Package deal
MSIS Bundled with complete solutions;Updated 2024,2025
MSIS Bundled with complete solutions;Updated 2024,2025
[Show more]MSIS Bundled with complete solutions;Updated 2024,2025
[Show more]=CHOOSE(index_num, value1, value2, . . . ) - returns a value from a list based on the position in 
the list, specified by index_num 
=HLOOKUP(lookup_value,table_array,row_index_num,[range lookup]) - looks up a value in the top 
row of a table and returns a value in the same column from a row you spe...
Preview 2 out of 11 pages
Add to cart=CHOOSE(index_num, value1, value2, . . . ) - returns a value from a list based on the position in 
the list, specified by index_num 
=HLOOKUP(lookup_value,table_array,row_index_num,[range lookup]) - looks up a value in the top 
row of a table and returns a value in the same column from a row you spe...
"centering" of a set of data - Measures of location provide estimates of a single value that in some 
fashion represents the 
absolute address - An absolute address uses a dollars sign ($) before either the row or column or 
both (for example $A2, C$23, or $B$15) 
Add third dimension to analysis i...
Preview 2 out of 11 pages
Add to cart"centering" of a set of data - Measures of location provide estimates of a single value that in some 
fashion represents the 
absolute address - An absolute address uses a dollars sign ($) before either the row or column or 
both (for example $A2, C$23, or $B$15) 
Add third dimension to analysis i...
•Common mathematical operators are used - -addition (+) 
-subtraction (-) 
-multiplication (*) 
-division (/) 
-exponentiation (^) 
Absolute references - $A$2, $C5, D$10 
Advanced Filter - provides a way of explicitly defining criteria by which to filter a database. 
•First, copy the headers fro...
Preview 3 out of 20 pages
Add to cart•Common mathematical operators are used - -addition (+) 
-subtraction (-) 
-multiplication (*) 
-division (/) 
-exponentiation (^) 
Absolute references - $A$2, $C5, D$10 
Advanced Filter - provides a way of explicitly defining criteria by which to filter a database. 
•First, copy the headers fro...
"Secure", as in secure programs - No single definition; never 100% secure 
"The Cloud" - "Someone Else's Computer" 
"Upstream Early and Often" - Popular open source motto regarding code changes 
Access Control List - Each object has a list of right per object or user; inverse of a file dire...
Preview 3 out of 16 pages
Add to cart"Secure", as in secure programs - No single definition; never 100% secure 
"The Cloud" - "Someone Else's Computer" 
"Upstream Early and Often" - Popular open source motto regarding code changes 
Access Control List - Each object has a list of right per object or user; inverse of a file dire...
_____ are residuals divided by their standard deviation and describe how far each residual is from its 
mean in units of standard deviations. - standard residuals 
_____ assumes that the errors for each individual value of X are normally distributed, with a mean of 0. 
This can be verified by examin...
Preview 2 out of 7 pages
Add to cart_____ are residuals divided by their standard deviation and describe how far each residual is from its 
mean in units of standard deviations. - standard residuals 
_____ assumes that the errors for each individual value of X are normally distributed, with a mean of 0. 
This can be verified by examin...
___ is an older hashing function designed for 32 bit systems, results in a 128 bit hash value - MD5 
___ is an open source personal encryption program that might finally be a suitable replacement for the 
other one that died at version 7.1a - Veracrypt 
___ is used for integrity checking. It uses a ...
Preview 2 out of 8 pages
Add to cart___ is an older hashing function designed for 32 bit systems, results in a 128 bit hash value - MD5 
___ is an open source personal encryption program that might finally be a suitable replacement for the 
other one that died at version 7.1a - Veracrypt 
___ is used for integrity checking. It uses a ...
Compare open-source software to licensed software in terms of how each is used and supported. - 
Open-source software is software that is distributed, typically for free, with the source code also 
available so that it can be studied, changed, and improved by its users. 
Define the primary intent an...
Preview 2 out of 10 pages
Add to cartCompare open-source software to licensed software in terms of how each is used and supported. - 
Open-source software is software that is distributed, typically for free, with the source code also 
available so that it can be studied, changed, and improved by its users. 
Define the primary intent an...
