-
In a BPMN process diagram, all activities for a
given role are shown in that role's ________.
Swim lane
-
The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources.
Configuration control
-
The situation that occurs when adding more
resources creates inefficiencies is known as ________.
Diseconomies of scale
-
In a BPMN process diagram, a ________ represents an activity.
Rectangle w/ rounded corners
-
In a business process, a role refers to ________.
A collection of activities
-
In the SDLC, the first major task for an
assembled project team is to ________.
Plan the project
-
In paired programming ________.
Two team members share the same computer to write a computer program together
-
The Information Systems Audit and Control Association has created a set of standard practices called ________ that are often used in the assessment stage of the BPM cycle.
COBIT
-
The resulting project plan from the system
definition is the input to the second SDLC phase, which is ________.
Requirement analysis
-
________ is a standard set of terms and graphical notations for documenting business processes.
Business Process Modeling Notation
-
Which of the following is true of information
systems?
Every information system has at least one application
-
A ________ is a person who is well versed in an organization's strategy and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies.
Business analyst
-
A ________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function.
Business process
-
In BPMN, ________ depict the flow or sequence of activities in a process.
Solid lines
-
The rapid application development, the unified
process, extreme programming, and Scrum are examples of ________.
SLDC
-
During the requirements definition stage of
developing an information system, the project team will include mostly ________.
Business and systems analysts
-
In business process management, once the as-is model is created, the very next step that a team must take is to ________.
Create system components
-
Fixing a system so that it works correctly, or
adapting it to changes in requirements, occurs in the ________ phase of the SDLC.
Maintenance
-
________ include identifying what is to be
produced, how frequently and how fast it is to be produced.
Requirements
-
The final WBS plan is denoted as the ________ WBS, and it shows planned tasks, dependencies, durations, and resource
assignments.
Baseline
-
The ________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes.
OMG
-
The first step in the system definition phase of
systems development is to ________.
Determine the goals and scope
-
Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system.
Implementation
-
The final phase of systems development involves ________.
Maintaining the system
-
A ________ shows the tasks, start and finish
dates, and dependencies for the tasks of a project.
Gantt chart
-
Once we have defined a project's goals and
scope, the immediate next step is to _______.
Access feasibility
-
Project teams create a ________, which is a
hierarchy of the tasks required to complete a project.
Work-breakdown structure
-
An as-is model ________.
Documents the current situation of a business process
-
A(n) ________ is a formal description of a
system's response to use and misuse scenarios.
Test plan
-
In a business process, resources are _______.
People or computer applications that are assigned to roles
-
The ________ is a sequence of activities that determines the earliest date by which a project will be completed.
Critical path
-
When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________.
Vendor
-
Which of the following is true about outsourcing?
It saves both direct & indirect management time
-
Users should not bother IS personnel for trivial
issues, so they have a responsibility to _______.
Learn basic computer skills
-
Which of the following statements is true of the operations group in an organization's IS department?
It monitors the user experience & responds to user problems
-
Which of the following is a right of users of
information systems?
Receiving effective training according to their requirements
-
________ is the process of hiring another
organization to perform a service.
Outsourcing
-
Outsourcing gathers all of the possible risks
into the risk of choosing the right ________.
Vendor
-
Which of the following is NOT a function of the
information systems department?
Conducting external audits
-
If the primary information systems in an
organization support only accounting and finance activities, the CIO should most likely report to the ________.
CFO
-
In organizations that operate significant
nonaccounting information systems, the chief information officer is most likely to report to the ________.
Chief executive officer
-
Which of the following is a function of the
technology office in an organization's IS department?
Investigating new IS technologies
-
Which of the following is an outsourcing
alternative, in which hardware and both operating system and application software are leased?
Software as a service (SaaS)
-
In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.
Development
-
A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
System analyst
-
In 2005, Marriott International chose Hewitt
Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing.
Business function
-
The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies.
Data administration
-
Which of the following is a risk of outsourcing
IS/IT functions?
It involves the potential loss of intellectual capital
-
Which of the following is true about the "maintenance" of information systems?
It involves fixing problems or adapting existing systems to support new features
-
Which of the following is an example of a company that offers SaaS?
Salesforce.com
-
Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.
Information systems
-
International outsourcing companies like Amazon.com are particularly advantageous as they provide ________.
Customer support
-
The responsibilities of a computer technician
include ________.
Installing software & repairing networks
-
Users of smart cards are required to enter a
________ to be authenticated.
Personal identification number
-
You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
https
-
________ involve the people and procedure
components of information systems.
Human safeguards
-
________ is a technique for intercepting
computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.
Sniffing
-
What is a major difference between spyware and adware?
Unlike spyware, adware does not perform malicious acts
-
________ is the process of transforming clear
text into coded, unintelligible text for secure storage or communication.
Encryption
-
________ are the primary means of authentication and are important not just for access to a user's computer, but also for
authentication to other networks and servers to which the user may have access.
Passwords
-
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers,
Social Security numbers, account passwords, and so forth.
Phisher
-
Which of the following statements is true of
biometric identification?
It often faces resistance from users for its invasive nature
-
A(n) ________ has a microchip in it to hold data.
Smart card
-
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to achieve ________.
Physical security
-
The process of hardening is actually a _______
safeguard.
