BUS 101 Final Exam
Information systems that provide computer-based activity or action at a distance are known as _____________.
remote action systems
Which term refers to some measure that individuals or organizations take to block a threat from obtaining an asset?
safeguard
Despite the power and low cost of cloud services through the Internet, organizations must beware of ________.
security threats
The primary way for most social media providers to make money is to _________.
sell advertising
Which of the following is an unsupervised data mining technique? A. Cluster analysis B. Regression analysis C. Variety D. Hadoop E. Modeling
A. Cluster analysis
Which of the following could reduce costs and increase profit? A. increased productivity B. improved reputation C. flexible pricing D. improved response
A. Increased Productivity
Which of the following is NOT a benefit of content delivery networks? A. Increased load on origin server B. Increased reliability C. Decreased, even guaranteed load time D. Reduced delivery costs for mobile users E. Protection from DoS attacks
A. Increased load on origin server
Which activity does NOT occur during the Acquire Data phase in the BI process? A. Print B. Organize and relate C. Cleanse D. Obtain E. Catalog
A. Print
Which of the following is NOT used to produce business intelligence through reporting applications? A. Retracting B. Sorting C. Filtering D. Summing E. Grouping
A. Retracting
What will NOT be a feature of new mobile devices? A. They will be based on ERP. B. They will be based on dynamic virtualization. C. They will be based on cloud computing. D. They will have innovative mobile device UX. E. They will be coupled with dynamic and agile information systems.
A. They will be based on ERP.
You can expect the outputs of a business intelligence system to be used for all of the following purposes EXCEPT ________. A. eliminating the need to access the corporate data warehouse B. making decisions C. solving problems D. providing management information E. conducting project management
A. eliminating the need to access the corporate data warehouse
Operational data is generally not immediately suitable for a data warehouse due to all of the following factors EXCEPT_________. A. having too few attributes B. having missing values C. having the wrong granularity D. lacking integration E. including dirty data
A. having too few attributes
The three fundamental activities of the BI process are Perform Analysis, Publish Results, and _____________.
Acquire Data
What is the first step in the BI process?
Acquire data
What are the two forms of monetization that social media companies typically use to generate revenue for their services?
Advertising and charges for premium service
Which of the following is a PaaS service that could provide Falcon Security with a Linux or Web server on which Falcon Security would install its own software?
Amazon EC2
Database management systems (DBMS) are sometimes included in cloud vendor's offerings. ___________ is a petabyte-scale data warehouse available through Amazon.
Amazon Redshift
A successful quality strategy begins with
An organizational culture that fosters quality
Which of the following statements about static and dynamic reports is NOT accurate? A. In the BI context, most static reports are published as PDF documents. B. A printed sales analysis is an example of a dynamic report. C. Publishing a dynamic report typically requires the BI application to access a database or other data source at the time the report is delivered to the user. D. Dynamic reports are BI documents that are updated at the time they are requested. E. Static reports are BI documents that are fixed at the time of creation and do not change.
B. A printed sales analysis is an example of a dynamic report.
Which is a FALSE statement concerning BYOD policy? A. It is a liberal policy. B. It assigns work computers to employees. C. It is secure. D. It enables devices to be used in a unique way. E. It enables you to use your own device.
B. It assigns work computers to employees.
Which of the following is NOT a valid function performed by the data warehouse? A. To obtain data B. To redefine data C. To cleanse data D. To organize and relate data E. To catalog data
B. To redefine data
Disclosure is considered to be important in the use of social media for employee communication. All of the following are elements of "disclosure" EXCEPT ________. A. truthfulness B. oversharing C. transparency D. writing what you know E. pointing out if you have a vested interest
B. oversharing
A Web server that is specially built to manage and deliver business intelligence is called a _________.
BI server
_________ are information systems that process operational and other data to analyze past performance and to make predictions.
