ch6 questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: token authentication biometric authentication smart card authentication two-factor authentication symmetric key authorization

two-factor authentication

Which of the following best explains why internal malicious behaviors are hard to detect? A. Because these users can provide hackers access to an otherwise secure network B. Because internal exploits often use advanced techniques that are hard to detect C. Because users are authorized on the network and their actions can go undetected unless they make a careless mistake or discuss their behaviors with others D. None of the above E. Because companies often limit the number of employees who can access sensible informatio

Because users are authorized on the network and their actions can go undetected unless they make a careless mistake or discuss their behaviors with others

________ are visual tools for presenting performance data in a BI system. A. Reports and the drill-down feature B. Dashboards and scorecards C. Ad hoc report creation D. Parameterized reports E. Scenarios and models >

Dashboard and scorecards

The concept of management ________ describes situations in which managers act on preconceived notions that reject information that does not conform to their prior conceptions. A. politics B. backgrounds C. inefficiency D. filters E. biases

Filters

Which of the following is NOT an example of supervised machine learning? A. Facial recognition of suspects in a criminal database B. Differentiating junk emails from normal emails C. Identifying a breast tumor as malignant or benign D. Predicting whether a patient is likely to be diabetic or not E. Google News displays news stories about the same topic together

Google News displays news stories about the same topic together

Which of the following technologies would you use to analyze the social media data collected by a major online retailer? A. OLAP B. Data warehouse C. Data mart D. Hadoop E. DBMS

Hadoop

Which of the following tools enables users to view the same data in different ways using multiple dimensions? A. SQL B. Hadoop C. OLAP D. Predictive analysis E. Data mining

OLAP

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships. A. In-memory B. Text mining C. Clustering D. Classification E. OLAP

Text mining

IoT devices rely on cloud services as the backbone of their computational power. T/F

True

Which of the following statement about security and control is correct? A. Without technology implemented correctly, there is no security. B. Accessibility of corporate data over a network is the greatest threat of security. C. The Apple iOS platform is the mobile platform most frequently targeted by hackers. D. Organizations can use existing network security software to secure mobile devices. E. Users typically have good measures protecting their smartphones, thus using mobile devices is more secure than using desktops or laptops

Without technology implemented correctly, there is no security.

An Internet web site that wishes to abide by fair privacy practices will do ______. A. Post policies about how personal information gathered from consumers will be used B. All of the above C. Secure collected consumer information D. Afford the consumer the opportunity to view and contest the accuracy of the data collected E. Allow the consumer the choice to participate in the site or not

all of the above

Biometric authentication includes which of the following? A. fingerprint B. palm print C. retina scans CorrectD. all of above E. facial recognition

all of the above

Clustering algorithm can be used to _________. A. All of the above B. Run social network analysis to identify who your friends are and whether a group is cohesive or not C. Discover customer segments so as to market your products more efficiently D. Find natural groups in data based on similarities

all of the above

Collecting vast amount of data alone is no guarantee for success due to ________. A. the need for new technologies and tools capable of managing and analyzing non-traditional data along with their traditional enterprise data B. the need to know what questions to ask of the data and the interpretation of big data C.the talent people versed in a number of technologies including but not limited to Apache Hadoop, Apache Spark, NoSQL Database, Data Science, Analytics and Data Visualisation D. capturing, storing, and analyzing big data can be expensive, and information from big data may not necessarily help decision-makers E all of the above

all of the above

A study of supermarket purchasing patterns reveals that, when corn chips are purchased, a cola drink is purchased 65 percent of the time, but there is a promotion, cola is purchased 85 percent of the time. This is an example of which type of information you obtain from data mining software? A. Classification B. Sequences C. Clusters D. Associations E. Forecasting

associations

The term big data could refer to all of the following except: A. machine-generated data (i.e. from sensors) B. datasets with unstructured data C. datasets with fewer than a billion records. D. data created by social media (i.e. tweets, Facebook Likes) E. data from Web traffic

datasets with fewer than a billion records.

Unsupervised machine learning requires a gold standard to train the algorithm to correctly identify a new input. T/F

false

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following? A. Identify sequences B. Create a forecast C. Identify associations D. Identify clusters E. Classify data

identify sequences

Which characteristic allows IoT devices to coordinate to create novel applications that each of them individually could not perform? A. Intelligence B. Portable feature C. Dynamic nature D. Security E. Interconnectivity

interconnectivity

Which of the following is the top reason of IS threat or data leakage since 2002? A. internal employees B. hardware problems C. wireless security weakness D. software problems E. Internet vulnerabilities

internal employees

Which of the following is not one of the six main elements in the business intelligence environment discussed in this chapter? A. Organizational environment B. User interface C. Data from the business environment D. Delivery platform E. Managerial users and methods

organizational environment

Google Flu Trends aggregates personal search data in order to estimate world-wide flu activity. Google's site has drawn criticism due to the sharing of users' online behavior without getting their consent. This, in essence, violates the user's right to______: A. Accessibility B. Identity C. Accuracy D. Property E. Privacy

privacy

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? A. Security policy B. Risk assessment C. Business continuity plan D. Acceptable Use Policy E. Business impact analysi

risk assessment

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called: A. pharming B. sniffing C. social engineering D. phishing E. snooping

social engineering

The term supervised learning refers to the fact that we give the learning algorithm a data set, in which the "right answers" were given. This data set is usually called ________. Training set Testing set Predictive set Evaluating set

training set


Conjuntos de estudio relacionados

Respiratory Emergencies and other EMT Class Notes

View Set

PTEC 203 - Assignment 4 - Chapter 3 Theories of Accident Causation

View Set

C784 MODULE 7.11 Conditional probability

View Set

Adaptive Quizzing/Urinary/Reproductive Systems

View Set

Intro to Cybersecurity - Final Exam Study Guide

View Set

Cell Bio exam 2 study guide questions

View Set