Technical
-
A ________ is a type of virus that propagates
using the Internet or other computer networks.
Worm
-
A ________ is a person or organization that
seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.
Threat
-
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee
data, and other proprietary and confidential data.
Hacking
-
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
HIPAA of 1996
-
Which of the following is an example of a technical safeguard?
Firewalls
-
________ enable you to access Web sites without having to sign in every time.
Cookies
-
________ is a staff function to the chief information officer.
Data administration
-
Which of the following is an example of a sniffing technique?
Adware
-
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
IDS
-
A ________ examines each part of a message and determines whether to let that part pass.
Packet-filtering firewall
-
Which of the following is considered a threat
caused by human error?
An employee inadvertently installs an old database on top of the current one
-
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing
to spy, steal and manipulate data, or other purposes.
Usurpation
-
_______ present the largest risk for an organization's infrastructure loss.
Natural disaster
-
Secure Socket Layer is also known as ______.
Transport layer security
-
Which of the following is true of the Secure Socket Layer (SSL)?
It is a useful hybrid of symmetric and asymmetric encryption techniques
-
________ occurs through human error when
employees do not follow proper procedures or when procedures have not been well designed.
Incorrect data modification
-
If a defined project is determined to be feasible in the SDLC, the immediate next step is to ________.
Form the project team
-
________ set the stage for the requirements or any information systems and applications that need to be created or adapted.
Business process models
-
With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.
Parallel
-
A ________ involves balancing of three critical factors: requirements, cost, and time.
Trade-off
-
According to Brooks' Law, adding more people to a late project will ________.
Create diseconomies of scale
-
A ________ installation is the riskiest because
the old system is shut down and the new system is introduced.
Plunge
-
According to the Scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________.
Points
-
According to the SDLC, progress of a business process goes in a linear sequence from requirements to design to implementation. This is called the ________.
Waterfall method
-
Once a system has passed integrated testing, the organization installs the new system. Which term is used to refer to this activity?
System conversion
-
In systems development, documents, designs, prototypes, data models, database designs, working data entry screens, and the like are examples of ________.
Deliverables
-
The first phase of systems development involves ________.
Defining the system
-
Which of the following is true for the relationship between business processes and information systems?
A business process need not relate to any information system, but an information system relates to at least one business process.
-
The traditional technique for developing information systems is ________.
The system development life cycel
-
Plunge installation is sometimes called _______ installation.
Direct
-
What are the four dimensions of feasibility?
Cost, schedule, technical, and organizational feasibility
-
In BPMN diagrams, a square with a plus sign means that ____.
An activity is independent of the process
-
_____ are collections of related tasks that receive inputs and produce outputs
Activities
-
Which of the following is a form of hardware outsourcing?
IaaS cloud hosting
-
One of the reasons outsourcing is undertaken is to ________.
Cap an organization's financial exposure
-
The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.
Chief technology officer
-
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
Technical writer
-
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.
Steering committee
-
Which of the following is true about IS infrastructure?
Changing IS infrastructure is expensive and time-consuming
-
____ is a form of outsourcing.
Acquiring licensed software
-
The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.
Chief information officer
-
Which of the following is a critical security function of senior management in an organization?
Establishing the security policy and managing risk
-
An SQL ________ occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
Injection attack
-
The Privacy Act of 1974 provides protection to
individuals regarding ________.
Records held by the U.S. government
-
Which of the following is generally a responsibility of users of information systems?
Following security and backup procedures
-
Which of the following is true about users of information systems?
They must learn standard techniques and procedures for the applications they use
-
Which of the following is a function of the steering committee for an IS department?
Setting IS priorities
-
Which of the following statements is true about the steering committee of an IS department?
Its meetings are conducted by the IS department
-
If an organization does not develop programs
in-house, then the development group of the IS department will be staffed primarily by ________.
Business and systems analysts
-
Which of the following systems procedures is specifically the responsibility of operations personnel?
Creating back up system database
-
A ________ is a number used to encrypt the data.
Key
-
________ are viruses that masquerade as useful programs or files.
Trojan horses
-
In asymmetric encryption, each site has a ________ for encoding messages.
Public key
-
In a locked room, maintaining the computers of an organization that run the DBMS is a part of ________.
Physical security procedures
-
In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
Manufacturing
-
Which of the following is true about the changes and developments foreseen for 2023?
Most organizations will more their internal hardware infrastructure into the cloud
-
As an IS user, you have a right to a secure computing environment. This means that ________.
The organization should protect your computer and its files
-
Organizational feasibility concerns whether the
new system aligns with ________.
Legal requirements
-
Which of the following statements about human safeguards for employees is true?
Users' computer accounts should give users the least possible privilege necessary to perform their jobs
-
________ protect databases and other organizational data.
Data safeguards
-
Which of the following is used for biometric authentication?
Facial features
-
________ are false targets for computer criminals to attack.
Honeypots
-
Which of the following would be the most disruptive to an organization when implementing an information system?
Changing reporting relationships
-
Abstract reasoning is the ability to ______.
Make and manipulate models
-
Which of the following is the least critical aspect of good information?
Additional data
-
The five-component framework considers individuals who maintain the data and who support the networks of computers as ______ components.
-
You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is _______.
