5. In the process of capturing information, ASCII text is generated by:
optical character recognition software
automated, electronic capture of data
process of hypothesis testing in large databases
process of verifying known relationships in large amounts of data
process of discovering unknown patterns and relationships in large amounts of data
method used to identify and eliminate perishable data
result from the use of internal data mining
are a statistical technique used for trend analysis
are used to create samples for statistical analyses
occur when three or more database elements occur together in a significant way
are accurately described by all of these
8. Two critical steps are required to make sure that data can be accessed by authorized users and no one
else. They are:
authentication and authorization
authorization and empowerment
delegation and empowerment
encryption and empowerment
authentication and encryption
9. The goal of an executive information system (EIS) is to:
replace the need for intuition in decision making
create a link among authorized data and network users
protect organizational data from hackers
provide accurate, complete, relevant, and timely information to managers
10. A(n) ____ is a private company network that allows employees to easily access, share, and publish
information using Internet software.