Exam 2 MCQ Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

decision tree

A ________ is a hierarchical arrangement of criteria that predict a classification or a value. A) value chain B) cluster analysis C) decision tree D) neural network

data warehouse

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves. A) data mart B) data mine C) data warehouse D) data model

mart

A data ________ is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business. A) mart B) mine C) cube D) model

dynamic report

A sales report that is current at the time the user accessed it on a Web server, is an example of a(n) ________. A) static report B) dynamic report C) expert system D) hybrid market report

113

A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________. A) 311 B) 555 C) 113 D) 545

511

Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________. A) 155 B) 511 C) 555 D) 151

sales region

An OLAP report has measures and dimensions. Which of the following is an example of a dimension? A) total sales B) average sales C) sales region D) average cost

OLAP cube

An ________ and an OLAP report are the same thing. A) OLAP measure B) OLAP cube C) OLAP dimension D) OLAP array

metadata

BI servers use ________ to determine what results to send to which users and on which schedule. A) expert systems B) metadata C) RSS feeds D) neural networks

data warehouse

Because of the various problems with operational data, large organizations choose to extract operational data and typically create and staff a group of people who manage and run a(n) ________. A) OLAP cube B) neural network C) data warehouse D) Web server

curse of dimensionality

Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor. A) attribute paradox B) curse of dimensionality C) uncertainty principle D) economies of scale

The sales team should let go of this customer; the loss will be minimal.

How should a sales team respond to a customer who has an RFM score of 545? A) The sales team should contact this customer immediately. B) The sales team should let go of this customer; the loss will be minimal. C) The sales team should attempt to up-sell more expensive goods to this customer. D) The sales team should spend more time with this customer.

support

In market-basket terminology, ________ describes the probability that two items will be purchased together. A) support B) confidence C) lift D) dimension

lift

In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. A) confidence B) support C) granularity D) lift

cross selling

In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y" or "If they're buying Y, sell them X." A) cross-selling B) value added selling C) break-even D) portfolio

expert systems

In the context of KM systems, ________ attempted to directly capture employee expertise. A) expert networks B) expert systems C) expert analyses D) expert decisions

Which of the following statements is true of data administration? A) It is a line function to the chief information officer. B) It merely involves developing data policies. C) It applies to individual units and not to the entire organization. D) It is involved in establishing data safeguards.

It is involved in establishing data safeguards.

Which of the following statements is true of the Secure Socket Layer (SSL)? A) It uses asymmetric encryption exclusively. B) It is used to send sensitive data such as credit card numbers. C) It uses one set of encryption keys for multiple sessions. D) It is a stronger version of HTTPS.

It is used to send sensitive data such as credit card numbers.

Which of the following statements is true of biometric identification? A) It involves the use of a PIN for authentication. B) It provides weak authentication. C) It is a relatively inexpensive mode of authentication. D) It often faces resistance from users for its invasive nature.

It often faces resistance from users for its invasive nature.

enables employees and partners to work smarter

Knowledge management (KM) benefits organizations because it ________. A) allows distributors to work within the company premises B) allows suppliers to work according to the organizational policies C) enables customers to provide bulk feedback D) enables employees and partners to work smarter

online analytical processing

OLAP stands for ________. A) online analytical processing B) object-based lead analysis procedure C) object-oriented analytical protocol D) organizational lead analysis process

In information security, which of the following is true of managing risk? A) All organizations except financial institutions should invest heavily in security safeguards. B) Organizations should implement safeguards that balance the trade-off between risk and cost. C) Passwords are classified under the technical safeguards category. D) Physical security is classified under the human safeguards category.

Organizations should implement safeguards that balance the trade-off between risk and cost.

_____ occurs when someone deceives by pretending to be someone else. A) Hacking B) Usurping C) Sniffing D) Pretexting

Pretexting

dirty data

Problematic operational data are termed ________. A) metadata B) rough data C) dirty data D) granular data

according to a schedule or as a result of an event or particular data condition

Push publishing delivers business intelligence ________. A) according to a schedule or as a result of an event or particular data condition B) through reporting, data mining, and knowledge management C) by obtaining, cleaning, organizing, relating

purchasing patterns

RFM analysis is used to analyze and rank customers according to their ________. A) purchasing patterns B) propensity to respond to a marketing stimulus C) socio-economic status D) motivation and needs

Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data? A) public key B) asymmetric encryption C) key escrow D) SQL injection

SQL injection

Which of the following statements is true about losses due to computer security threats? A) Surveys on computer crimes provide accurate results since they use standard parameters to measure and tally computer crime costs. B) Some organizations don't report all their computer crime losses, and some won't report such losses at all. C) Losses due to natural disasters can be measured accurately. D) Losses due to human error are insignificant.