Business intelligence systems
All of the following are possible problems with source data EXCEPT __________. A. Inconsistent data B. Wrong granularity C. Data not interpreted D. Too much data E. Missing values
C. Data not interpreted
Which of the below is NOT a source of a UGC problem? A. Junk and crackpot contributions B. Inappropriate content C. Favorable reviews D. Mutinous movements E. Unfavorable reviews
C. Favorable reviews
Which of the following does not increase profit by improving quality? A. increased productivity B. flexible pricing C. higher warranty costs D. improved reputation
C. Higher warranty costs
Which of the following statements is true? A. In the future, employers will have to stop allowing employees to bring their own devices to work. B. Within ten years, organizations will disappear. C. Managers may sense a loss of control in the future, but managing employees may mean you have to harness the power of social behavior to advance your strategy. D. Because of social media and other technological advances, it will be impossible to manage employees in the future. E. There will be no more need for managers and executives in businesses because all employees will become directly empowered to interact directly with one another and accomplish company tasks without costly supervisory overhead.
C. Managers may sense a loss of control in the future, but managing employees may mean you have to harness the power of social behavior to advance your strategy.
Which of the below is an example of platform as a service? A. Amazon EC2 B. Apple iCloud C. Microsoft Azure D. Amazon S3 E. Microsoft Office 365
C. Microsoft Azure
With _________, the vendor might lose control of the customer relationship.
CRM
What actions could an organization take that may produce a biased study in the publish report phase of the BI process?
Changing criteria until they achieve a desired result
A new organizational position, called _________, is likely to be common in the future as organizations seek to develop and manage innovative social media programs.
Chief Digital Officer
A _______ network delivers user data in many different geographical locations and makes those data available in a way that minimizes response time.
Content delivery
________________ measures the frequency that someone who clicks on an ad makes a purchase.
Conversion rate
All of the following are social media providers EXCEPT ________. A. Pinterest B. Twitter C. Facebook D. Linksys E. LinkedIn
D. Linksys
Managing Quality helps build successful strategies of
Differentiation, low cost and response
What is a key pillar given in Intel's Rules of Social Media Engagement?
Disclosure
Which of the following is NOT an example of SaaS? A. Apple iCloud B. Salesforce.com C. Microsoft Office 365 D. Microsoft OneDrive E. Elastic Cloud 2
Elastic Cloud 2
Which of the following is NOT used in social CRM?
Which of the following converts plain text to garbled text that can later be converted back?
Encryption
Which of the following is a true statement when using social media and human resources?
HR employees use Facebook to form opinions about job applicants.
A new employee does not fully understand the procedures involved when updating customer information and fails to complete all the changes needed. This is an example of which type of threat?
Human error
What is the main issue concerning advertisements and mobile devices?
It is a design problem.
What is an example of the "Use Common Sense" pillar?
Keep it cool
Amazon.com will preinstall either ___________ or Windows Server on the cloud hardware.
Linux
What is a risk associated with customer service when considering a SMIS?
Loss of control
If Falcon Security wished to install some of its own custom developed application software in the cloud, it would need to obtain ________ cloud resources.
PaaS (Platform as a Service)
What is the name of the query language used in Hadoop?
Pig
Which term refers to delivering business intelligence reports to users based on their explicit requests for BI results of data analysis?
Pull publishing
_________ delivers business intelligence to users without any request from the users.
Push publishing
__________ is NOT a valid BI data source.
RFM
What is one way an organization can publish BI results?
RSS Feeds
Capital is a key term in economic analysis. What does social capital primarily refer to?
Relationships
Which of the following cloud service categories provides the more comprehensive and complete set of services?
SaaS
The method of obtaining cloud-based services that include hardware infrastructure, an operating system, and application programs is termed _______.
SaaS (Software as a Service)
Which value chain element is affected most directly from peer-to-peer social media reviews of the product manufactured by a company posted by customers who have purchased that product?
Sales and marketing
Which of the following is NOT a threat related to computer crime?