Inaccurate
-
_____ states that the number of transistors per square inch on an integrated chip doubles every 18 months.
Moore's Law
-
Which of the following components in the five-component model of information system is considered an actor?
Hardware
-
The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the details of each invoice drawn up in the previous quarter. This information is not good because it is ________.
More that what is required
-
Which of the following is true about the quality of information?
-
The storage disk in your computer is an example of the _____ component of information systems.
Hardware
-
Which of the following is a common description of information?
Knowledge derived from data
-
Vera wants to create a password. Which one is the strongest?
NOOCSmypw$42
-
Which of the following types of skills is most likely be outsourced to the lowest bidder?
Accounting skills
-
Which of the following is a major implication of Moore's Law?
Costs of data communications and storage have become very low
-
Which of the following statements is true of good information?
Good information should be based on correct and complete data
-
Which of the following is a component of an information system, but not of information technology?
People
-
Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
Buying and installing new computers in the new outlets
-
You follow certain steps to access the supplementary readings for a course when using your organization's library management system. These steps that you follow are examples of the________ component of an information system.
Procedure
-
Which of the following components of information system is the easiest to change and causes the least amount of organizational disruption when changed?
Hardware
-
Glazer & Hicks is a firm that offers enterprise software solutions to independent retailers. The firm recently bagged a contract from a major national retail chain to develop and implement proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?
Training the employees to use and manage the new system
-
Identify how information technology differs from information systems.
You can buy information technology, but not information systems
-
According to the five-component model of information systems, the ______ component function as instructions for the people who use the information system
Procedure
-
You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.
-
____ is the activity of two or more people working together to achieve a common goal, result, or work product.
Collaboration
-
Good information must be _____.
Relevant
-
The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.
Data
-
Which of the following statements regarding information technology (IT) is true?
Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information.
-
The words that you type in a MS Word document is an example of ______.
Data
-
Which of the following is a valid guideline for maintaining good password etiquette?
Never ask someone else for their password
-
Which of the following is a low-tech information system?
A file of email addresses stored in an email program
-
Which of the following is a non routine cognitive skill?
System thinking ability
-
Which of the following ratios has fallen as a result of Moore's Law?
-
You have a spreadsheet that provides the airfares to different cities from New York. If this is used to make a decision, it will be considered as ________.
Data
-
Which of the following components constitute the computer side of information systems?
Hardware and software
-
An operating system like Windows or Linux is an example of the ________ component of an information system.
Software
-
You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.
Irrelevant
-
Which of the following is the best description of data?
Recorded facts or figures
-
Kerin is a business student interning at Benson and Hodgson, a firm specializing in exports of sophisticated equipment to other countries. She finds that she is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that she lacks ________ skills.
Abstract reasoning
-
Which of the following is a critical characteristic of good information?
Accuracy
-
Which of the following components constitute the human side of information systems?
People and procedures
-
You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill.
Systems thinking
-
The process of automation is a process of moving work from ________.
Human side to computer side
-
Adobe Acrobat is an application that allows users to create and edit digital documents. Adobe Acrobat is an example of a ________.
Software
-
Identify how information technology differs from information systems.
-
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
Systems thinking
-
As the IT manager of your organization, you need to use a coworker's account to access some information. In keeping with password etiquette, how would you go about getting his password?
You ask the coworker to type in the password where required, while you look away
-
The hardware components of an information system will act as a(n) ________.
Actor on the computer side
-
A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________ component.
Data
-
The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.
Irrelevant
-
Which among the following is the most appropriate technique for creating memorable, strong passwords?
Base your password on the first letter of the word in a phrase
-
The use of a conference call is an example of ________ communication.
Synchronous
-
The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
Strategic
-
Which of the following is an example of a strategic decision?
Deciding to open a centralized distribution system
-
Version-management systems ________.
Track changes to shared documents
-
Which of the following alternatives for sharing content provides version control?
Microsoft SharePoint
-
Collaboration occurs when a number of people ______.
Work together to achieve a common goal
-
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________phase of project management.
Planning
-
Being ________ is one of the most important characteristics of an effective collaborator.
Able to give negative feedback
-
Who is most likely to use asynchronous communication?
Members of a team who work in different time zones
-
One of the procedures of a collaboration project is task status reporting. This is performed in the _____ phase of the project.
Doing
-
______ communication occurs within a team when all team members meet at the same time.
Synchronous
-
Which of the following questions is best answered through unstructured decision making?
Should we continue to outsource our bookkeeping process?
-
Which of the following is a feature of Microsoft Lync?
Multi-party text chain
-
_____ decisions are decisions that support day-to-day activities
Operational
-
Which of the following is a comprehensive tool for content sharing?
SharePoint
-
Identify the project management phase in which the tasks of a project are performed.
Doing
-
The main purpose of the planning phase in a project is to ________.
Determine who will do what and by when
-
A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following is lacking in this activity?
Collaboration
-
A project manager has to manage tasks and budgets and solve problems during the ________ phase of project management.
Doing
-
Andrea, the floor supervisor at a call center, calls Bryan, a call attendant, to her office. She reports observing a few critical omissions in his calls, a finding supported by recent customer surveys. Bryan feels that Andrea is just throwing her weight around. Which of the following is a valid observation of this scenario?
