CSC 220 CH 9, CTS115 Final, IS 220 Exam 3, CSC 220 Chapter 6, CTS115-L6B-Fall-2017 Unit 8, CTS 115 Fall 2017 Information Systems Unit 6

Your page rank:

Total word count: 7226
Pages: 26

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

The goal of business intelligence is to _____.
a. provide access to novel tools to the users
b. reduce the cost of data processing
c. support and improve decision making
d. improve employee morale

c. support and improve decision making

Which of the following is NOT considered business intelligence practice?
a. Data extraction
b. Visualization
c. Analysis
d. Transaction processing

d. Transaction processing

What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report?
a. 100,000 or less
b. 100,000 to 200,000
c. 200,000 to 500,000
d. more than 500,000

b. 100,000 to 200,000

Which of the following is NOT a commonly used BI tool?
a. data visualization
b. linear regression
c. drill-down analysis
d. automated customer service

d. automated customer service

Which of the following is NOT considered a BI and analytics tool?
a. Data visualization
b. Drill-down analysis
c. Online transaction processing
d. Data mining

c. online transaction processing

To analyze various alternative scenarios, a manager would use _______.
a. the spreadsheet’s ‘what-if’ capability
b. the graphing features of spreadsheet software
c. the reporting feature of a BI tool
d. a data visualization tool

a. the spreadsheet’s ‘what-if’ capability

The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.
a. a word cloud
b. a conversion funnel
c. a scatter diagram
d. a pivot chart

b. conversion funnel

What determines the size of words in a word cloud?
a. length of the word or phrase
b. difficulty in pronouncing the word or phrase
c. whether the word is a pronoun
d. frequency of occurrence of the word in source documents

d. frequency of occurrence of the word in source documents

Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?
a. Word cloud tool
b. Querying tool
c. Reporting tool
d. Data visualization tool

d. data visualization tool

Data within the data cube has been ______ by specific dimensional values.
a. correlated
b. summarized
c. regressed
d. drilled into

b. summarized

The coefficient of determination, r squared, is ____.
a. the same as the error term in a linear regression
b. a number that indicates how well data fits the statistical model
c. a number that must be close to zero to be useful
d. the same as the slope of the linear regression

b. a number that indicates how well data fits the statistical model

Which of the following is NOT true about linear regression?
a. both of the variables must be quantitative variables
b. the line minimizes the sum of the squared errors of prediction
c. the technique implies causality between the independent and the dependent variables
d. consists of finding the best-fitting straight line through a set of observations

c. the technique implies causality between the independent and dependent variables

_____ is used to explore large amounts of data for hidden patterns to predict future trends.
a. Data governance
b. Data mining
c. Linear regression
d. Drill down

b. data mining

____ is the last phase of the six-phase CRISP-DM method.
a. Evaluation
b. Modeling
c. Business understanding
d. Deployment

d. deployment

Which of the following is NOT a component of a KPI (key performance indicator)?
a. direction
b. measure
c. time frame
d. format

d. format

Which of the following is IBM’s BI product?
a. Power BI
b. Business objects
c. Cognos
d. Hyperion

c. Cognos

From which vendor is the BI product Business Objects available?
a. IBM
b. SAP
c. Google
d. Microsoft

b. SAP

Which of the following is a common DSS analysis technique?
a) What-if analysis
b) Sensitivity analysis
c) Optimization analysis
d) All of these are correct.

d

What is the study of the impact that changes in one (or more) part of the model have on other parts of the model?
a) Sensitivity analysis
b) Drill-down
c) What-if analysis
d) Goal-seeking analysis

a

What checks the impact of a change in a variable or assumption on the model?
a) Sensitivity analysis
b) Drill-down
c) What-if analysis
d) Goal-seeking analysis

c

What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?
a) What-if analysis
b) Sensitivity analysis
c) Digital dashboard
d) Drill-down dashboard

c

What is consolidation?
a) Enables users to view details, and details of details, of information.
b) Finds the inputs necessary to achieve a goal such as a desired level of output.
c) The aggregation of data from simple roll-ups to complex groupings of interrelated information.
d) The ability to look at information from different perspectives.

c

analysis checks the impact of a change in a variable or assumption on the model.

what-if

refers to the level of detail in the model or the decision-making process.

granularity

Define the problem as clearly and precisely as possible.

