Business Intelligence Systems Ch 3
Challenges of Content Management
- Huge databases - Dynamic content - Documents refer to one another - Perishable contents - In many languages
The singularity
-Computer systems adapt and create their own software without human assistance -Machines will possess and create information for themselves
functions of BI server
1. Management 2. Delivery
Which of the below exactly defines a Content Management System? A. They are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. B. It is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. C. They are rule-based systems that encode human knowledge in the form of If/Then rules. D. It is the data collections that are characterized by huge volume, rapid velocity, and great variety. E. It is a technique for harnessing the power of thousands of computers working in parallel.
A
Which of the below is NOT a feature of a data mart? A. Data marts distribute data to all of the data warehouses. B. It is smaller than a data warehouse. C. It is a collection of data. D. It addresses the needs of a particular department. E. Users in a data mart obtain data that pertain to a particular business function.
A
Which of the following is NOT an AI-enabled human assistant currently available to consumers? A. Kalvin B. Siri C. Cortana D. Google Assistant E. Alexa
A
What is one risk in supply chain problem solving via social media?
A company would be solving their problem in front of their computer
OLAP (online analytical processing)
A dynamic type of reporting system that provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. Such reports are dynamic because users can change the format of the reports while viewing them.
_________ is a BI application that inputs data from one or more sources and applies reporting operations to that data to produce business intelligence
A reporting application
RFM analysis
A technique readily implemented with basic reporting operations to analyze and rank customers according to their purchasing patterns.
Which type of job will be MOST threatened by advances in automation?
Agricultural laborer
Which of the following statements is TRUE about unsupervised data mining:
Analysts do not create a model or hypothesis before running the analysis
unsupervised data mining
Analysts do not create a model or hypothesis before running the analysis.
Which of the following is a benefit of knowledge management? A. Improves the quality of data purchased from external sources B. Improves process quality C. Big Data D. Improves granularity of data E. Encourages individualism as a valued trait within the organization
B
static reports
BI documents that are fixed at the time of creation and do not change
dynamic reports
BI documents that are updated at the time they are requested
Project Management
Build in-store cafés. Expand to other locations.
Which of the below statements is INCORRECT with respect to BI systems? A. Business intelligence can be used to identify what is well within the system. B. Decision support systems allow businesses to make decisions. C. Business intelligence may not be able to show future business trends. D. Business intelligence can be used during project management. E. Business intelligence can be used to identify what could be well within the system.
Business intelligence may not be able to show future business trends.
Which is NOT a function of a data warehouse? A. Obtaining data B. Cleansing data C. Making decisions on data D. Cataloging data E. Organizing and relating data
C
Which of the following forces driving AI innovation refers to developments with neural networks? A. Large data sets B. Cloud scalability C. New AI techniques D. Increased device connectivity E. Increased computing power
C
Which of the following is NOT an expected productivity gain associated with automation? A. 24/7 availability B. Elimination of errors C. Higher employee turnover D. Elimination of work breaks E. Elimination of absences due to illness
C
Which of the below devices/applications does not support a BI system?
Calculator
What is a new position created because of social media?
Chief Digital Officer (CDO)
Which of the following is NOT part of data acquisition? A. Organizing data B. Cataloging data C. Cleansing data D. Obtaining data E. Collapsing data
Collapsing data
_______ are information systems that support the management and delivery of documents including reports, web pages, and other expressions of employee knowledge.
Content Management Systems (CMS)
____ are small filed that enables a browser to access Web Sites without having to sign in every time
Cookies
Which of the following statements is TRUE about data marts?
Data marts address the needs of a particular department or functional area of a business
Which of the following is NOT a suitable application for machine learning?
Designing an innovative medical device
Which of the following statements is true about the position definitions component of human safeguards?
Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk
Google states that it has over 1,000 working AI projects. This fact illustrates which of the following forces driving AI innovation? A. New AI techniques B. Large data sets C. Increased computing power D. Increased device connectivity E. Solve practical problems
E
In the OLAP report, which of the following operations is allowed? A. List Down B. Drill Down C. Cross Through D. Drill Below E. Drill From
E
__________ is not a basic reporting operation performed in a business intelligence application.
Editing
A data mart is larger than a data warehouse
False
Data warehouses may include data that is purchased from outside sources
False
Secure Sockets Layer (SSL) is a protocol that is restricted to asymmetric encryption
False
data aggregators
Firms that collect and resell data.