Bryan needs to learn to receive feedback
-
With version-control systems, shared documents are placed into shared directories called ______.
Libraries
-
Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function?
Finalizing
-
Asynchronous communication occurs when team members________.
Do not meet at the same time
-
A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making.
Unstructured
-
________ decisions are the most structured and have very little need for collaboration.
Operational
-
Identify the least important characteristic for an effective collaborator.
Being an experienced businessperson
-
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.
Structured
-
________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.
Version control
-
Which of the following is a primary purpose of collaboration?
Becoming informed
-
_____ is a popular commercial webinar product used in virtual sales presentations.
WebEx
-
The fundamental purpose of the starting phase of a project is ______.
Setting the ground rules for the collaboration
-
Which of the following information system requirements fall into the content sharing category?
Tracking versions of many documents
-
The decisions about team members' roles and authorities is made during the _____ phase of a project.
Starting
-
Project metadata is data that is ________.
Utilized to manage the project
-
Which of the following observations about the relationship between decision type and decision process is true?
The higher levels of decision making are associated with unstructured decision processes
-
Which of the following statements is true about working with Google Drive?
Google tracks document revisions, with brief summaries of changes made
-
An organization defines the rules that govern a project that it needs to undertake and the people who should perform the tasks. The project is in the ________ phase of project management.
Finalizing
-
The need for collaboration is greatest for ________ decisions.
Strategic
-
Which of the following decisions is least likely to involve collaboration?
How much of product A should be ordered from vendor B
-
The term ________ refers to a collaboration tool where team members can easily respond and the management can easily identify the people who have not responded to a request.
Wikis
-
Which of the following is a key difference between strategic decisions and managerial decisions?
Managerial decisions concern allocation and utilization of resources, whereas strategic decisions concern organizational issues.
-
Using a standardized procedure to calculate the incentives of employees is an example of a(n)________ decision.
Structured
-
Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.
Managerial
-
Which of the following is a reason why discussion forums are better than emails in asynchronous communication?
They keep the discussion from getting off track
-
According to Hackman, which of the following is a primary criterion for judging team success?
Growth in team capability
-
Which of the following collaboration activities is mainly concerned with content sharing rather than communication?
Iteration
-
Which of the following tools facilitates asynchronous communication?
Discussion forum
-
Project data is data that is ________.
Part of the collaboration's work product
-
Which of the following is an example of project data?
Design document
-
Project leaders have to take decisions on the allocation and utilization of materials and labor. Such decisions are called ________ decisions.
Managerial
-
A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
Inbound logistics
-
According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market?
Military services
-
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?
A firm that sells the only drug used for a disease
-
Which of the following is a support activity in the value chain?
Setting up contractual arrangements for procurement
-
Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?
Customer service
-
Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
Inbound logistics
-
Which of the following principles of competitive advantage is associated with product implementations?
Differentiating service offerings
-
The difference between the value that an activity generates and the cost of the activity is called the ________.
Margin
-
ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC Motors is characterized by ________.
High bargaining power over its suppliers
-
Porter's five forces model is used to assess ________.
Industry structure
-
Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
Outbound logistics
-
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
Outbound logistics
-
According to Porter's model of business activities, interactions across value activities are called ________.
Linkages
-
The difference between the total value added and the total costs incurred is called the ________ of the value chain.
Total margin
-
A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________.
Establishing alliances
-
A ________ is a collection of something, such as data and raw materials.
Repository
-
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
Switching costs
-
RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than its competitors and uses tamperproof containers to ship its products. RedDart distinguishes itself from competitors by ________.
Providing an enhanced service
-
According to Porter's five forces model, in which of the following situations would the suppliers have the highest bargaining power?
A single vendor providing raw materials to many department stores
-
A group of grain farmers in a surplus year will have reduced ________.
Bargaining power
-
Which of the following principles of competitive advantage is related to process implementations?
Locking in suppliers
-
Porter defined value as the ______.
Amount of money that a customer is willing to pay for an offering
-
Focused differentiation occurs when ________.
A better product is provided within an industry segment
-
Organizations can lock in suppliers by making it difficult to switch to another organization or by ________.
Making it easy to work with the organization
-
PowerCruise, a holiday cruise firm, recently offered its existing customers, who had registered for a two-year membership, an extension of six months to their membership without any additional charges. By doing this, which competitive strategy did PowerCruise implement?
Locking in customers
-
According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?
Southwest Airlines
-
Which of the following value chain activities involves transforming raw materials into a finished product or service?
Operations
-
A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. The strategy used is ________.
Switching cost strategy
-
N-joi Ice Cream recently faced competition against their flagship brand of "black currant ice cream." The competitor made significant in-roads into this market by offering three varieties of "black currant ice cream." N-joi decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is N-joi implementing?
Product differentiation
-
Which of the following statements is consistent with the central idea of business process design?
Organizations should create new business processes rather than improve existing systems.
-
Bargaining power of customers is likely to be the highest for markets involving ________.
Industrial products
-
A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.
Low threat of substitutions
-
Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?
Sales and marketing
-
Which of the following is a primary activity in the value chain?
Receiving and disseminating inputs to the product
-
A database is an example of a ________.
Repository
-
Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz has ________.
