_____ is the prediction that about every two years, computer processing power would double and its cost would drop by 50 percent.
Moore's Law
A decision support system (DSS):
is designed to help managers deal with specific kinds of problems.
In the context of capturing information, _____ represent numerical data by varying the thickness and pattern of vertical lines.
Bar Codes
Define First-Mover Advantage
a firm's ability to be better off than its competitors as a result of being first to market in a new product category.
Which city is known as the cereal capital of the world?
Battle Creek
The term _____ refers to facts and figures that are useless unless they have meaning.
Raw Data
In the context of accessing and sharing information, _____ are private company networks that allow employees to easily access, share, and publish information using Internet software.
intranets
A _____ stores huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy.
data warehouse
Define Acquisition Cost
Cost of obtaining data that you don’t have
What essential amino acid is found in Turkey and is said to make you sleepy?
Tryptophan
Name the 4 characteristics of useful information
Accurate, Complete, Relevant, and Timely
In the context of accessing and sharing information, _____ allow company managers and employees to use a web browser to gain access to customized company information and to complete specialized transactions.
corporate portals
_____ usually begins with the user telling the data mining software to look and test for specific patterns and relationships in a data set.
Supervised data mining
Define Association Patterns
Two or more database elements tend to occur together in a significant way
Which city in the United States was the first to assign telephone numbers to its residents?
Detroit
What is Storage Cost?
It is the cost of physically or electronically archiving information for later use.
In _____, the different purchasing and ordering applications in companies interact automatically without any human input.
electronic data interchange
_____ transforms data into complex, scrambled digital codes that can be deciphered only by authorized users who possess unique keys to the data.
Data encryption
Define Communication Cost
Cost of transmitting information from one place to another
Which fast-food restaurant started the modern-day drive-thru window?
Wendy's
If a company is using information technology to continuously improve the core functions of its business, it may be trying to create a...
sustainable competitive advantage
A(n) _____ allows companies to exchange information and conduct transactions by purposely providing outsiders with direct, password-protected, web browser-based access to authorized parts of a company's information system.
extranet
What are White Hat Hackers?
Companies are combating security threats by hiring white hat hackers. White hat hackers are so-called good guys who test security weak points in information systems so that they can be fixed.
Define Data Clusters
Three or more database elements that occur together in a significant way
What are the only two countries in the world where you cannot buy coca-cola?
North Korea and Cuba