Problem Identification

Gather problem-related data, including who, what, where, why, and how. Be sure to gather facts not rumors or opinions about the problem.

Data Collection

Detail every solution possible, including ideas that seem farfetched.

Solution Generation

Evaluate solutions in terms of feasibility, suitability, and acceptability.

Solution Test

Select the solution that best solves the problem and meets the needs of the business.

Solution selection

If the solution solves the problem, then the decisions made were correct. If not, then the decisions were incorrect and the process begins again.

Solution Implementation

Which of the follow represents a trait of disruptive technology?
a) Enters the marketplace at the low end
b) Is a new way of doing things that initially doesn’t meet the needs of existing customers
c) Tends to open new markets and destroy old ones
d) All of these are correct.

d

Which of the following is a challenge of sustaining technology?
a) Provides a cheaper product for current customers
b) Provides a product that does not meet existing customers’ future needs
c) Provides a better product for current customers
d) Provides a faster product for current customers

What is the innovator’s dilemma?
a) A new way of doing things that initially does not meet the needs of existing customers
b) Produces an improved product that customers are eager to buy, such as a faster car or larger hard drive
c) Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are
doomed to extinction
d) Discusses how established companies can take advantage of disruptive technologies without hindering existing relationships
with customers, partners, and stakeholders

d

What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting
language called HTML?
a) WWW
b) URL
c) Ebusiness
d) Ecommerce

a

What is the buying and selling of goods and services over the Internet?
a) Emarket
b) Emall
c) Ebusiness
d) Ecommerce

d

Which of the following refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information?
a) Information richness
b) Information reach
c) Information system
d) Personalization

a

What measures the number of people a firm can communicate with all over the world?
a) Mass customization
b) Personalization
c) Information reach
d) Information richness

c

A disruptive ___________ is a new way of doing things that initially does not meet the needs of existing customers.

technology

A(n) ___________technology produces an improved product customers are eager to buy.

sustaining

According to Christensen, companies may have placed too great an emphasis on satisfying customers’ current ___________, while forgetting
to adopt new disruptive technology that will meet customers’ future needs.

needs

A Web __________, such as Internet Explorer or Mozilla’s Firefox, allow users to access the World Wide Web.

browser

Information __________ refers to the number of people a business can communicate with, on a global basis.

reach

___________ occurs when a company knows enough about a customer’s likes and dislikes that it can fashion offers more likely to appeal to
that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.

Personalization

Refers to the tail of a typical sales cycle

Long Tail

The ability of an organization to tailor its products or services to the customers’ specifications

Mass Customization

Refers to the depth and breadth of deatils contained in a piece of textual, graphic, audio, or video information.

Information richness

Agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.

Intermediaries

Occurs when a business sells directly to the customer online and cuts out the intermediary.

Disintermediation

Steps are added to the value chain as new players find ways to add value to the business process.

Reintermediation

The creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness

Cybermediation

What applies to any business that sells its products or services to consumers over the Internet?
a) C2B
b) C2C
c) B2B
d) B2C

d

What applies to businesses buying from and selling to each other over the Internet?
a) C2B
b) C2C
c) B2B
d) B2C

c

Which of the following companies is an example of a pure-play or virtual business?
a) Barnes & Noble
b) Google
c) T. J. Maxx
d) All of these are correct

b

Which of the following is one of the six ebusiness tools for connecting and communicating?
a) Email
b) Disintermediation
c) Universal resource locator
d) Web personalization

a

Which of the following are the primary challenges to the ebusiness models?
a) Protecting customers
b) Adhering to taxation rules
c) Providing security
d) All of these are correct.

d

An ebusiness __________ is an approach to conducting electronic business by which a company can become a profitable business on the
Internet.

model

A business that operates in a physical store without an internet presence.
Example: TJ Maxx

Brick-and-Mortar Business

A busniess that operates in a physical store and on the internet.
Example: Barnes and Noble

Click-and-Mortar Business

A business that operates on the Internet only without a physical store.
Example: Google