Created an entry barrier
-
The automobile industry is characterized by many manufacturers and intense competition among them. This statement illustrates ________.
High levels of rivalry
-
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-enabled games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing?
Product differentiation
-
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
Business process
-
July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing?
Locking in customers
-
In a manufacturing business, the ________ transforms finished goods into cash.
Sales process
-
________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.
Business process design
-
Reduction in production cost results in ______.
Increased profitability
-
Focused cost leadership is observed when a product has the lowest cost ________.
Within an industry segment
-
An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that?
Establishing alliances
-
The cost of the business process is the sum of the cost of the inputs and the ________.
Cost of the activities
-
An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________.
Industry-wide differentiation
-
Mae manages delivery at a custom-kitchen outlet. Based on her customer's feedback, she contacts Gem Cabinets and places an order for a full-motion wall mount. Which of the following primary activities is Mae performing here?
Inbound logistics
-
Which of the following factors determines the structure, features, and functions of an information system used in a company?
The competitive strategy
-
Which of the following devices is an example of a storage hardware device?
Optical disk
-
Main memory is also known as ________.
Random access memory
-
A spreadsheet program is an example of a(n) ________.
Horizontal-market application software
-
Which of the following statements is true of closed source projects?
Only trusted programmers are allowed to make changes to a closed source project
-
When you buy an operating system for your personal computer, you are actually buying a software ________.
License
-
10 TB is equivalent to ______ gigabytes
10,240
-
Linux applications are developed using ________.
Java
-
Which of the following is the operating system designed by Apple?
Mac OS
-
A ________ is equivalent to 1,024 bytes.
Kilobyte
-
Which of the following is a nonvolatile memory device?
Optical memory device
-
Programs that perform business functions, such as general ledger and accounting, are known as ________.
Application software
-
Mac OS and iOS applications are constructed using _______.
Objective C
-
Which of the following is an output device?
Projector
-
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.
PC virtualization
-
Which of the following terms refers to a collection of servers?
Server farm
-
Which of the following is an example of an application program?
Microsoft Word
-
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access.
Mobile device
-
A user interface (UI) is the ________ format of an application.
Presentation
-
Which of the following is an advantage to the organization, if its BYOD policy offers wireless network to mobile devices?
The organization can sniff employee's mobile traffic
-
Thin-client applications are limited by the capabilities of the ________.
Browser
-
The term "open source" means that the source of the code of the program is ____.
Available to the public
-
Linux is an example of a(n) ____.
Open source operating system
-
Thin-client applications are developing using ___.
HTML5
-
Bits are grouped into 8-bit chunks called ____.
Bytes
-
Machine code ________.
Cannot be modified by humans
-
Which of the following terms refers to the process of a single server hosting many versions of desktop operating systems?
Desktop virtualization
-
With ________, a computer, such as a desktop or portable computer, hosts several different operating systems.
PC virtualization
-
Which of the following is a function of an application program?
Accessing a customer database
-
________ is installed in special, read-only memory in devices like printers or communication devices.
Firmware
-
Bits are used for computer data because they ________.
Are easy to represent electronically
-
Server application programs are programs that ________.
Are processed on server computers
-
An application that requires support beyond a browser on the user's computer is known as a(n) ________.
Thick-client application
-
________ is data delivered to the user at the precise time it is needed.
Just-in-time data
-
Which of the following memory devices is volatile in nature?
Cache
-
Which of the following is an example of an open source operating system?
Ubuntu
-
Android applications are developed using _______.
Java
-
Which of the following is an open source browser?
Firefox
-
________ is a version of Unix that was developed by an open source community.
Linux
-
To run a program or process data, the computer first transfers the program or data from disk to the ________.
Main memory
-
Which of the following is an example of a closed source project?
Microsoft Office
-
A client-server application that nothing more than a browser is called a ________.
Thin-client application
-
Which of the following statements is true of firmware?
Users do not need to load firmware into a device's memory
-
________ occurs when users move their activities, especially long-running transactions, across devices.
Roaming
-
When using volatile memory, the ________.
Contents are lost when power is off
-
DenTimes, a software package for dentists, is an example of a ________.
Vertical-market application software
-
Which of the following is an example of a vertical-market application software?
Inventory tracking software for an auto manufacturer
-
Which of the following is an input hardware device?
Bar code scanner
-
________ install and update software, back up and restore mobile devices, wipe software and data from devices in the event the device is lost or the employee leaves the company, report usage, and provide other mobile device management data.
MDM software
-
In a data model, a(n) ________ is something that a user wants to track.
Entity
-
Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.
Development
-
A ________ is a collection of forms, reports, queries, and programs that process a database.
Database application
-
From among the following, identify the open source DBMS product.
MySQL
-
Which of the following types of DBMS products is designed for smaller and simpler database applications?
Personal DBMS
-
Which of the following is a nonrelational data store developed by Amazon?
Dynamo
-
A(n) ________ is a program used to create, process, and administer a database.
DBMS
-
________ is an example of a personal DBMS.
Access
-
When you modify or delete data present in a database, you are ________.
Processing the database
-
In a database, when data items disagree with one another, this leads to a(n) _______.
Data integrity problem
-
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________.
Entities
-
A ________ is a request for data from a database.
Query
-
Which of the following data elements is placed higher than records in the data hierarchy?
