________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data
acquisition
________ is a technique for harnessing the power of thousands of computers working in parallel
MapReduce
________ analysis is a way of analyzing and ranking customers according to their purchasing patterns
RFM
Which of the following statements is true of source data for a business intelligence (BI) system?
Business intelligence systems analyze an organization's past performance to make predictions.
Problematic operational data is termed as ________.
dirty data
Knowledge management (KM) benefits organizations because it ________.
improves process quality and increases team strength
A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.
data warehouse
Which of the following is a characteristic of decision trees?
They are used to select variables that are then used by other types of data mining tools.
Which of the following statements is true about business intelligence (BI) publishing alternatives?
Publishing dynamic BI is more difficult than publishing static content.
In market-basket terminology, ________ describes the probability that two items will be purchased together.
SUPPORT
When an employee is terminated, IS administrators should receive advance notice so that they can ________.
remove the user account and password
With ________, the sender and receiver transmit a message using different keys.
asymmetric encryption
Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.
cookies
Kate was among the top ten applicants for an honorary scholarship at her university. The scholarship would be decided by a written exam and an interview. Kate had outperformed the others in the interview, but she was not sure of her written exam's results
hacking
In the context of malware protection, the program code that causes the unwanted actions is called the ________.
payload
________ are viruses that masquerade as useful programs or files.
Trojan horses
________ present(s) the largest risk for an organization's infrastructure loss.
Natural disasters
________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.
Database administration
A ________ is a type of virus that self-propagates using the Internet or other computer network.
worm
Which of the following statements is true about human safeguards for employees?
User accounts should be defined to give users the least possible privilege needed to perform their jobs.
Which of the following statements is true about information systems (IS) planning functions?
The steering committee represents the IS department exclusively in high-level discussions.(WW)
If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to
business and systems analyst
KPL Inc. is an outsource vendor. It handles the recruiting process for Numero Uno Computers. KPL recently changed its business strategy to a more profit-oriented one. This modification would require the company to charge more for its services. This change
loss of control
Which of the following statements is true about the changes and developments foreseen by the year 2026?
Most organizations will move their internal hardware infrastructure into the cloud.
SFA Inc. has a team of ten information systems (IS) personnel. The personnel are kept busy throughout the day as they help employees solve even the most trivial issues. In which of the following ways can the employees assist the IS personnel in this scena
learning basic computer skills
Which of the following statements is true about users of information systems?
They should learn standard techniques and procedures for the applications they use.
Which of the following statements is true of the operations group in an organization's information system (IS) department?
it monitors the UX and responds to their problems
Which of the following is a responsibility of a chief information officer (CIO)?
serving as the principal manager of the IS dept
Which of the following statements is true of the information systems (IS) department?
The operations group monitors user experience and responds to user problems.
Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.
IS
According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________.
points
In business process management (BPM), an as-is model ________.
documents the existing business process
In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works.
maintaining the system
Which of the following is the key to successful systems development life cycle (SDLC) projects?
work breakdown structure
In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business.
pilot
ACES is a quality auditing firm. It has dedicated a team of managers, business analysts, and system analysts to develop an information system that receives data and produces quarterly reports that grade companies on their quality rating. The team is using
Requirements analysis
In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
parallel
During the system implementation phase of the systems development life cycle (SDLC), once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?
system conversion
Which of the following statements is true about the relationship between business processes and information systems?
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.
In a business process, a role refers to ________.
activities