Bus 188-Final chapter 8,9,10
CH 9)________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. A) Transaction Processing Systems (TPS) B) Decision Suport Systems (DSS) C) Content Management Systems (CMS) D) Executive Information Systems (EIS)
C) Content Management Systems (CMS)
CH 9) ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data mining B) Data warehousing C) Data optimization D) Data normalization
A) Data mining
CH 8) Success metrics are also known as ________. A) key performance indicators (KPI) B) vanity metrics (VM) C) performance scale identifiers (PSI) D) Conversion Rates (CR)
A) key performance indicators (KPI)
CH 10) Which of the following usually happens in a malicious denial-of-service attack? A)A phisher pretends to be a legitimate company and requests confidential data. B) A hacker floods a Web server with millions of bogus service requests. C) A hacker monitors and intercepts wireless traffic at will. D) An intruder uses another site's IP address to masquerade as that other site.
B) A hacker floods a Web server with millions of bogus service requests.
CH 8)Which of the following statements is true about social CRM (Customer Ralationship Management)? A) All the customer relationship processes in social CRM are structured. B) Each customer crafts his or her own relationship with the company. C)Though relationships emerge from joint activity, companies control the customers' experience. D)Customers likely to generate the most business get the most attention from the organization.
B) Each customer crafts his or her own relationship with the company.
CH 10)________ is (are) a broad category of software that includes viruses, spyware, and adware. A) Phishing B) Malware C) Spam D) Cookies
B) Malware
CH 9) In ________, statistical techniques can identify groups of entities that have similar characteristics. A) supervised data mining B) cluster analysis C) regression analysis D) neural networks
B) cluster analysis
CH 9) ________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Spatial intelligence B) Data mining C) Business intelligence D) Business information
C) Business intelligence (BI)
CH 9)OLAP stands for ________. A) organizational lead analysis process B) object-based lead analysis procedure C) online analytical processing D) object-oriented analytical protocol
C) online analytical processing
CH 9) ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data integration B) Data entry C) data mining D) Data acquisition
D) Data acquisition
CH 9)A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the "data shelves". A) data model B) data mine C) data link layer D) data warehouse
D) data warehouse
CH 10) Email spoofing is a synonym for ________. A)Sniffing B) hacking C) Phishing D) usurping
c) Phishing