Pure-Play Business

The next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration,
sharing, and free—is known as ________.
a) Web 1.0
b) Web 2.0
c) Web 3.0

b

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create
add-on products to plug into or interoperate with the system?
a) Management system
b) Reputation system
c) Knowledge system
d) open system

d

What refers to any source code made available freely for any third party to review or modify?
a) Open system
b) Open source
c) User-contributed content
d) Collaboration software

b

Which of the below is not a characteristic associated with Mozilla Firefox?
a) Mozilla Firefox holds over 20 percent of the web browser market.
b) Mozilla Firefox offers a free email service called Thunderbird.
c) Mozilla Firefox is a prime example of open source software.
d) Mozilla Firefox is a prime example of a reputation system.

d

What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS
department?
a) Tacit knowledge
b) Explicit knowledge
c) Pure knowledge
d) Virtual knowledge

b

Which of the following is not an example of explicit knowledge?
a) Patent
b) Trademark
c) Employee opinion
d) Marketing research

c

What are specific key words or phrases incorporated into website content for means of classification or taxonomy?
a) Social media
b) Social networking analysis
c) Tags
d) All of these are correct.

c

What is an online journal that allows users to post their comments, graphics, and video?
a) Microwiki
b) Wiki
c) Blog
d) Mashup

c

Which of the following is a key challenge associated with Business 2.0?
a) Technology independence
b) Information vandalism
c) Copyright independence
d) All of these are correct.

b

What is the ability to purchase goods and service through a wireless Internet-enabled device?
a) Semantic Web
b) WWW
c) Egovernment
d) Mobile business

d

Social __________ describes the collaborative activity of marking shared online content with key words or tags as a way to organize it for
future navigation, filtering, or search.

tagging

_____________ bookmarking allows users to share, organize, search, and manage bookmarks.

Social

A _____________is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and
reorganized as required.

wiki

A(n) _____________ is another term for an online journal that allows users to post their own comments, graphics, and video.

blog

What means a technology can travel with the user?
a) Mobile technologies
b) Wireless technologies
c) WiMax technologies
d) wLAN technologies

a

What is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants can be
easily interconnected using a short-range wireless connection?
a) WiMAX
b) Bluetooth
c) GIS
d) GPS

b

What is wireless fidelity?
a) Commonly used to transmit network signals over great distances
b) An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled
together
c) A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers
d) A means of linking computers using infrared or radio signals

d

What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?
a) WiMAX wireless broadband
b) satellite television
c) Wireless local area network
d) Cellular phones and pagers

a

Which of the following is the correct definition of RFID?
a) Radio frequency internal diagnostics
b) Radio frequency identification
c) Radio fast internal diagnostics
d) Radio frequency interoperability device

b

What is a geographic information system (GIS)?
a) A device that determines current latitude, longitude, speed, and direction of movement
b) Contains a microchip and an antenna, and typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag
c) Designed to work with information that can be shown on a map
d) Commonly used to transmit network signals over great distances

c

Which of the following is a common use for GIS?
a) Finding what is nearby
b) Routing information
c) Information alerts
d) All of these are correct.

d

What is the systems development life cycle?
a) The overall process for developing information systems, from planning and analysis through implementation and maintenance
b) Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system
c) Involves establishing a high-level plan of the intended project and determining project goals
d) Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation

a

Which of the following is not a phase in the systems development life cycle?
a) Analysis phase
b) Prediction phase
c) Planning phase
d) Testing phase

b

What is the implementation phase in the SDLC?
a) Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation
b) Involves placing the system into production so users can begin to perform actual business operations with the system
c) Involves establishing a high-level plan of the intended project and determining project goals
d) Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system

b

The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of
the intended system.

analysis

The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.

implementation

The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the
business goals.

maintenance

Which of the following is a fundamental of the RAD methodology?
a) Focus initially on creating a prototype that looks and acts like the desired system.
b) Accelerate collecting the business requirements through an interactive and iterative construction approach.
c) Actively involve system users in the analysis, design, and development phases.
d) All of these are correct.

d

What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?
a) RAD methodology
b) Agile methodology
c) Waterfall methodology
d) Extreme programming

d

A(n) _____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.

