1. Giss Process Location Data and Provide Output
Total Page:16
File Type:pdf, Size:1020Kb
Chapter 10
1. GISs process location data and provide output.
Answer: True
Page reference: 364-365
2. A static model is one that is automatically adjusted based on changing relationships among variables.
Answer(s): False
Page reference: 347
3. A typical ____ consists of (1) a database of quantitative and qualitative data from which information is extracted for display, (2) a database of maps, and (3) a program that displays the information on the maps.
Answer(s): D. GIS
Page reference: 366
4. In the ____ phase of decision making, the method for considering the data is designed.
Answer(s): B. Design
Page reference: 343
5. Spreadsheets enable you to enter data, but not formulas, in cells.
Answer(s): False
Page reference: 350
6. A model might be a widely used method to predict performance, such as best-fit linear analysis, or it might be built by the organization, using the experience that employees in the firm have accumulated over time.
Answer: True
Page reference: 347-348 7. Rather than containing a set of IF-THEN rules, more sophisticated ESs use programs called ____, which are designed to mimic the way a human brain learns.
Answer: A. neural networks
Page reference: 359
8. In the ____ phase of decision making, decision makers select the most promising alternative.
Answer(s): C. Choice
Page reference: 343
9. A(n) ____ has no algorithm to follow to reach an optimal solution - either because there is not enough information or because there are so many factors that no algorithm can guarantee a unique optimal solution.
Answer(s): D. unstructured problem
Page reference: 344
10.Inference engines are used to predict output on the basis of different input or different conditions or to estimate what combination of conditions and input might lead to a desired output.
Answer(s): False
Page reference: 347 Chapter 14
1. The audit trail is the most important tool of the ____, the professional whose job it is to find erroneous or fraudulent cases and investigate them.
Answer: A. information systems auditor
Page reference: 489
2. Security measures - especially passwords, encryption applications, and firewalls - have a price that relates to more than money: they slow down data communications.
Answer: True
Page reference: 498
3. Authentication can be accomplished by senders and receivers exchanging codes known only to them.
Answer: True
Page reference: 492
4. To ensure against interruptions in power supply, organizations use ____ systems, which provide an alternative power supply for a short time, as soon as a
Answer(s): C. UPS
Page reference: 477
5. A(n) ____ is a set of indivisible transactions that are either all executed or none are - never only some.
Answer(s): B. atomic transaction
Page reference: 488
6. A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.
Answer(s): B. honeytoken
Page reference: 481 7. Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically, a process referred to as data ____.
Answer(s): C. backup
Page reference: 485
8. ____ are computer files that serve as the equivalent of ID cards by associating one's identity with one's public key.
Answer(s): D. Digital certificates
Page reference: 497
9. One popular tracking tool is the ____: a series of documented facts that help detect who recorded which transactions, at what time, and under whose approval.
Answer(s): D. audit trail
Page reference: 489
10.A ____ "represents" another server for all information requests from resources inside the trusted network. nswer(s): D. proxy server
Page reference: 490