Some organizations don't report all their computer crime losses, and some won't report such losses at all.

Microsoft SQL Server Report manager

The ________ is the most popular BI server today. A) Oracle BI Server B) Microsoft Windows Vista C) Microsoft SQL Server Report manager D) Pentaho BI Server

dynamic

The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. A) extensible B) informal C) specific D) dynamic

online

The viewer of an OLAP report can change its format. Which term implies this capability? A) processing B) analytical C) dimension D) online

SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.

U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score? A) SAMCROW has ordered recently and orders frequently, but it orders the least expensive goods. B) SAMCROW has not ordered in some time but when it did order in the past, it ordered frequently, and its orders were of the highest monetary value. C) SAMCROW has not ordered for some time and it did not order frequently, but when it did order, it bought the least-expensive items. D) SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.

it is a characteristic of a measure

Which of the following accurately defines a dimension in an OLAP report? A) It is a characteristic of a measure. B) It is the item that is processed in the OLAP report. C) It is the data item of interest. D) It is referred to as a decision tree.

calculating

Which of the following is a basic operation used by reporting applications to produce business intelligence? A) coalescing B) transposing C) dispersing D) calculating

data mining

Which of the following is a fundamental category of BI analysis? A) automation B) catalog C) report servers D) data mining

average cost

Which of the following is an example of a measure in an OLAP report? A) customer type B) purchase date C) sales region D) average cost

regression analysis

Which of the following is an example of a supervised data mining technique? A) cluster analysis B) market-basket analysis C) regression analysis D) click streaming

It refers to data that the organization purchases from data vendors.

Which of the following is true of source data for a BI system? A) It refers to the organization's metadata. B) It refers to data that the organization purchases from data vendors. C) It refers to the level of detail represented by the data. D) It refers to the hierarchical arrangement of criteria that predict a classification or a value.

Analysts do not create a model or hypothesis before running the analysis.

Which of the following is true of unsupervised data mining? A) Analysts do not create a model or hypothesis before running the analysis. B) Neural networks are a popular unsupervised data mining application. C) Unsupervised data mining requires tools such as regression analysis. D) Unsupervised data mining requires analysts to fit data to suggested hypotheses.

OLAP reports are more dynamic than RFM reports.

Which of the following observations about RFM and OLAP reports is true? A) RFM is more generic than OLAP. B) OLAP reports are more dynamic than RFM reports. C) RFM reports have measures and dimensions. D) RFM reports can drill down into the data.

These systems encode human knowledge in the form of "If/Then" rules.

Which of the following observations concerning expert systems is true? A) The "If/Then" rules used in these systems are created by mining data. B) These systems have lived up to the high expectations set by their name. C) These systems typically have fewer than a dozen rules. D) These systems encode human knowledge in the form of "If/Then" rules.

market basket analysis

Which of the following shows the products that customers tend to buy together? A) regression analysis B) market-basket analysis C) neural networks D) cluster analysis

BI servers extend alert/RSS functionality to support user subscriptions.

Which of the following statements is true about BI publishing alternatives? A) Most dynamic reports are published as PDF documents. B) For Web servers and SharePoint, the push option is manual only C) BI servers extend alert/RSS functionality to support user subscriptions. D) Publishing static BI content requires more skill, compared to publishing dynamic BI content.

Data marts address the needs of a particular department or functional area of a business.

Which of the following statements is true about data marts? A) A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. B) Data mart users possess the data management expertise that data warehouse employees have. C) Data marts address the needs of a particular department or functional area of a business. D) Data marts are larger than data warehouses.

Purchased operational data often contains missing elements

Which of the following statements is true about operational data? A) It is always better to have data with too coarse a granularity than with too fine a granularity. B) If the data granularity is too coarse, the data can be made finer by summing and combining. C) Purchased operational data often contains missing elements. D) Problematic operational data are termed rough data.