methodology

Which of the following is not one of the four primary information technology areas where businesses are focusing in the 21st century?
a) IT infrastructures
b) Security
c) DBMS
d) Ebusiness

c

Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?
a) Only authorized individuals can access applications for which they are entitled.
b) Only authorized individuals can gain access to the network.
c) Individuals cannot understand or alter information while it is in transit.
d) All of these are correct.

d

What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?
a) Telematics
b) Electronic tagging
c) Mobile commerce
d) None of these are correct.

b

________ infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals.

IT

What is the ability to purchase goods and services through a wireless Internet-enabled device?
a) Telematics
b) Electronic tagging
c) Mobile commerce
d) None of these are correct.

c

RFID uses active or ________ tags in the form of chips or smart labels.

passive

Which organization develops procedures and concepts necessary to support the profession of project management?
a) Project Milestone Institute
b) Project Management Institute
c) Project Management Office
d) None of these

b

What is the science of making intelligent trade-offs between time, cost, and scope?
a) Project deliverable
b) Project management
c) Project
d) PMO

b

Which of the below represents the three elements in the triple constraints of project management?
a) Plan, analysis, design
b) Deliverables, milestones, scope
c) Development, testing, implementation
d) Time, resources, scope

d

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them
in-house?
a) Project management
b) Insourcing
c) Outsourcing
d) None of these are correct.

c

What is it called when you engage another company within the same country for services?
a) Outsourcing
b) Business process outsourcing
c) Insourcing
d) Onshore outsourcing

d

What is using organizations from developing countries to write code and develop systems?
a) Outsourcing
b) Business process outsourcing
c) Insourcing
d) Offshore outsourcing

d

Which of the following is not a form of outsourcing?
a) Onshore outsourcing
b) Offshore outsourcing
c) Nearshore outsourcing
d) Inshore outsourcing

d

What is the outsourcing option that includes the closest location and direct customer control?
a) Offshore outsourcing
b) Nearshore outsourcing
c) Onshore outsourcing
d) None of these are correct.

c

Which of the following is a benefit an organization can receive from outsourcing?
a) Increase technical abilities
b) Financial savings
c) Market agility
d) All of these are correct.

d

Which of the following is a challenge of outsourcing?
a) Length of contract
b) Threat to competitive advantage
c) Loss of confidentiality
d) All of these are correct.

d

A project ___________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.

manager

Project ___________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a
project

deliverables

___________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

outsourcing

True

T/F- A database, a database management system, and the application programs that use the data, make up a database environment.

True

T/F- A database must reflect the business processes of an organization.

True

T/F- A relational model splits the information up into many two dimensional data structures.

False

T/F- Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system.

False

T/F- Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.​

Primary Key

A(n) _____ is a field or set of fields that uniquely identify a record.

Relational

The ____ model database makes it easy to develop queries that involve joining two tables.

Relational

The _____ model has become the most popular database model.

Data Cleansing

_____ is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database.

Data Lake

If an organization is taking a "store everything" approach to data, it will save all the data in its raw and unaltered form in a _____.​

Bit

The smallest piece of data used by a computer is a(n) _____.

Record

A collection of fields all related to a single object, activity, or individual is a(n) _____.

Primary Key

A(n) _____ is a field or set of fields in a record that uniquely identifies the record.

Join

For the ____ operation, it is required that the the two tables have a common attribute.

Extract

In the _____ process, all of the data from various sources is converted into a single format suitable for processing.

Structured Query Language (SQL)

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.

Schema

Suppose you wish to find what tables are in a database, what fields they have, and how they are related you would review the _____.

Data Definition Language

A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

Data Administrator

The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.

you wish to use a visual approach to query building

You would use Query by Example, if _____.

Database as a Service

With _____, the database is stored on a service provider’s server and accessed by the client over a network, typically the Internet.

Big Data

_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.

Data Mart

A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

Organizing

After entering data into a relational database, users can make all of the following basic data manipulations except: 1. Joining 2. Selecting 3. Projecting 4. Organizing

Variety

Haley’s employer has asked her to review tens of thousands of social media posts about their company’s products and compile this data into a database.​ In terms of the characteristics of big data, Haley is dealing with ________.

