<p>Chapter 10</p><p>1. GISs process location data and provide output.</p><p>Answer: True</p><p>Page reference: 364-365</p><p>2. A static model is one that is automatically adjusted based on changing relationships among variables.</p><p>Answer(s): False</p><p>Page reference: 347</p><p>3. A typical ____ consists of (1) a database of quantitative and qualitative data from which information is extracted for display, (2) a database of maps, and (3) a program that displays the information on the maps.</p><p>Answer(s): D. GIS</p><p>Page reference: 366</p><p>4. In the ____ phase of decision making, the method for considering the data is designed.</p><p>Answer(s): B. Design</p><p>Page reference: 343</p><p>5. Spreadsheets enable you to enter data, but not formulas, in cells.</p><p>Answer(s): False</p><p>Page reference: 350</p><p>6. A model might be a widely used method to predict performance, such as best-fit linear analysis, or it might be built by the organization, using the experience that employees in the firm have accumulated over time.</p><p>Answer: True</p><p>Page reference: 347-348 7. Rather than containing a set of IF-THEN rules, more sophisticated ESs use programs called ____, which are designed to mimic the way a human brain learns.</p><p>Answer: A. neural networks</p><p>Page reference: 359</p><p>8. In the ____ phase of decision making, decision makers select the most promising alternative.</p><p>Answer(s): C. Choice</p><p>Page reference: 343</p><p>9. A(n) ____ has no algorithm to follow to reach an optimal solution - either because there is not enough information or because there are so many factors that no algorithm can guarantee a unique optimal solution.</p><p>Answer(s): D. unstructured problem</p><p>Page reference: 344</p><p>10.Inference engines are used to predict output on the basis of different input or different conditions or to estimate what combination of conditions and input might lead to a desired output.</p><p>Answer(s): False</p><p>Page reference: 347 Chapter 14</p><p>1. The audit trail is the most important tool of the ____, the professional whose job it is to find erroneous or fraudulent cases and investigate them.</p><p>Answer: A. information systems auditor</p><p>Page reference: 489</p><p>2. Security measures - especially passwords, encryption applications, and firewalls - have a price that relates to more than money: they slow down data communications.</p><p>Answer: True</p><p>Page reference: 498</p><p>3. Authentication can be accomplished by senders and receivers exchanging codes known only to them.</p><p>Answer: True</p><p>Page reference: 492</p><p>4. To ensure against interruptions in power supply, organizations use ____ systems, which provide an alternative power supply for a short time, as soon as a</p><p>Answer(s): C. UPS</p><p>Page reference: 477</p><p>5. A(n) ____ is a set of indivisible transactions that are either all executed or none are - never only some.</p><p>Answer(s): B. atomic transaction</p><p>Page reference: 488</p><p>6. A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.</p><p>Answer(s): B. honeytoken</p><p>Page reference: 481 7. Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically, a process referred to as data ____.</p><p>Answer(s): C. backup</p><p>Page reference: 485</p><p>8. ____ are computer files that serve as the equivalent of ID cards by associating one's identity with one's public key.</p><p>Answer(s): D. Digital certificates</p><p>Page reference: 497</p><p>9. One popular tracking tool is the ____: a series of documented facts that help detect who recorded which transactions, at what time, and under whose approval.</p><p>Answer(s): D. audit trail</p><p>Page reference: 489</p><p>10.A ____ "represents" another server for all information requests from resources inside the trusted network. nswer(s): D. proxy server</p><p>Page reference: 490</p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages4 Page
-
File Size-