Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

DI A ACORN R S I T Y USI 2803 WI02 Business Technology Management 2024 Time left 0:43:16 Question 1 Not yet answered Marked out

DI A\ ACORN\ R S I T Y\ USI 2803 WI02 Business Technology Management 2024\ Time left 0:43:16\ Question 1\ Not yet answered\ Marked out of 1.00\ Flag\ question\ Question 2\ Not yet answered Marked out of 1.00\ Flag\ question\ Question 3\ Not yet answered\ Marked out of 5.00\ P Flag question\ Data mining is a tool for allowing users to:\ Select one:\ A. find hidden relationships in data.\ B. quickly compare transaction data gathered over many years.\ C. sumrilarize massive amounts of data into much smaller, traditional reports.\ D. obtain online answers to ad hoc questions in a rapid amount of time.\ Electronic data are more susceptible to destruction, fraud, theft and misuse because information systems concentrate data in computer files that\ Select one:\ A. are frequently being updated.\ B. have the potential to be accessed by large numbers of people and by groups outside of the organization.\ C. are not protected by passwords.\ D. are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error.\ Distinguish between cloud computing and on-demand computing. Give an examaple of how on-demand computing helps a business in terms of managing computing power (5 points).\ 7\ .\ Fi

vv

\ T.\

A

*\ 4-\ ov\ 8.\ 0\ c\ #\ I\ B\ I\ U

image text in transcribed
Question 1 Not yet answered Marked out of 1.00 P Flag question Question 2 Not yet answered Marked out of 1.00 Flag question Question 3 Not yet answered Data mining is a tool for allowing users to: Select one: A. find hidden relationships in data. B. quickly compare transaction data gathered over many years. C. sumriarize massive amounts of data into much smaller, traditional reports. D. obtain online answers to ad hoc questions in a rapid amount of time. Electronic data are more susceptible to destruction, fraud, theft and misuse because information systems concentrate data in computer files that Select one: A. are frequently being updated. B. have the potential to be accessed by large numbers of people and by groups outside of the organization, C. are not protected by passwords. D, are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error. Distinguish between cloud computing and on-demand computing. Give an examaple of how on-demand computing helps a business in terms of managing computing power ( 5 points)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Practitioners Blueprint To Construction Auditing

Authors: Ron Risner

1st Edition

0894137263, 978-0894137266

More Books

Students also viewed these Accounting questions