True

T/F-The data for BI (business intelligence) comes from many sources​

False

T/F- Data scientists do not need much business domain knowledge.​

False

T/F- ​Online analytical processing is another name for enterprise application.

True

T/F- During drill-down, you go from high-level summary data to detailed levels of data.

True

T/F-If you wish to have a visual depiction of relative frequencies of words in a document, a word cloud would be an appropriate option​.

Governance

Data _____ is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted.

Dashboards

​Similar to what you find in a car, a business _____ provides rapid access to information, in an easy-to-interpret and concise manner, which helps organizations

Key performance indicators

​Metrics that track progress in executing strategies to attain organizational objectives are also known as _______ (KPIs).

Visualization

​Data ______ tools can take raw data and immediately provide a rich visual image.

Excel

____ is the most popular spreadsheet program​.

Business leadership skills

Which of the following is NOT a characteristic of a data scientist? 1. Strong business acumen 2. Business leadership skills 3. A healthy appreciation of the limitations of their data 4. A deep understanding of analytics

English

Mastery over which subject is NOT required for being a data scientist?​

Format

Which of the following is NOT a component of a KPI (key performance indicator)? 1. Direction 2. Format 3. Measure 4. Time frame

Sales revenue

Which of the following will be a ‘fact’ measure in a data cube used at a chain retail business? 1. Product category 2. Sales revenue 3. Month Name 4. City name

Summarized

Data within the data cube has been ______ by specific dimensional values.

Data mining

_____ is used to explore large amounts of data for hidden patterns to predict future

apply selected modeling techniques

​During modeling of the CRISP-DM method, we would ______.

Deployment

​____ is the last phase of the six-phase CRISP-DM method.

Online transaction processing

Which of the following is NOT considered a BI and analytics tool?​ 1. Drill-down analysis 2. Online transaction processing 3. Data visualization 4. Data mining

Data visualization tool

Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?​

the spreadsheet’s ‘what-if’ capability

​To analyze various alternative scenarios, a manager would use _______.

A conversion funnel

The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.

Frequency of occurrence of the word in source documents

​What determines the size of words in a word cloud?

Self-service analytics

_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.​

Can lead to over spending on unapproved data sources and business analytics tools.

​Which of the following is a potential disadvantage with self-service BI? 1. Gets valuable data into the hands of the people who need it the most—end users. 2. Can lead to over spending on unapproved data sources and business analytics tools. ​3. Encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. 4. Accelerates and improves decision making.

​support and improve decision making

The goal of business intelligence is to _____.

​automated customer service

Which of the following is NOT a commonly used BI tool? 1. drill-down analysis ​2. automated customer service ​​3. data visualization 4. linear regression

False

T/F- Many organizations actively attempt to convert explicit knowledge to tacit knowledge.

True

T/F- Artificial intelligence involves the development of machines and computer systems that can simulate human intelligence processes.

True

T/F- Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence.

False

T/F A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.

True

T/F- Namaste Yoga Studio’s website is a great example of multimedia because it uses text, photos, graphics, and video to communicate the message of the studio’s owners.

Knowledge Management System (KMS)

A(n) _____ is an organized collection of people, procedures, software, databases, and devices used to create, store, share, and use the organization’s knowledge and experience.

Neural Network

A _____ is a computer system that can act like or simulate the functioning of a human brain.

IF-THEN

_____ statements are rules that suggest certain conclusions based on certain conditions.

Multimedia

_____ is text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals.

Virtual Reality System

A(n) _____ is a system that enables one or more users to move and react in a computer-simulated environment.

Tacit

_____ knowledge is hard to measure and document and typically is not objective or formalized.

Tacit

Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge.

community of practice (COP)

A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.

Artificial intelligence systems

_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction.

Neural networks

_____ can process many pieces of data at the same time and learn to recognize patterns.

theory of evolution

A genetic algorithm is an approach to solving problems based on the _____.

rule

A _____ is a conditional statement that links conditions to actions or outcomes.

knowledge base

The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.

inference engine

In an expert system, the _____ is the component that delivers the expert advice.

explanation facility

The _____ allows an expert system user to understand how the system arrived at its results.