File
-
A(n) ________ DBMS is designed to process large organizational and workgroup databases.
Enterprise
-
A data integrity problem will occur only if ________.
Data are duplicated
-
Which of the following is a nonrelational data store developed by Google?
Bigtable
-
Which of the following is the smallest data element in a database?
Byte
-
A primary key used in a database is a _____.
Column or group of columns that identifies a unique row in a table
-
Which of the following is a valid observation of MySQL?
It is license-free for most application
-
The purpose of a(n) ________ is to keep track of things.
Database
-
Which of the following is an example of an enterprise DBMS?
SQL Server
-
Which of the following is true about the database development process?
Changing a relationship from 1:N to N:M is simply a matter of changing the notations
-
Entities in a data model have _____ that describe the characteristics of the entity.
Attributes
-
A database design team transforms entities into tables and expresses relationships by defining ________.
Foreign keys
-
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.
Query
-
Identify the first step in transforming a data model into a relational database design.
Creating a table for each entity
-
A ________ describes the data and relationships that will be stored in a database.
Data model
-
Which of the following database administration tasks is related to adaptation?
Managing configuration changes in systems
-
________ is the process of converting a data model into tables, relationships, and data constraints.
Database design
-
When using the relational model to represent data, one must ________.
Add a foreign key to one of the tables
-
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required.
Vertical bar
-
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
N:M
-
An organization buys a proprietary database application to be used by a small workgroup of five people. This is an example of a(n) ________ DBMS.
Personal
-
The database administrator of an organization constantly manages the processing rights and responsibilities of employees. This is an example of a(n) ________ task.
Operational
-
A data model is a ________.
Logical representation of database data
-
Every table in a normalized database has ________.
Single theme
-
Which of the following is true of N:M relationships?
They can have more than one entity on each side of the relationship
-
Which of the following is a nonrelational data store developed by Facebook?
Bigtable
-
________ forms are used to read, insert, modify, and delete data.
Data entry
-
Metadata are ____.
Data that describes data
-
The rows in a database are called ________.
Records
-
Which of the following is an example of a database management system?
Access
-
The forked lines on the right side of a line on an diagram that indicates a 1:N relationship between two entities is referred to as ________.
Kerberos
-
An administrator should create ________ before developing a database design.
Data model
-
Which of the following is a developmental task of database administration?
Creating and staffing the DBA function
-
Minimum cardinalities in an E-R diagram refer to the minimum number of entities required in a(n) ________.
Relationship
-
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
Users
-
What are the three tiers in three-tier architecture?
User, server, and database
-
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.
Switch
-
________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.
Cable
-
A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.
Router
-
A(n) ________ is a piece of a message that is handled by programs that implement IP.
Packet
-
A(n) ________ is a number that identifies a particular device.
IP address
-
A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.
HTML tag
-
For a printer or laptop to connect to a wireless LAN, it must have a ________.
WNIC
-
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
Network
-
A ________ is a worldwide-unique name that is affiliated with a public IP address.
Domain name
-
Which of the following TCP/IP application-layer protocols is used for email transmission?
SMTP
-
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.
IP
-
________ is the most common language for defining the structure and layout of Web pages.
HTML
-
Which of the following is true of DSL modems?
DSL modem signals do not interfere with telephone signals
-
Which of the following is the most basic cloud offering?
IaaS
-
The IEEE 802.3 protocol standard is also known as ________.
Ethernet
-
The organization responsible for assigning public IP addresses is called ________.
ICANN
-
Which of the following statements is true about the IEEE 802.11 protocol?
It allows speeds of up to 600 Mbps
-
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?
FTP
-
A private internet that is used exclusively within an organization is called a(n) ________.
Intranet
-
The top layer of TCP/IP Protocol architecture is related to ________.
Applications
-
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.
Layered protocol
-
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.
Bluetooth
-
________ typically have transmission speeds less than 56 Kbps.
Narrowband lines
-
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
Web servers
-
Which of the following statements is true about IEEE 802.3?
It is the protocol for wired LAN connections
-
Which of the following is the most common format for IP addresses?
IPv4
-
Communications speeds are expressed in ____.
Bits
-
Communications speeds are expressed in _____.
Hyperlink
-
A(n) ________ uses the Internet to create the appearance of private point-to-point connections.
VPN
-
Compared to in-housing hosting, cloud-based hosting _____.
Minimizes the risk of investing in technology that will soon become obsolete
-
A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services?
PaaS
-
In cloud computing, resources are said to be "pooled" because ________.
Organizations share the same physical hardware through virtualization
-
Amazon S3 (Simple Storage Service) is an example of ________.
IaaS
-
An HTML document has a(n) ________ that provides metadata about the page.
Heading
-
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?
The cloud
-
A ________ is a set of rules that programs on two communicating devices follow.
Protocol
-
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?
HTTP
-
An ________ and its value indicate which Web page is to be displayed when a user clicks on a link.
href
-
Which of the following is true about a VPN?
It encrypts messages to ensure secure transmissions
-
Which of the following is an example of IaaS?
Amazon EC2
-
Computers that reside in different geographic locations are connected using a(n) ________.
WAN
-
Which of the following is a function of an ISP?
