-
Deleting problematic content on social networking sites is best reserved for when ________.
a. the content is obscene and inappropriate
-
E-commerce leads to ________, which is the elimination of middle layers of distributors and suppliers.
b. disintermediation
-
Meaningful social networking applications ________.
b. address real needs
-
________ are a form of User-Generated-Content in which customers and partners can offer advice and assistance regarding products.
c. Wikis and blogs
-
Clearinghouses ________.
a. provide goods and services at a stated price
-
The use of User-Generated Content has been decreasing with the growth of e-commerce and Web 2.0.
a. false
-
Deleting content on User-Generated-Content sites should be reserved for contributions that criticize a firm's products or services.
a. false
-
Social networking groups can be of three types. The group that anyone can find by searching, and anyone can join it is a(n) ________ group.
b. public
-
Social networking applications run on servers provided by ________.
c. the application's creator
-
If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.
a. leave it
-
A typical information system for B2C provides a Web-based application or Web __________ by which customers enter and manage their orders.
storefront
-
Price __________ measures the amount that demand rises or falls with changes in price.
elasticity
-
When you buy direct from a manufacturer from their Web site, eliminating the distributor and maybe the retailer, you are engaging in the process of __________.
disintermediation
-
Electronic exchanges that serve to match up buyers and sellers are an example of __________.
clearinghouses
-
__________ is the elimination of the middle layers in the supply chain.
disintermediation
-
1 petabyte is made up of ________ bytes.
b. 1015
-
With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis.
b. true
-
Knowledge management streamlines operations and reduces costs by eliminating redundant or unnecessary processes.
b. true
-
Which of the following observations concerning expert systems is true?
c. They are difficult and expensive to develop
-
Which of the following is a standard for subscribing to content sources?
c. Real Simple Syndication
-
Which of the following can store the maximum amount of data?
a. 1 exabyte (EB)
-
In market-basket terminology, the ratio of confidence to the base probability of buying an item is the ________.
a. lift
-
A market-basket analysis is a data-mining technique used for determining sales patterns.
b. true
-
Reporting tools tend to use simpler operations while data-mining tends to use more sophisticated statistical techniques.
b. true
-
RFM analysis, a technique readily implemented using reporting tools, is used to analyze and rank customers according to their purchasing patterns.
b. true
-
Data about what customers are doing on a company Web site is called __________ data.
clickstream
-
A BI __________ tracks users and authorizations.
application server
-
Data from a Siebel CRM system and an Oracle supply chain management application usually must be __________ before it can be used for BI processing.
integrated
-
If the granularity of the data is too fine, it is easy to make it __________ by summing and combining.
coarser
-
One problem with data-mining is that at the beginning of a project it is often not clear which __________ should be studied. Then by the time it is clearer, there is no time or budget left.
variables
-
Two __________ of storage would be equivalent to all the information stored in all of the research libraries in the United States.
petabytes
-
If you want to classify which customers are most likely to switch to another firm according to the number of years as your customer, you would use a ________ technique.
decision tree
-
A(n) ________ notifies the user of an exceptional event, such as a dramatic fall in a stock price.
d. exception alert
-
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
d. Data mining
-
Which of the following is an example of a question that data-mining will help address?
a. Will a given customer default on a loan?
-
Data mining tools process data using statistical techniques.
b. true
-
In marketing transactions, the fact that customers who buy product X also buy product Y creates a cross-selling opportunity.
b. true
-
With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis.
b. true
-
In most cases, data-mining tools are used to make ________.
c. predictions
-
Knowledge discovery in databases (KDD) is used as a synonym for data mining.
b. true
-
In a BPMN process diagram, data is represented by ________.
a. a square with a folded corner
-
A(n) ________ is a formal description of the system's response to use and misuse scenarios.
c. test plan
-
Which of the following is NOT one of the five components of an information system?
d. policies
-
In the ________ installation style of system conversion, the organization shuts off the old system/business processes and starts the new one directly.
a. plunge
-
Which of the following is not a functional process in an organization?
a. customer relationship management
-
________ is the process by which project managers compress the schedule by moving resources, typically people, from noncritical path tasks onto critical path tasks.
b. Critical path analysis
-
In systems development, documents, designs, prototypes, data models, database designs, working data entry screens, and the like are examples of ________.
d. deliverables
-
A ________ installation is the riskiest because the old system is turned off and the new system is turned on.
d. plunge
-
Functional business processes involve activities across several business functions.
a. false
-
In business processes, resources are collections of procedures.
a. false
-
In cross-functional business process management, __________.
c. BPM authority is shared across several departments in a single company
-
Tasks in the ________ phase of the system development process are to build, test, and convert the users to the new system.
d. implementation
-
According to Brooks' Law, adding more people to a late project makes the project later.
b. true
-
In a BPMN process diagram, the swim-lane layout is used to simplify process diagrams and to draw attention to interactions among components of the diagram.
b. true
-
Organizations should avoid the plunge installation style unless the new system is providing a new capability that will not disrupt the operation of the organization if it fails.
b. true
-
The ________ stage of the information systems development process involves identifying what is to be produced, how frequently and how fast it is to be produced.
a. requirements analysis
-
A data flow is the movement of data from one activity or another or from an activity to a repository.
b. true
-
Which of the following is NOT one of the five components of an information system?
d. policies
-
In a BPMN process diagram, a ________ represents the start of a process.
c. circle
-
In BPMN, all activities for a given role are shown in that role's swim lane.
b. true
-
According to Brooks' Law, adding more people to a system development project will ________.
c. delay the project's completion
-
The situation that occurs when adding more resources creates inefficiencies is known as ________.
a. diseconomies of scale
-
A ________ installation is the riskiest because the old system is turned off and the new system is turned on.
d. plunge
-
User involvement is critical throughout the system development process.
b. true
|
|