Knowledge users

_____ do not need any previous training in computers or expert systems.

Touch

The haptic interface relays the sense of _____ in the virtual world.

Augmented reality

_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.

Assistive technology

_____ is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing.

Game theory

_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.

Informatics

_____ is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society.

​leveraging the expertise of people across the organization

Executives at Southwestern Construction have noticed that the company’s construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team’s methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system?​

​getting employees to buy in

Executives at Southwestern Construction have noticed that the company’s construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team’s methods to be shared with the other three offices. As a means of convincing the other teams to adopt the new methods, they develop an incentive program that allows team members to earn a percentage of the money they save on each project. This is related to which phase of knowledge management project implementation?​

A _____ network is one in which all network devices are connected to one another through a single central device called the hub node.
a. mesh
b. personal
c. bus
d. star

d. star

In a _____, all network devices are connected to a common backbone that serves as a shared communications medium.
a. star network
b. bus network
c. ring network
d. mesh network

b. bus network

A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.
a. metropolitan area network (MAN)
b. local area network (LAN)
c. wide area network (WAN)
d. personal area network (PAN)

a. metropolitan area network

_____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards.
a. Microwave transmission
b. Wireless mesh
c. Near field communication (NFC)
d. Wi-Fi

c. Near Field communication (NFC)

When you connect your computer to a printer using _____, the distance between them cannot be longer than 30 feet.
a. Bluetooth
b. Wi-Fi
c. near field communication
d. Infrared

a. bluetooth

The area covered by one or more interconnected wireless access points is commonly called a(n) _____.
a. reception area
b. hot spot
c. coverage zone
d. access area

b. hot spot

When you are looking for a ‘hotspot’, you are searching for _____.
a. a wireless access point
b. bluetooth signals
c. free charging stations
d. strong satellite signals

a. a wireless access point

A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles.
a. very small aperture terminal (VSAT)
b. microwave
c. low earth orbit (LEO)
d. geostationary

c. low earth orbit (LEO)

The ancestor of the Internet was _____.
a. TCP/IP
b. the ARPANET
c. Telnet
d. Web 1.0

b. the ARPANET

_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.
a. The ARPANET
b. A Uniform Resource Locator (URL)
c. The Internet Protocol (IP)
d. A Wi-Fi

c. the Internet Protocol (IP)

The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.
a. 32-bit
b. 64-bit
c. 128-bit
d. 256-bit

c. 128-bit

The fiber-optic cables that span the globe over land and under sea make up the Internet _____.
a. ultrastructure
b. backbone
c. layer
d. protocol

b. backbone

The world-wide-web uses _____ protocol for transmitting content.
a. hyper-text transfer
b. mail transfer
c. uniform resource location
d. domain name server

a. hyper- text transfer

_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.
a. The Web
b. A tag
c. A cache
d. The motherboard

a. the web

Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____.
a. Web portals
b. Web browsers
c. Web analytics software
d. search engines

b. Web browsers

Which of the following is a markup language for defining the visual design of a Web page or group of pages?
a. JavaScript
b. Cascading Style Sheets (CSS)
c. Java
d. Extensible Markup Language (XML)

b. Cascading Style Sheets (CSS)

_____ is the standard page description language for Web pages.
a. Extensible Markup Language (XML)
b. JavaScript
c. .NET
d. Hypertext Markup Language (HTML)

d. Hypertext Markup Language

_____ is a markup language designed to transport and store data on the Web.
a. Standard Generalized Markup Language (SGML)
b. Extensible Markup Language (XML)
c. Hypertext Markup Language (HTML)
d. Hypermedia/Time-based Structuring Language (HyTime)

b. Extensible Markup Language (XML)

Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document.
a. cookies
b. subroutines
c. applets
d. packets

c. applets

_____ consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes.
a. Web browsers
b. Web services
c. Hyperlinks
d. Web forms

b. Web services

_____ is a good site to develop your professional network.
a. LinkedIn
b. Facebook
c. Google
d. Twitter

a. LinkedIn

A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest.
a. cookie
b. server
c. Web portal
d. search engine

d. search engine

If your home air conditioner has an IP address, it is part of the ____.
a. satellite communication network
b. virtual private network
c. Internet of Things
d. satellite communication network

c. Internet of Things (IoT)

_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.
a. Grid computing
b. Distributed computing
c. Utility computing
d. Cloud computing

d. Cloud computing

_____ involves running a complete new system for one group of users rather than all users.

Pilot start-up

The process of switching from an old information system to a replacement system is called _____.

cutover

A scrum team usually consists of _________.

less than a dozen people

_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.