It serves as a gateway to the Internet
-
Which of the following is an example of a PaaS?
Oracle on Demand
-
Which of the following protocols guarantees secure data transmission?
HTTPS
-
Most LAN connections are made using ________.
UTP cable
-
Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?
Training employees on the successful use of the new system
-
Which ERP vendor acquired PeopleSoft and Siebel?
Oracle
-
Which of the following is a characteristic of dynamic processes?
They are adaptive processes that change structure rapidly and readily
-
The information system that a restaurant uses to order supplies and ingredients from its suppliers is an example of a(n) ________.
Inter-enterprise information system
-
Which of the following statements is true of enterprise application integration?
It connects system "island" via a new layer of software
-
Which of the following workgroup processes is related to customer service?
Accounting tracking
-
________ refers to a person's belief that he or she can be successful at his or her job.
Self-efficacy
-
The inherent processes defined in an ERP solution are known as ________.
Process blueprints
-
________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
Enterprise resource planning
-
Enterprise application integration is ________.
A suite of software application that consolidates existing systems by providing layers of software that connects applications together
-
Which of the following workgroup processes is related to sales and marketing?
Lead tracking
-
The major benefit of enterprise application integration is that it ________.
Enables organization to use existing applications
-
________ is a measure of the ratio of process outputs to inputs.
Process efficiency
-
________ are predesigned procedures for using software products.
Inherent processes
-
Process ________ is a measure of how well a process achieves organizational strategy.
Effectiveness
-
The two dimensions of process quality are ________.
Efficiency and effectiveness
-
To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.
Industry-specific soultions
-
When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is ________.
Developing committees and steering groups
-
ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category?
Steps for using the application to accomplish the activities in processes
-
Which of the following statements about a structured inter-enterprise information system is true?
Its procedures are formalized and the problem solutions affect multiple organizations
-
________ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.
Customer relationship management
-
________ is an example of an inter-enterprise information system.
PRIDE
-
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product?
Relationship management
-
________ processes span an organization and support activities in multiple departments.
Enterprise
-
________ are flexible, informal, and adaptive processes that normally involve strategic and less specific managerial decisions and activities.
Dynamic processes
-
________ is a major task when implementing enterprise systems.
Gap identification
-
A stored procedure is a ________.
Computer program stored in a database that is used to enforce business rules
-
Which of the following information systems minimizes data duplication among departments?
Enterprise information systems
-
A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise.
Trigger
-
________ is one of the SOA protocols.
OData
-
Which of the following is an example of a structured process?
Purchasing raw materials
-
ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________.
Train the trainer
-
The four major ERP products of ________ are AX, Nav, GP, and Solomon.
Microsoft Dynamics
-
Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects?
Marketing
-
ERP vendor Infor acquired which of the following ERP products?
Baan
-
Which of the following is true of SOA?
It enables the requesting and releasing of cloud resources.
-
________ is the activity of altering and designing business processes to take advantage of new information systems.
Business process reengineering
-
_______ are formally defined, standardized processes that involve day-to-day operations.
Structured processes
-
Which of the following workgroup processes is related to human resources?
Assessment
-
The primary purpose of an ERP system is _____.
Integration
-
Which of the following conditions exists when data are isolated in separated information systems?
Information silo
-
Which of the following is an example of a dynamic process?
Nike uses Facebook and Twitter to generate buzz about its new line of running shoes
-
The top two ranked ERP vendors are ________.
Oracle and SAP
-
Which of the following workgroup processes is related to manufacturing?
Planning and scheduling
-
Which of the following statements is true regarding workgroup information systems?
They support 10 to 100 users
-
Information systems improve process quality by ________.
Controlling process flow
-
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
Sponsors
-
________ is the application of social media to facilitate the cooperative work of people inside organizations.
Enterprise 2.0
-
The Web 2.0 business model relies on _______for revenue.
Advertising
-
To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.
Strength of a relationship
-
Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?
Possibility of error
-
Highest advertising revenue is generated from ________.
Mobile users
-
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.
Defenders-of-belief
-
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
Social capital
-
________ measures the frequency that someone who clicks on an ad makes a purchase, Likes a site, or takes some other action desired by the advertiser.
Conversion rate
-
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
Extensions
-
Deleting problematic content on social networking sites is best reserved for when ________.
The content is obscene and inappropriate
-
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.
Social
-
Web 2.0 companies provide software _______.
As a free service
-
A(n) ________ is a person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
Key user
-
Defenders-of-belief communities facilitate activities like ________.
Sales and marketing
-
Which of the following best represents the value of social capital?
Number of Relationships X Relationship Strength X Entity Resources
-
Web 2.0 as Web-delivered services and content that are paid for by ________.
Advertising
-
A characteristic of Web 2.0 is that the value of a Web site increases ________.
With the number of users
-
A ________ is content structure that has emerged from the processing of many user tags.
Folksonomy
-
The first step that any hypersocial organization should take is to develop and publicize a(n) ________ policy.
Social media
-
Which of the following revenue model is followed by companies providing Web 2.0 services?
Pay per click
-
Which of the following is a significant risk of using social media for inbound and outbound logistics?
Loss of privacy
-
________ is the essence of SM relationships.
User-generated content
-
Which of the following observations is true about a hypersocial organization?
