frequency tagging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following is a difference between affinity patterns and predictive patterns?
A) Affinity patterns are identified through unsupervised data mining, whereas predictive patterns are identified through supervised data mining.
B) Affinity patterns are also known as sequence patterns, whereas predictive patterns are also known as association patterns.
C) Affinity patterns look for database elements that seem to go together, whereas predictive patterns help identify database elements that are different.
D) Affinity patterns appear when three or more database elements occur together in a significant way, whereas predictive patterns appear when two or more database elements occur together in a significant way.
A) Affinity patterns are identified through unsupervised data mining, whereas predictive patterns are identified through supervised data mining.
B) Affinity patterns are also known as sequence patterns, whereas predictive patterns are also known as association patterns.
C) Affinity patterns look for database elements that seem to go together, whereas predictive patterns help identify database elements that are different.
D) Affinity patterns appear when three or more database elements occur together in a significant way, whereas predictive patterns appear when two or more database elements occur together in a significant way.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
75
Chenrezic Music Stores, a chain of stores selling musical instruments, is trying to improve its customer service. While examining its checkout data, it learned that people who buy guitar covers also buy guitar straps and vice versa. In this scenario, the use of data mining to find better ways to improve customer service has also led to the discovery of a(n) _____.
A) affinity pattern
B) sequential pattern
C) data cluster pattern
D) extrapolative pattern
A) affinity pattern
B) sequential pattern
C) data cluster pattern
D) extrapolative pattern
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
76
In the context of protecting information, _____ is defined as the process of granting verified users approved access to data, software, and systems.
A) encryption
B) authorization
C) decryption
D) authentication
A) encryption
B) authorization
C) decryption
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following statements is true of affinity patterns?
A) They help identify database elements that are different.
B) They occur when two or more database elements tend to occur together in a significant way.
C) They can solely be identified through supervised data mining.
D) They occur when three or more database elements occur together in a significant pattern.
A) They help identify database elements that are different.
B) They occur when two or more database elements tend to occur together in a significant way.
C) They can solely be identified through supervised data mining.
D) They occur when three or more database elements occur together in a significant pattern.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
78
Unlike spam, ransomware:
A) encrypts personal or corporate data so it cannot be accessed.
B) sends fake but real-looking emails to trick users into sharing personal information.
C) records everything typed at the keyboard and intercepts keystrokes before password masking occurs.
D) clogs and overloads email servers and inboxes with junk mail.
A) encrypts personal or corporate data so it cannot be accessed.
B) sends fake but real-looking emails to trick users into sharing personal information.
C) records everything typed at the keyboard and intercepts keystrokes before password masking occurs.
D) clogs and overloads email servers and inboxes with junk mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
79
DizMart, a supermarket, is trying to improve the sales of its in-house packaged oats. While examining checkout data, DizMart learned that people who buy packaged oats also buy packaged milk. In this scenario, the use of data mining to find ways to improve sales of packaged oats also led to the discovery of a(n) _____.
A) sequential pattern
B) affinity pattern
C) data cluster pattern
D) extrapolative pattern
A) sequential pattern
B) affinity pattern
C) data cluster pattern
D) extrapolative pattern
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck
80
By analyzing ticket sales, the managers of a soccer stadium discovered that sales increased by almost 80 percent in the seasons it held an open house prior to the opening game and allowed people to view the game from the box seats. In the context of data mining, the management discovered a(n) _____.
A) affinity pattern
B) sequence pattern
C) data cluster pattern
D) extrapolative pattern
A) affinity pattern
B) sequence pattern
C) data cluster pattern
D) extrapolative pattern
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 115 في هذه المجموعة.
فتح الحزمة
k this deck