Service interruption
________ enables the relationship between customers and organizations to emerge in a dynamic process as both parties create and process content.
Social CRM
________ is defined as the investment in social relations with the expectation of returns in the marketplace.
Social capital
___________ is the use of information technology to support the sharing of content among networks of users.
Social media (SM)
What did the retail store Target do differently than its competitors who were still watching the local paper for life events such as graduations and baby announcements?
Target used BI to identify purchasing patterns.
________ is a remote action system that enables physicians to provide service to patients located in hard to reach areas of the world.
Telediagnosis
What is the LEAST likely future for cloud-based hosting services? A. They will become less costly over time. B. They will become even more secure over time. C. They will become less popular over time. D. There will be an explosion of employment opportunities for people to operate and manage hosting sites. E. More companies will opt to build private clouds instead.
They will become less popular over time.
What is the primary purpose of a business intelligence system?
To utilize operational and other data for analyzing company performance and making predictions
__________ is a subset of a public cloud that has highly restricted, secure access.
VPC
________ can be used to create what appears to be a private secure network over the Internet.
Virtual Private Networks
Unlike static reports, dynamic reports ________.
are updated at the time they are requested
Organizations can place data in the _______ and even have that data be made elastically available.
cloud
Social media data consists of two components: _________ and __________.
content; connections
The likelihood that someone who clicks on an ad completes a transaction that benefits the advertiser is termed the ________.
conversion rate
Content data is ___________ that are contributed by users.
data and responses to data
A ________ is a facility for managing an organization's BI data.
data warehouse
Once data from various sources are obtained, cleansed, and organized, they are placed in a(n) ________.
data warehouse
Another term for problematic data is ________________.
dirty data
The goal of Big Data analysis is to ____________.
find patterns and relationships
The _____________ revenue model offers users a basic service for free and then charges a premium for upgrades or advanced features.
freemium
PaaS leases __________ and operating systems from the cloud vendor.
hardware
Social media users are ________.
individuals and organizations
If you are a(n) _____________ in your social network, your opinion may force a change in others' behaviors and beliefs.
influencer
The consumers of the processes of a business intelligence system are termed __________.
knowledge workers
When organizations enable customers to help each other solve problems with the organization's products via social media, the primary concern is ________.
loss of control
The main purpose of Project Loon is________________.
providing Internet access to remote locations
The purpose of developing a _________ is to delineate employees' rights and responsibilities regarding social media.
social media policy
Organizations such as Facebook, Snapchat, and LinkedIn are termed ________, since they provide the platforms that enable the creation of social networks.
social media providers
The ___________ component of a BI system is called a BI application.
software
Google has projects underway that will increase the Internet's ________.
speed and spread
To an organization, the ____________ is the likelihood that the other person in the relationship will do something that benefits the organization.
strength of a relationship
Organizations seek to _________ relationships in order to increase the likelihood that the other party in the relationship will do something beneficial to the organization.
strengthen
A BI server extends alert/RSS functionality to support user ___________, which are user requests for particular BI results on a particular schedule or in response to particular events.
subscriptions
Tele-surgery uses _____________ to link surgeons to robotic equipment at distant locations.
telecommunications
Mobility, social media, and ___________ mean fascinating opportunities for your non-routine cognitive skills in the next 10 years.
the cloud
A ________ is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owners' permission.
threat
A _____________ is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission, and often without the owner's knowledge.
threat
A virtual, private pathway over a public or shared network from the VPN client to the VPN server is also called a(n)___________.
tunnel
Cluster analysis is an example of ________.
unsupervised data mining
When an analyst studies some data and develops a hypothesis after viewing the results to explain the observations, the analyst is using _________.
unsupervised data mining
A virtual private network ________.
uses tunneling and encryption to create secure private communication using the public Internet
According to Henk Flap, the ____________________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
value of social capital
A ________ is an opportunity for threats to gain access to individual or organizational assets.
vulnerability
________ includes the risk of inappropriate and negative comments.
User-generated content