Two important reporting applications are RFM analysis and OLAP.

Which of the following statements is true about reporting applications? A) Reporting applications deliver business intelligence to users as a result of an event or particular data condition. B) Reporting applications consist of five standard components: hardware, software, data, procedures, and people. C) Two important reporting applications are RFM analysis and OLAP. D) Reporting applications produce business intelligence using highly sophisticated operations.

knowledge discovery in databases

Which of the following terms is used as a synonym for data mining? A) regression analysis B) data warehousing C) knowledge discovery in databases D) parallel processing in databases

supervised data mining

With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. A) cluster analysis B) unsupervised data mining C) supervised data mining D) click streaming

cluster analysis

With ________, statistical techniques can identify groups of entities that have similar characteristics. A) regression analysis B) cluster analysis C) expert systems D) neural networks

Content Management Systems (CMS)

______ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. A) Decision Support Systems (DSS) B) Online Analytical Processing (OLAP) applications C) Content Management Systems (CMS) D) Data Transfer Protocols (DTP)

RFM

_______ analysis is a way of analyzing and ranking customers according to their purchasing patterns. A) TQM B) CRM C) Market-basket D) RFM

pull publishing

_______ requires the user to request BI results. A) Push publishing B) Pull publishing C) Desktop publishing D) Accessible publishing

MapReduce

________ is a technique for harnessing the power of thousands of computers working in parallel. A) IPP B) MapReduce C) Granularity D) Reposition

granularity

________ is a term that refers to the level of detail represented by the data. A) Granularity B) Intricacy C) Elaboration D) Complexity

business intelligence

________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Process mining B) Business process management C) Business intelligence D) Spatial intelligence

Hyper-social knowledge management

________ is the application of social media and related applications for the management and delivery of organizational knowledge resources. A) BI server management B) Hyper-social knowledge management C) Knowledge management protocol D) Online analytical processing

data mining

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data optimization B) Database normalization C) Data mining D) Data warehousing

Knowledge management

________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. A) Intellectual property protection B) Knowledge management C) Business process reengineering D) Repository management

data acquisition

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data entry B) Data acquisition C) Data mining D) Data encryption

metadata

________ records the source, format, assumptions and constraints, and other facts about the data. A) Clickstream data B) Dimensional data C) Outsourced data D) Metadata

Which of the following usually happens in a malicious denial-of-service attack? A) a hacker monitors and intercepts wireless traffic at will B) a hacker floods a Web server with millions of bogus service requests C) an intruder uses another site's IP address to masquerade as that other site D) a phisher pretends to be a legitimate company and requests confidential data

a hacker floods a Web server with millions of bogus service requests

Which of the following is an example of a sniffing technique? A) IP spoofing B) caches C) denial of service D) adware

adware

_______ is similar to spyware but it watches user activity and produces pop-ups. A) A cookie B) Adware C) A payload D) Shareware

adware

Which of the following is considered a threat caused by human error? A) an employee inadvertently installs an old database on top of the current one B) an employee intentionally destroys data and system components C) a virus and worm writer infects computer systems D) a hacker breaks into a system to steal for financial gain

an employee inadvertently installs an old database on top of the current one

Which of the following is most likely to be a result of hacking? A) certain Web sites being censored for hurting sentiments B) small amounts of spam in a user's inbox C) an unauthorized transaction from a user's credit card D) pop-up ads appearing frequently

an unauthorized transaction from a user's credit card

With ________, the sender and receiver transmit a message using different keys. A) asymmetric encryption B) block cipher C) symmetric encryption D) stream cipher

asymmetric encryption

Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters. A) denial-of-service B) sniffing C) brute force D) phishing

brute force

Packet-filtering firewalls ________. A) can filter both inbound and outbound traffic B) examine the destination address but not the source address C) are the most complex type of firewall D) seldom examine the data or the addresses of the message

can filter both inbound and outbound traffic

Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost. A) bookmarks B) pop-ups C) cookies D) toolbars

cookies

_______ are small files that the browser stores on the user's computer when he/she visits Web sites and enables him/her to access Web sites without having to sign in every time. A) Cookies B) Botnets C) Payloads D) Public keys