_______ is a location service that allows applications to know when a user has crossed a specific location and then triggers an automated action
Geofencing
__________ is not the problem associated with operational data.
Granular data
Problem Solving
How can we increase sales? How can we reduce food waste?
Which of the following statements about the future of BI is NOT accurate?
Humans work faster than machines, but only machines can work 24/7.
What is the second step in developing a practical social media plan?
Identify success metrics
Business Intelligence Systems
Information systems that produce business intelligence
Which of the following is a BI data source that will increase in importance by 2031?
IoT devices
which of the following is true about the secure sockets layer SSL?
It is used to send sensitive data such as credit card numbers
Which of the following statements is TRUE of source data for a business intelligence (BI) system?
It refers to data that the oreanization purchases from data vendors
__________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital.
Knowledge management
Which AI technique relies heavily on large data sets of training data?
Machine learning
According to a Ponemon Institute study, what is the most common type of attack?
Malware
________ is a broad category of software that includes viruses, spyware, and adware.
Malware
____ is a technique for harnessing the power of thousands of computers working in parallel
MapReduce
______ refers to the source, format, assumptions and constraints, and other facts about the data
Metadata
A _____ is a computing system modelled after the human brain that is used to predict values and make classifications.
Neutral network
Which of the following observations about RFM and OLAP reports is TRUE?
OLAP reports are more dynamic than RFM reports
______ are the primary means of authentication for a users computer and other networks and servers to which the user may have access
Passwords
Email spoofing is a synonym for ________.
Phishing
_____ requires the user to request business intelligence (BI) results.
Pull publishing
Which of the below is not a way of analyzing data in a Business intelligence (BI) system? A. Data mining B. Analytics C. Reporting D. Knowledge management E. Purchase management.
Purchase management
pig
Query language used with Hadoop
__________ can be used to rank customers based on their buying patterns.
RFM analysis
Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?
SQL INjection
Which of the following components of AI is NOT used in self-driving cars?
Speculating
Content Management System (CMS)
Support management and delivery of documents and other expressions of employee knowledge
Which of the following legal safeguards for data deals with the protection of consumer financial data stored by financial institutions
The Gramm-Leach-Biley GLB Act
_____ is a concept that computer systems will become sophisticated enough that they can adapt and create their own software and hence adapt their behavior with out human assistance
The Singularity
artificial intelligence (AI)
The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making.
Knowledge Management (KM)
The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.
Advertisers like digital ads because users can respond directly to Web ads by clicking on them
True
An OlAP cube and an OlAP report are the some thing
True
Companies should develop a social media policy for internal use.
True
Data mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction
True
One of the personal security safeguards is to use https at trusted, reputable vendors.
True
If you had a conversation and could not tell you were interacting with an AI system, the system has passed the __________ test.
Turing
Deciding
Which customers shop at each location? Create custom marketing plans per store.
Informing
Which products are selling quickly? Which products are most profitable?
BI server
a Web server application that is purpose-built for the publishing of business intelligence
data lake
a central repository for large amounts of raw unstructured data
neutral networks
a computing system modeled after the human brain that is used to predict values and make classifications
data mart
a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business
Obtaining, cleansing, organizing, and cataloging data are functions of __________.
a data warehouse
data warehouse
a facility for managing an organization's BI data
Deep Learning
a method for stimulating multiple layers of neural networks rather than just a single layer
Map Reduce
a technique for harnessing the power of thousands of computers working in parallel
Big Data
a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety
The Naïve Bayes Classifier used in evaluating email messages is an example of a(n) __________.
algorithm
Hadoop
an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce
All of the following are forms of promotion using social media information systems created by employees for customers except
answering phone calls
When a Georgia Tech professor created "Jill Watson" to answer students' questions about his course, he was demonstrating an application of __________.
artificial intelligence
A kred score metric identifies with the _____ goal for social media metrics
brand awareness
Strong AI
can complete all of the same tasks a human can
Superintelligence AI
capable of intelligence more advanced than human intelligence
________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser.
conversion rate
John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility?
creating a backup of system databases
Artificial intelligence (Al) requires a large amount of ____ in order to learn, represent knowledge, and process natural language
data
structured data
data in the form of rows and columns
supervised data mining
data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model
push publishing
delivers business intelligence to users without any request from the users
Organizations normally use one strong firewall to protect the network
false
The social media flow can be diagrammed and designed because it is static
false
Weak AI
focused on completing a single specific task
LinkedIn uses the ________ because regular users access LinkedIn for free but you can upgrade individual upgrades range from $29 a month to use services such as the ability to direct email messages to LinkedIn users outside one's network.