_____ can process many pieces of data at the same time and learn to recognize patterns - 
Artificial neural networks 
_____ includes the planning, executing, and controlling of all activities involved in raw material sourcing 
and procurement, converting raw materials to finished products, and the w...
Preview 2 out of 7 pages
Add to cart_____ can process many pieces of data at the same time and learn to recognize patterns - 
Artificial neural networks 
_____ includes the planning, executing, and controlling of all activities involved in raw material sourcing 
and procurement, converting raw materials to finished products, and the w...
_______ is a measure of the linear relationship between two variables, X and 
Y, which does not depend on the units of measurement. - Correlation 
________ is a logical function that returns one value if the condition is true 
and another if the condition is false. - IF(condition, value if true, val...
Preview 2 out of 6 pages
Add to cart_______ is a measure of the linear relationship between two variables, X and 
Y, which does not depend on the units of measurement. - Correlation 
________ is a logical function that returns one value if the condition is true 
and another if the condition is false. - IF(condition, value if true, val...
A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a 
terabyte? - 1024 gigabytes 
Moore's Law - The number of transistors per square inch on an integrated chip doubles every 18 
months. 
T/F: Google Maps is a GIS system that utilizes a GPS system to provid...
Preview 1 out of 3 pages
Add to cartA kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a 
terabyte? - 1024 gigabytes 
Moore's Law - The number of transistors per square inch on an integrated chip doubles every 18 
months. 
T/F: Google Maps is a GIS system that utilizes a GPS system to provid...
_____ charts provide a useful means for displaying data over time. - Line 
_____ charts show multiple metrics on a spider web, thus allowing plotting of multiple dimensions of 
several data series. This is a useful chart to compare performance of different entities such as factories, 
companies, and...
Preview 2 out of 11 pages
Add to cart_____ charts provide a useful means for displaying data over time. - Line 
_____ charts show multiple metrics on a spider web, thus allowing plotting of multiple dimensions of 
several data series. This is a useful chart to compare performance of different entities such as factories, 
companies, and...
A _________ shows the relationships between the tables in a relational database - Entity 
Relationship Diagram 
A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a 
petabyte? - 1024 Terabytes 
A manufacturing company that uses an enterprise system will lik...
Preview 2 out of 9 pages
Add to cartA _________ shows the relationships between the tables in a relational database - Entity 
Relationship Diagram 
A kilobyte is 1024 bytes. A megabyte is 1024 kilobytes. A gigabyte is 1024 megabytes. What is a 
petabyte? - 1024 Terabytes 
A manufacturing company that uses an enterprise system will lik...
____ is the agreement that all network traffic packets will be treated equally and none given priority - 
Net neutrality 
_____ servers are responsible for translating words like "" into IP addresses - DNS 
______ of ________ covers all property obtained by criminal acts. - Fruit; crime 
_______ i...
Preview 2 out of 15 pages
Add to cart____ is the agreement that all network traffic packets will be treated equally and none given priority - 
Net neutrality 
_____ servers are responsible for translating words like "" into IP addresses - DNS 
______ of ________ covers all property obtained by criminal acts. - Fruit; crime 
_______ i...
A byte - is 8 bits; we measure the size of days in bytes. It can refer to a measure of data or of 
memory. 
Application - Application software is end user programs such as a browser, word processing 
software, and spreadsheet software 
Bit - The language of the computer is binary, 0 to 1 which is ca...
Preview 2 out of 5 pages
Add to cartA byte - is 8 bits; we measure the size of days in bytes. It can refer to a measure of data or of 
memory. 
Application - Application software is end user programs such as a browser, word processing 
software, and spreadsheet software 
Bit - The language of the computer is binary, 0 to 1 which is ca...
Four information system types based on their sphere of influence include interorganizational, personal, 
enterprise, and _______ - workgroup 
Managers of the business functions most affected by a new information system have a key responsibility 
to ensure that - the people, processes, and human stru...
Preview 2 out of 6 pages
Add to cartFour information system types based on their sphere of influence include interorganizational, personal, 
enterprise, and _______ - workgroup 
Managers of the business functions most affected by a new information system have a key responsibility 
to ensure that - the people, processes, and human stru...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICMATERIALS. Stuvia facilitates payment to the seller.
No, you only buy these notes for $15.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
72042 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now