cookies

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. A) Data administration B) Authentication C) Usurpation D) Data encryption

data administration

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database. A) Data encryption B) Database administration C) Data authentication D) Database normalization

database administration

_____ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will. A) Keyloggers B) Pretexters C) Drive-by sniffers D) Phishers

drive by sniffing

Which of the following is a critical security function that the senior management should address in an organization? A) sharing the private key with all systems connected to the network B) creating IS security software programs C) establishing the security policy D) avoiding the use of perimeter firewalls

establishing the security policy

Which of the following is used for biometric authentication? A) smart cards B) facial features C) passwords D) personal identification numbers

facial features

Which of the following is classified as a technical safeguard? A) cookies B) firewalls C) key escrow D) passwords

firewalls

________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. A) Pretexting B) Phishing C) Hacking D) Spoofing

hacking

Which of the following is considered a computer crime? A) deletion of records by an employee who is unaware of operating procedures B) poorly written programs resulting in data losses C) loss of data as a result of flooding D) hacking of information systems

hacking of information systems

Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol? A) ftp B) www C) https D) .com

https

______ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. A) Unauthorized data disclosure B) Incorrect data modification C) Denial of service D) Loss of infrastructure

incorrect data modification

A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer. A) intrusion detection system B) keylogger C) botnet D) access control system

intrusion detection system

A ________ is a number used to encrypt data. A) key B) honeypot C) cookie D) cache

key

________ is the term used to denote viruses, worms, and Trojan horses. A) Malware B) Cookie C) Firewall D) Spam

malware

________ present the largest risk for an organization's infrastructure loss. A) Employees B) Natural disasters C) Hackers D) Competitors

natural disasters

A ________ examines each part of a message and determines whether to let that part pass. A) packet-filtering firewall B) private key C) mail server D) drive-by sniffer

packet filtering firewall

A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________. A) payload B) kernel C) bot herder D) key escrow

payload

Users of smart cards are required to enter a ________ to be authenticated. A) Social Security number B) public key C) personal identification number D) private key

personal identification number

A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. A) hacker B) phisher C) safeguard D) sniffer

phisher

Email spoofing is a synonym for ________. A) hacking B) phishing C) usurping D) sniffing

phishing

In asymmetric encryption, each site has a ________ for encoding messages. A) botnet B) private key C) public key

public key

Key escrow is a(n) ________. A) protocol used to secure communication over the internet B) safety procedure that allows a trusted party to have a copy of the encryption key C) device that prevents unauthorized network access D) encryption algorithm that uses both public and private keys

safety procedure that allows a trusted party to have a copy of the encryption key

A(n) ________ has a microchip in it to hold data. A) ATM card B) smart card C) cookie D) key escrow

smart card

_______ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks. A) Spoofing B) Phishing C) Sniffing D) Pretexting

sniffing

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? A) the Privacy Act of 1974 B) the Sarbanes-Oxley Act C) the HIPAA of 1996 D) the Gramm-Leach-Bliley Act

the HIPAA of 1996

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow

threat

Secure Socket Layer is also known as ________. A) application layer B) transport layer security C) presentation layer D) network interface layer security

transport layer security

________ are viruses that masquerade as useful programs or files. A) Adware programs B) Spyware programs C) Trojan horses D) Worms

trojan horses

When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. A) unauthorized data disclosure B) incorrect data modification C) faulty services D) loss of infrastructure

unauthorized data disclosure

_______ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data. A) Encryption B) Spoofing C) Phishing D) Usurpation

usurpation

A ________ is a type of virus that propagates using the Internet or other computer networks. A) worm B) sniffer C) Trojan horse D) phisher

worm


Conjuntos de estudio relacionados

Pollution Responder 5.0 Recommended Enforcement Actions *

View Set

Chapter 1: Evolution and the Foundations of Biology

View Set

CTU Intro to Marketing: What is Marketing?

View Set

Plant early evolution & invasion of land

View Set

Illinois Real Estate State Portion only

View Set

Texas Statutes and Rules Common to Life and Health Insurance

View Set

Health and Wellness: Chapter 4- Stress

View Set

Week 5: Acute Respiratory Alterations

View Set