76 notecards = 19 pages (4 cards per page)
_____ provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.
The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions.
In designing a management information system (MIS), after defining the system's objectives, the next step is to _____.
_____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
A(n)__________, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.
_____ is understanding the role of information in generating and using business intelligence.
In the context of the major components of an information system, which of the following is a difference between information and data?
Database management systems _____.
Which of the following statements is true of an intranet?
Which of the following decisions is supported by a logistics information system (LIS)?
Which of the following systems supports sales forecasting?
A__________is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.
A personnel information system (PIS) helps in _____.
_____ refers to building and integrating analytics capabilities into all everyday business activities.
_____ refers to computing devices everywhere with different sizes and power and accessed through multiple formats such as voice, touch, and gesture.
The__________is the heart of a computer.
Beginning in the 1940s, first-generation computers used _____.
The breakthrough technology of the 1960s was to "print" electronic components onto silicon wafers, also known as _____.
Computer designers are now working on technology using gallium arsenide instead of silicon because silicon:
Which of the following is an example of an input device?
What is necessary for a computer to accept a new type of data (like pictures, audio, or video) as input?
What is the implication of the "GIGO" principle?
__________bits equal one byte.
A gigabyte (GB) is about 1 billion bytes. What's the next larger unit of data size (equal to about 1 trillion bytes)?
A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.
UNIX is a type of _____.
Java and C++ are examples of _____.
What is the name of the recently developed IBM supercomputer that has pushed the boundaries of a computer's ability to understand context in human language?
Given the relative strengths and weaknesses of computers and humans, which of these tasks would be best given to a computer?
Given the relative strengths and weaknesses of computers and humans, which of these tasks would be best given to a person?
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
__________is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
In data encryption, thehttpsin a browser address bar indicates a safe HTTP connection over _____.
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
__________is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
The process of capturing and recording network traffic is referred to as _____.
A(n)__________is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
Which of the following statements is true of phishing?
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Assuming your company takes basic security measures, which of these situations is probably the most alarming security breach?
Which of the following is an advantage of a database over a flat file system?
A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media.
The__________of a database involves how information appears to users and how it can be organized and retrieved.
In contrast to data in a transactional database, data in a data warehouse is described as subject oriented, which means that it _____.
Data warehouses are sometimes called hypercubes because they _____.
A _____ is usually a smaller version of a data warehouse, used by a single department or function.
A request for data from the database is known as a ______.
In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.
The "variety" dimension of Big Data refers to the combination of _____.
A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.
_____ is information about data—its content, quality, condition, origin, and other characteristics.
In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____.
In relational algebra, the _____ specifies which rows should be retrieved by a query.
In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.
The systems development life cycle (SDLC) is also known as the _____.
Which of the following is an outcome of the design phase of the systems development life cycle (SDLC)?
A__________is a written document with detailed specifications that is used to appeal bids for equipment, supplies, or services from vendors.
Which of the following is a difference between the systems development life cycle (SDLC) and extreme programming (XP)?
_____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.
In _____ of the implementation phase of the systems development life cycle (SDLC), an old system is stopped and a new system is implemented
The end result of the__________of the systems development life cycle (SDLC) model should give users and top management a clear view of what the problem is and how the information system will solve the problem.
In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.
__________are small-scale versions of information systems, which are built before building the entire system, and are used to illustrate the system's benefits and allow users to offer feedback.
_____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.
Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).
Which of the following is a common cost-effectiveness analysis method?
Which of the following approaches for developing information systems increases the risk of leaking confidential information to competitors?
Which of the following is an advantage of the joint application design (JAD) approach?
In the context of economic feasibility, which of the following statements is true of opportunity costs?