It creates relationships in which both parties perceive and gain value
-
Which of the following statements is true of defenders-of-belief communities?
They seek conformity and want to convince others of the wisdom of their belief
-
Emergence in the context of management means loss of control of ________.
Employees
-
Which of the following is true of the model of social media developed by Gossieaux and Moran?
It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.
-
Which of the following activities would seekers of the truth facilitate?
Operations
-
________ differentiates SMIS from Web site applications.
Connection data
-
Social capital depreciates, but such depreciation can be ameliorated by ________.
Adding something of value to the interaction
-
Being linked to a network of highly regarded contacts is a form of ________.
Social credential
-
SM communities differ from communities in the past because SM communities are ________.
Formed based on mutual interests
-
________ is the use of information technology to support the sharing of content among networks of users.
Social media
-
________ is data and responses to data that are contributed by users and SM sponsors.
Content data
-
A ________ is an inducement for passing the message along through the tiers.
Viral hook
-
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.
Authoring
-
Which of the following is an SM application provider?
LinkedIn
-
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.
Seekers of the truth
-
The primary risk of peer-to-peer support is ________.
Loss of control
-
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component.
Signals
-
If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.
Leave it
-
A student invests money and time in taking a business administration course. In this example, the student invests in ________.
Human capital
-
Which of the following describes the meaning of "sense" activity, in the SEAMS dynamic process?
The communities which are important to a person
-
Which of the following is one of the main principles used by companies implementing Web 2.0 to attract viewers?
Free content
-
Web 2.0 encourages ________, which occur when the output from two or more Web sites is combined into a single user experience.
Mashups
-
A social media policy is a statement ________.
That delineates employee's rights and responsibilities
-
Responding to problematic content on social networking sites is best reserved for when ____.
The problematic content has caused the organization to do something positive as a result
-
In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y," or "If they're buying Y, sell them X."
Cross-selling
-
OLAP stands for ________.
Online analytical processing
-
KM benefits organizations because it ________.
Enables employees and partners to work smarter
-
In market-basket terminology, ________ describes the probability that two items will be purchased together.
Support
-
Which of the following statements is true about reporting applications?
Two important reporting applications are RFM analysis and OLAP
-
Which of the following is a basic operation used by reporting tools to produce information from data?
Calculating
-
Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor.
Curse of dimensionality
-
Which of the following shows the products that customers tend to buy together?
Market-basket analysis
-
________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.
RFM
-
Which of the following is fundamental category of BI analysis?
Data mining
-
A sales report that is current, as of the time the user accessed it on a Web server, is an example of a(n) ________.
Dynamic report
-
BI servers use ________ to determine what results to send to which users and on which schedule.
Metadata
-
________ is a hierarchical arrangement of criteria that predict a classification or a value.
A decision tree
-
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.
Supervised data mining
-
The ________ is the most popular BI server today.
Microsoft SQL Server Report manager
-
Which of the following statements is true about data marts?
Data marts address only a particular component or functional area of business
-
With ________, statistical techniques can identify groups of entities that have similar characteristics.
Cluster analysis
-
________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.
Content Management Systems (CMS)
-
A data ________ is a data collection, smaller than the data warehouse, that addresses a particular department or functional area of the business.
Mart
-
Which of the following terms is used as a synonym for data mining?
Knowledge discovery in database
-
Which of the following is an example of a measure in an OLAP report?
Average cost
-
Which of the following observations about RFM and OLAP reports is true?
OLAP reports are more dynamic than RFM reports
-
Ajax is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.
511
-
A ________ takes data from the data manufacturers, cleans and processes the data, and then stores it.
Data warehouse
-
Which of the following is an example of a supervised data-mining technique?
Regression analysis
-
________ attempt to directly capture employee expertise.
Expert systems
-
Problematic operational data are termed ________.
Dirty data
-
________ is the application of social media and related applications for the management and delivery of organizational knowledge resources.
Hyper-social knowledge management
-
U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
-
The viewer of an OLAP report can change its format. Which term implies this capability?
Online
-
The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format.
Dynamic
-
Which of the following observations concerning expert systems is true?
These systems encode human knowledge in the form of "If...Then" rules.
-
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
Data mining
-
________ is defined as information containing patterns, relationships, and trends of various forms of data.
Business intelligence
-
Which of the following accurately defines a dimension in an OLAP report?
It is a characteristic of measure
-
________ is a term that refers to the level of detail represented by the data.
Granularity
-
Because of the various problems with operational data, large organizations choose to extract operational data and store them into a(n) ________.
Data warehouse
-
________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.
Knowledge management
-
An OLAP report has measures and dimensions. Which of the following is an example of a dimension?
Sales region
-
An ________ and an OLAP report are the same thing.
OLAP cube
-
Which of the following statements is true about operational data?
Purchased operational data often contains missing elements.
-
Which of the following is true of source data for a BI system?
It refers to data that the organization purchases from data vendors.
-
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.
113
-
Data ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
Acquisition
-
How should a sales team respond to a customer who has an RFM score of 545?
The sales team should let go of this customer; the loss will be minimal.
-
In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________.
Lift
-
________ requires the user to request BI results.
Pull publishing
-
Which of the following is true about knowledge management (KM)?
KM boosts revenues by getting products and services to market faster.
|
|