Chapter 10

1. GISs process location data and provide output.

Answer: True

Page reference: 364-365

2. A static model is one that is automatically adjusted based on changing relationships among variables.

Answer(s): False

Page reference: 347

3. A typical ____ consists of (1) a database of quantitative and qualitative data from which information is extracted for display, (2) a database of maps, and (3) a program that displays the information on the maps.

Answer(s): D. GIS

Page reference: 366

4. In the ____ phase of decision making, the method for considering the data is designed.

Answer(s): B. Design

Page reference: 343

5. Spreadsheets enable you to enter data, but not formulas, in cells.

Answer(s): False

Page reference: 350

6. A model might be a widely used method to predict performance, such as best-fit linear analysis, or it might be built by the organization, using the experience that employees in the firm have accumulated over time.

Answer: True

Page reference: 347-348 7. Rather than containing a set of IF-THEN rules, more sophisticated ESs use programs called ____, which are designed to mimic the way a human brain learns.

Answer: A. neural networks

Page reference: 359

8. In the ____ phase of decision making, decision makers select the most promising alternative.

Answer(s): C. Choice

Page reference: 343

9. A(n) ____ has no algorithm to follow to reach an optimal solution - either because there is not enough information or because there are so many factors that no algorithm can guarantee a unique optimal solution.

Answer(s): D. unstructured problem

Page reference: 344

10.Inference engines are used to predict output on the basis of different input or different conditions or to estimate what combination of conditions and input might lead to a desired output.

Answer(s): False

Page reference: 347 Chapter 14

1. The audit trail is the most important tool of the ____, the professional whose job it is to find erroneous or fraudulent cases and investigate them.

Answer: A. information systems auditor

Page reference: 489

2. Security measures - especially passwords, encryption applications, and firewalls - have a price that relates to more than money: they slow down data communications.

Answer: True

Page reference: 498

3. Authentication can be accomplished by senders and receivers exchanging codes known only to them.

Answer: True

Page reference: 492

4. To ensure against interruptions in power supply, organizations use ____ systems, which provide an alternative power supply for a short time, as soon as a

Answer(s): C. UPS

Page reference: 477

5. A(n) ____ is a set of indivisible transactions that are either all executed or none are - never only some.

Answer(s): B. atomic transaction

Page reference: 488

6. A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.

Answer(s): B. honeytoken

Page reference: 481 7. Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically, a process referred to as data ____.

Answer(s): C. backup

Page reference: 485

8. ____ are computer files that serve as the equivalent of ID cards by associating one's identity with one's public key.

Answer(s): D. Digital certificates

Page reference: 497

9. One popular tracking tool is the ____: a series of documented facts that help detect who recorded which transactions, at what time, and under whose approval.

Answer(s): D. audit trail

Page reference: 489

10.A ____ "represents" another server for all information requests from resources inside the trusted network. nswer(s): D. proxy server

Page reference: 490