Economic feasibility

Your new software project manager is OK with requirements that are not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _______ approach to software development.

Agile

You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?

Parallel start up

Once new software has been selected, implementation will include all of these tasks EXCEPT _________.

consulting with stakeholders to establish future needs

A _____ is a description of the logical and physical structure of data and the relationships among the data for each user.

schema

_____ creates a complete set of technical specifications that can be used to construct an information system.

Systems design

_____ involves using a new or modified system under all kinds of operating conditions.

Systems operation

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

​entity symbol

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.

volume testing

_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.

Critical analysis

After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______.

release

Which of the following statements is true of user acceptance testing (UAT)?

UAT must be completed successfully before newly developed software can be rolled out to the market.

Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client’s desired time for completion. Laura is checking on ___________.

schedule feasibility

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

entity symbol

In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.

data-flow line

The Pareto principle is also known as the _____.

80-20 rule

_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.

System testing

_____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months.

Agile development

A new _____ is a major program change, typically encompassing many new features.

version

_____ explains the purpose of every major piece of computer code and also identifies and describes key variables.

Technical documentation

Phil has been working on a new version of his company’s best-selling sales management software and now he’d like to ask several co-workers and a handful of the existing version’s top users to perform an acceptance test. Phil is preparing for _________.

alpha testing

_____ is the process of analyzing systems to make sure they are operating as intended.

System review

Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.

​joint application development

Data within the data cube has been ______ by specific dimensional values.

summarized

The goal of business intelligence is to _____.

support and improve decision making

Mastery over which subject is NOT required for being a data scientist?​

English

Which of the following is NOT a characteristic of a data scientist?

business leadership skills

What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report?

100,000 to 200,000

What determines the size of words in a word cloud?

frequency of occurrence of the word in source documents

Which of the following is NOT considered business intelligence practice?​

Transaction processing

Suppose management wishes to start a BI project at your new job. Which of following will you recommend as the first step?

Clarify business goals and design a project plan

Which of the following is a potential disadvantage with self-service BI?

Can lead to over spending on unapproved data sources and business analytics tools.

One of the goals of business intelligence is to _________.

present the results in an easy to understand manner

Suppose your employer has four manufacturing units, each with its own data operations. They are considering using BI tools. Which of the following is a valid recommendation regarding the BI initiative?

Create a data warehouse so that data from the factories are combined for BI analysis

Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?​

Data visualization tool

Which of the following is NOT a commonly used BI tool?

automated customer service

During modeling of the CRISP-DM method, we would ______.

apply selected modeling techniques

From which vendor is the BI product Business Objects available?

SAP

____ is the last phase of the six-phase CRISP-DM method.

Deployment

The coefficient of determination, r squared, is ____.

a number that indicates how well data fits the statistical model

Which of the following will be a ‘fact’ measure in a data cube used at a chain retail business?

Sales revenue

_____ is used to explore large amounts of data for hidden patterns to predict future trends.

Data mining

Which of these analysis methods describes neural computing?​

historical data is examined for patterns that are then used to make predictions

Which of the following is NOT a component of a KPI (key performance indicator)?

format

The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.

a conversion funnel

Which of the following is NOT considered a BI and analytics tool?​

Online transaction processing

_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.​

Self-service analytics

Which of the following is NOT a core process associated with data management?​

process for gathering BI requirements

Which of the following is IBM’s BI product?

Cognos

Which of the following is NOT true about linear regression?

​the technique implies causality between the independent and the dependent variables

You are to advise XYZ so that their BI efforts are fruitful. Which among the following is the most crucial advice of all?

There must be strong commitment from the management

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending