________ is defined as information containing patterns, relationships, and trends. |
C |
Which of the following is true of source data for a BI system? |
B |
Data ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. |
B |
Which of the following is a fundamental category of BI analysis? |
D |
Push publishing delivers business intelligence ________. |
A |
________ requires the user to request BI results. |
B |
Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________. |
C |
________ records the source, format, assumptions and constraints, and other facts about the data. |
D |
Problematic operational data are termed ________. |
C |
________ is a term used to refer to the level of detail represented by the data. |
A |
Which of the following statements is true about operational data? |
C |
Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor. |
B |
A ________ takes data from the data manufacturers, cleans and processes the data, and then stores it. |
C |
A data ________ is a data collection, smaller than the data warehouse that addresses a particular component or functional area of the business. |
A |
Which of the following statements is true about data marts? |
C |
Which of the following statements is true about reporting applications? |
C |
Which of the following is a basic operation used by reporting tools to produce information from data? |
D |
________ analysis is a way of analyzing and ranking customers according to their purchasing patterns. |
D |
RFM analysis is used to analyze and rank customers according to their ________. |
A |
U.S. Steel Corp. is a well known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score? |
D |
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________. |
C |
Ajax is one of the customers of a well known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax’s RFM score is most likely ________. |
B |
How should a sales team respond to a customer who has an RFM score of 545? |
B |
OLAP stands for ________. |
A |
The viewer of an OLAP report can change its format. Which term implies this capability? |
D |
The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. |
D |
An OLAP report has measures and dimensions. Which of the following is an example of a dimension? |
C |
Which of the following describes a dimension in an OLAP report? |
A |
Which of the following is an example of a measure in an OLAP report? |
D |
An ________ and an OLAP report are the same thing. |
B |
Which of the following observations about RFM and OLAP reports is true? |
B |
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. |
C |
Which of the following terms is used as a synonym for data mining? |
C |
Which of the following is true of unsupervised data mining? |
A |
With ________, statistical techniques can identify groups of entities that have similar characteristics. |
B |
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. |
C |
Which of the following is an example of a supervised data-mining technique? |
C |
Which of the following is used to show the products that customers tend to buy together? |
B |
In marketing transactions, the fact that customers who buy product X also buy product Y creates a(n) ________ opportunity. That is, "If they’re buying X, sell them Y," or "If they’re buying Y, sell them X." |
A |
In market-basket terminology, ________ is the term that describes the probability that two items will be purchased together. |
A |
In market-basket terminology, the ratio of confidence to the base probability of buying an item is called the ________. |
D |
________ is a hierarchical arrangement of criteria that predict a classification or a value. |
C |
________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. |
B |
Which of the following is a major category of knowledge assets? |
D |
________ is the single most important content function in knowledge management applications. |
C |
The world’s best-known indexing engine is operated by ________. |
A |
________ is a standard for subscribing to content sources. |
C |
With a(n) ________ , users can subscribe to content sources and be notified when they have been changed. |
B |
________ attempt to capture human expertise and put it into a format that can be used by non experts. |
B |
Which of the following observations concerning expert systems is true? |
D |
A sales report that is current, as of the time the user accessed it on a Web server, is an example of a(n) ________. |
B |
The ________ is the most popular BI server today. |
C |
Which of the following statements is true about BI publishing alternatives? |
C |
BI servers use ________ to determine what results to send to which users and on which schedule. |
B |
Developing, operating, and maintaining an org’s computing infrastructure is a major function of the ________ department. |
B |
Which of the following is NOT a function of the information systems department? |
A |
In orGs that operate significant non-accounting info systems, the chief info officer is most likely to report to the ________. |
B |
If the primary info systems in an org support only accy and fin activities, the CIO should most likely report to the ________. |
A |
Which of the following is a function of the technology office in an organization’s IS department? |
C |
In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media. |
A |
Which of the following statements is true of the operations group in an organization’s IS department? |
B |
Which of the following is true about the "maintenance" of information systems? |
C |
IS department, the _____ group manages process of creating new info systems as well as maintaining existing info systems. |
C |
If an org doesnt develop programs in-house, then the development group of the IS department will be staffed primarily by _. |
C |
Purpose of ________ group is to protect data & info assets by est data standards and data management practices and policies. |
A |
A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans. |
A |
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials. |
D |
The responsibilities of a computer technician include ________. |
A |
The responsibilities of a ________ include advising the CIO, executive group, and project managers on emerging techs. |
D |
Which of the following is true about IS infrastructure? |
C |
The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives. |
C |
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives. |
A |
Which of the following is a function of the steering committee for an IS department? |
D |
Which of the following statements is true about the steering committee of an IS department? |
D |
________ is the process of hiring another organization to perform a service. |
B |
One of the reasons outsourcing is undertaken is to ________. |
C |
Which of the following is true about outsourcing? |
B |
Outsourcing gathers all of the possible risks into the risk of choosing the right ________. |
D |
________ is a form of outsourcing. |
C |
Which of the following is an outsourcing alternative that provides hosted applications and data storage? |
C |
Which of the following is an example of a company that offers SaaS? |
A |
Sites like Amazon.com provide ________ for product vendors & distr who choose not to develop their own online presence. |
C |
In 2005, Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing. |
C |
Which of the following is a form of hardware outsourcing? |
b |
When a co outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________. |
b |
Which of the following is a risk of outsourcing IS/IT functions? |
C |
As an IS user, you have a right to a secure computing environment. This means that ________. |
A |
Which of the following is a right of users of information systems? |
C |
Which of the following is generally a responsibility of users of information systems? |
D |
Which of the following is true about users of information systems? |
C |
) Users should not bother IS personnel for trivial reasons, so they have a responsibility to ________. |
A |
Which of the following is true about the changes and developments foreseen for 2022? |
B |
A ________ is a person or organization that seeks to obtain data or other assets illegally, without the owner’s permission and often without the owner’s knowledge. |
C |
Which of the following is considered a threat caused by human error? |
A |
Which of the following is considered a computer crime? |
D |
________ occurs when someone deceives by pretending to be someone else. |
D |
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. |
A |
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. |
B |
Email spoofing is a synonym for ________. |
B |
________ is a technique for intercepting computer communications, either through a physical connection to a network or, in the case of wireless networks, with no physical connection. |
C |
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will. |
C |
Which of the following is an example of a sniffing technique? |
D |
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. |
C |
Which of the following is most likely to be the result of hacking? |
C |
____ occurs through human error when employees dont follow proper proced or when proced have not been well designed. |
B |
________ occurs when comp. criminals invade a comp system & replace legitimate programs with their own unauthorized ones that shut down legitimate apps and substitute their own processing to spy, steal and manipulate data, or other purposes. |
D |
Which of the following usually happens in a malicious denial-of-service attack? |
B |
________ present the largest risk for an organization’s infrastructure loss. |
B |
A(n) ________ is a comp program that senses when another comp is attempting to scan the disk or otherwise access a comp. |
A |
Nonword passwords are vulnerable to a ____ attack, in which the PW cracker tries every possible combination of characters. |
C |
________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in every time. |
A |
Employees resent physical searches when arriving at and departing from work. Which aspect of computer security described in the NIST Handbook is reflected here? |
C |
Which of the following is a critical security function of senior management? |
C |
Which element of a sec. policy specifies how an organization will ensure the enforcement of security programs and policies? |
A |
A sec policy covering the matters related to the personal use of computers at work would be an example of a(n) ________. |
B |
Which of the following is an example of a system-specific security policy? |
B |
________ refers to things we do not know, while ________ is the likelihood of an adverse occurrence. |
B |
Which of the following is the first step in risk management? |
D |
Which factor of risk assess refers to the prob that a given asset will be compromis by a given threat, despite the safeguards? |
A |
Which of the following is an example of an intangible consequence? |
B |
To obtain a measure of probable loss, companies ________. |
C |
Which of the following is covered by the Gramm-Leach-Bliley Act of 1999? |
C |
The Privacy Act of 1974 covers ________. |
B |
Which of the following was passed to give individuals the right to access their own health data created by doctors and other health-care providers? |
C |
Which of the following is an example of a technical safeguard? |
B |
A(n) ________ card has a microchip in it to hold data. |
B |
Users of smart cards are required to enter a ________ to be authenticated. |
C |
Which of the following is used for biometric authentication? |
B |
Which of the following statements is true for biometric identification? |
D |
A system called ________ authenticates users without sending their passwords across a computer network. |
A |
The IEEE 802.11 Committee, the group that dev. & maintains wireless stand., first developed a wireless sec standard called_. |
C |
________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. |
C |
With ________ encryption, the sender and receiver transmit a message using the same key. |
C |
Which of the following observations concerning Secure Socket Layer (SSL) is true? |
B |
You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in your browser’s address bar will let you know that the bank is using the SSL protocol? |
C |
________ is the term used to denote viruses, worms, Trojan horses, spyware, and adware. |
A |
A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________. |
A |
________ are viruses that masquerade as useful programs or files. |
C |
A(n) ________ is a type of virus that propagates using the Internet or other computer networks. |
A |
What is a major difference between spyware and adware? |
A |
________, tiny files that gather demographic info, use a single code to identify users by age, gender, location, likely inc, and online activity. |
D |
The term ________ refers to any type of program that is surreptitiously installed and that takes actions unknown and uncontrolled by the computer’s owner or administrator. |
C |
Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted third party. This procedure is called ________. |
D |
Maintaining the computers that run a DBMS in a locked room is a part of ________. |
C |
Which of the following statements about human safeguards for employees is true? |
B |
When an employee is terminated, IS administrators should receive advance notice so they can ________. |
D |
________ a site means to take extraordinary measures to reduce a system’s vulnerability, using special versions of the operating system, and eliminating operating systems features and functions that are not required by the application. |
B |
________ are the primary means of authentication and are important not just for access to a user’s computer, but also for authentication to other networks and servers to which the user may have access. |
C |
Which of the following systems procedures is specifically the responsibility of operations personnel? |
C |
In disaster-preparedness term, a ________ is a utility co that can take over another co’s processing with no forewarning. |
D |
Which of the following observations is true of a cold site? |
C |
Many co create ________, which are false targets for comp criminals to attack. To an intruder, it would look like a particularly valuable resource, such as an unprotected Web site, but in actuality the only site content is a program that determines the attacker’s IP address. |
C |
MIS Ch 9,11,12
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price