1. Giss Process Location Data and Provide Output

1. Giss Process Location Data and Provide Output

<p>Chapter 10</p><p>1. GISs process location data and provide output.</p><p>Answer: True</p><p>Page reference: 364-365</p><p>2. A static model is one that is automatically adjusted based on changing relationships among variables.</p><p>Answer(s): False</p><p>Page reference: 347</p><p>3. A typical ____ consists of (1) a database of quantitative and qualitative data from which information is extracted for display, (2) a database of maps, and (3) a program that displays the information on the maps.</p><p>Answer(s): D. GIS</p><p>Page reference: 366</p><p>4. In the ____ phase of decision making, the method for considering the data is designed.</p><p>Answer(s): B. Design</p><p>Page reference: 343</p><p>5. Spreadsheets enable you to enter data, but not formulas, in cells.</p><p>Answer(s): False</p><p>Page reference: 350</p><p>6. A model might be a widely used method to predict performance, such as best-fit linear analysis, or it might be built by the organization, using the experience that employees in the firm have accumulated over time.</p><p>Answer: True</p><p>Page reference: 347-348 7. Rather than containing a set of IF-THEN rules, more sophisticated ESs use programs called ____, which are designed to mimic the way a human brain learns.</p><p>Answer: A. neural networks</p><p>Page reference: 359</p><p>8. In the ____ phase of decision making, decision makers select the most promising alternative.</p><p>Answer(s): C. Choice</p><p>Page reference: 343</p><p>9. A(n) ____ has no algorithm to follow to reach an optimal solution - either because there is not enough information or because there are so many factors that no algorithm can guarantee a unique optimal solution.</p><p>Answer(s): D. unstructured problem</p><p>Page reference: 344</p><p>10.Inference engines are used to predict output on the basis of different input or different conditions or to estimate what combination of conditions and input might lead to a desired output.</p><p>Answer(s): False</p><p>Page reference: 347 Chapter 14</p><p>1. The audit trail is the most important tool of the ____, the professional whose job it is to find erroneous or fraudulent cases and investigate them.</p><p>Answer: A. information systems auditor</p><p>Page reference: 489</p><p>2. Security measures - especially passwords, encryption applications, and firewalls - have a price that relates to more than money: they slow down data communications.</p><p>Answer: True</p><p>Page reference: 498</p><p>3. Authentication can be accomplished by senders and receivers exchanging codes known only to them.</p><p>Answer: True</p><p>Page reference: 492</p><p>4. To ensure against interruptions in power supply, organizations use ____ systems, which provide an alternative power supply for a short time, as soon as a</p><p>Answer(s): C. UPS</p><p>Page reference: 477</p><p>5. A(n) ____ is a set of indivisible transactions that are either all executed or none are - never only some.</p><p>Answer(s): B. atomic transaction</p><p>Page reference: 488</p><p>6. A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.</p><p>Answer(s): B. honeytoken</p><p>Page reference: 481 7. Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically, a process referred to as data ____.</p><p>Answer(s): C. backup</p><p>Page reference: 485</p><p>8. ____ are computer files that serve as the equivalent of ID cards by associating one's identity with one's public key.</p><p>Answer(s): D. Digital certificates</p><p>Page reference: 497</p><p>9. One popular tracking tool is the ____: a series of documented facts that help detect who recorded which transactions, at what time, and under whose approval.</p><p>Answer(s): D. audit trail</p><p>Page reference: 489</p><p>10.A ____ "represents" another server for all information requests from resources inside the trusted network. nswer(s): D. proxy server</p><p>Page reference: 490</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us