freemium revenue model
All of the following are sources Watson's acquires content except
from questions
BI system 5 components
hardware, software, data, procedures, and people
Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a ________.
honeypot
Business intelligence systems generate business intelligence by __________ data.
identifying patterns in
Knowledge management (KM) benefits organizations because it
improves process quality and increases team strength
All of the following are ways social capital adds value except ______
it allows to make more friends
Which of the following statements is true about data administration
it is involved in establishing data safeguards
all of the following are enterprise 2.0 SLATES components except
layers
organizations as social media users use the platforms to accomplish all of the following except:
monitor employees
In the recent decades all of the following have altered existing communication channels except
national newspapers
The ability of a computer system to understand spoken language is termed __________.
natural language processing
IBM's Watson uses ______ or the ability of a computer system to understand spoken human language.
natural language processing (NLP)
Functions of a Data Warehouse
obtain data, cleanse data, organize and relate data, catalog data
A ______ examines each part of a message and determines whether to let that part pass
packet-filling firewall
ABC Corp is partnering with a company to offer ads. The company will show the ads for free and ABC Corp only pays if the customer visits the page from that ad. ABC Corp is using the ________.
pay-per-click
All of these are ways to generate revenue using the freemium model except
pay-per-click
In the content of malware protection, the program code that caused the unwanted actions is called the
payload
All of the following are personal security safeguards except:
pop-ups
Machine learning is focused on predicting accurate outcomes based on
previously known training data
An overlooked but significant benefit of automation that extends beyond productivity gains is __________.
reduction in employee fraudulent behavior
Three fundamental categories of BI Analysis
reporting, data mining, BigData
pull publishing
requires the user to request BI results
Jobs requiring ________ are prime candidates for automation.
routine mental tasks
An OLAP report has measures and dimensions. Which of the following is an example of a dimension
sales region
Ray Kurzweil developed a concept he calls the __________, which is the point at which computer systems become sophisticated enough that they can adapt and create their own software and hence adapt their behavior without human assistance.
singularity
The factors included in social capital evaluation are ________.
social capital= number of relationships+relationship strength * entity resources
________ is the use of information technology to support the sharing of content among networks of users.
social media
Artificial intelligence (Al) research has been driven by the demand for applications that ________ such as ways to filter offense content
solve practical problems
The goal of creating an artificial general intelligence that can complete all of the same tasks a human can is termed __________ AI.
strong
BI servers extend functionality to allow users to create __________ to receive requested, published BI results.
subscriptions
It is commonly believed that it will take hundreds of years to create __________, which is more advanced than human intelligence.
superintelligence
Natural Language Processing (NLP)
the ability of a computer system to understand spoken human language
data mining
the application of statistical techniques to find patterns and relationships among data for classification and prediction
Machine Learning
the extraction of knowledge from data based on algorithms created from training data - focused on predicting outcomes based on previously known training data
Business Intelligence
the patterns, relationships, and trends identified by BI system
All of the following should be a incident response plan except
the person who caused the incident
BI analysis
the process of creating business intelligence
Publish results
the process of delivering business intelligence to the knowledge workers who need it
master data management
the process of making data acquired from different data sources uniform and consistent
automation
the process of making systems operate without human intervention
Data Aquisition
the process of obtaining, cleaning, organizing, relating, and cataloging source data
reporting analysis
the process of sorting, grouping, summing, filtering, and formatting structured data
BI application
the software component of a BI system
A _______ is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owners permission and often without the owners knowledge.
threat
A social media information system (SMIS) is an information system that supports the sharing of content among networks of users
true
Data protection laws may be stronger in other countries than in the US
true
Every organization should have an incident response plan
true
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
true
Organizations should use the same process for creating a plan to use enterprise social networks internally as using social media networks externally
true
Symmetric encryption is simpler and much faster than asymmetric encryption
true
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
unauthorized data disclosure
Julie explained to management that she only counts active users on the site and not only registered users. Measuring all of the registered users is considered a ________ and does not improve decision making.
vanity metrics
The Doggie Store created a "cutest dogs" competition with a grand prize of 100 gift certificate to the store and put it on their INSTA to create a _______
viral hook
Cost savings from automation comes primarily from reduced __________.
wage and benefit expenses
In social media, _____ are the product
you
__________ is a data mining technique that determines product sales patterns.
Market-basket analysis