Exam 2 MCQ Review
decision tree
A ________ is a hierarchical arrangement of criteria that predict a classification or a value. A) value chain B) cluster analysis C) decision tree D) neural network
data warehouse
A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves. A) data mart B) data mine C) data warehouse D) data model
mart
A data ________ is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business. A) mart B) mine C) cube D) model
dynamic report
A sales report that is current at the time the user accessed it on a Web server, is an example of a(n) ________. A) static report B) dynamic report C) expert system D) hybrid market report
113
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________. A) 311 B) 555 C) 113 D) 545
511
Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________. A) 155 B) 511 C) 555 D) 151
sales region
An OLAP report has measures and dimensions. Which of the following is an example of a dimension? A) total sales B) average sales C) sales region D) average cost
OLAP cube
An ________ and an OLAP report are the same thing. A) OLAP measure B) OLAP cube C) OLAP dimension D) OLAP array
metadata
BI servers use ________ to determine what results to send to which users and on which schedule. A) expert systems B) metadata C) RSS feeds D) neural networks
data warehouse
Because of the various problems with operational data, large organizations choose to extract operational data and typically create and staff a group of people who manage and run a(n) ________. A) OLAP cube B) neural network C) data warehouse D) Web server
curse of dimensionality
Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor. A) attribute paradox B) curse of dimensionality C) uncertainty principle D) economies of scale
The sales team should let go of this customer; the loss will be minimal.
How should a sales team respond to a customer who has an RFM score of 545? A) The sales team should contact this customer immediately. B) The sales team should let go of this customer; the loss will be minimal. C) The sales team should attempt to up-sell more expensive goods to this customer. D) The sales team should spend more time with this customer.
support
In market-basket terminology, ________ describes the probability that two items will be purchased together. A) support B) confidence C) lift D) dimension
lift
In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. A) confidence B) support C) granularity D) lift
cross selling
In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y" or "If they're buying Y, sell them X." A) cross-selling B) value added selling C) break-even D) portfolio
expert systems
In the context of KM systems, ________ attempted to directly capture employee expertise. A) expert networks B) expert systems C) expert analyses D) expert decisions
Which of the following statements is true of data administration? A) It is a line function to the chief information officer. B) It merely involves developing data policies. C) It applies to individual units and not to the entire organization. D) It is involved in establishing data safeguards.
It is involved in establishing data safeguards.
Which of the following statements is true of the Secure Socket Layer (SSL)? A) It uses asymmetric encryption exclusively. B) It is used to send sensitive data such as credit card numbers. C) It uses one set of encryption keys for multiple sessions. D) It is a stronger version of HTTPS.
It is used to send sensitive data such as credit card numbers.
Which of the following statements is true of biometric identification? A) It involves the use of a PIN for authentication. B) It provides weak authentication. C) It is a relatively inexpensive mode of authentication. D) It often faces resistance from users for its invasive nature.
It often faces resistance from users for its invasive nature.
enables employees and partners to work smarter
Knowledge management (KM) benefits organizations because it ________. A) allows distributors to work within the company premises B) allows suppliers to work according to the organizational policies C) enables customers to provide bulk feedback D) enables employees and partners to work smarter
online analytical processing
OLAP stands for ________. A) online analytical processing B) object-based lead analysis procedure C) object-oriented analytical protocol D) organizational lead analysis process
In information security, which of the following is true of managing risk? A) All organizations except financial institutions should invest heavily in security safeguards. B) Organizations should implement safeguards that balance the trade-off between risk and cost. C) Passwords are classified under the technical safeguards category. D) Physical security is classified under the human safeguards category.
Organizations should implement safeguards that balance the trade-off between risk and cost.
_____ occurs when someone deceives by pretending to be someone else. A) Hacking B) Usurping C) Sniffing D) Pretexting
Pretexting
dirty data
Problematic operational data are termed ________. A) metadata B) rough data C) dirty data D) granular data
according to a schedule or as a result of an event or particular data condition
Push publishing delivers business intelligence ________. A) according to a schedule or as a result of an event or particular data condition B) through reporting, data mining, and knowledge management C) by obtaining, cleaning, organizing, relating
purchasing patterns
RFM analysis is used to analyze and rank customers according to their ________. A) purchasing patterns B) propensity to respond to a marketing stimulus C) socio-economic status D) motivation and needs
Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data? A) public key B) asymmetric encryption C) key escrow D) SQL injection
SQL injection
Which of the following statements is true about losses due to computer security threats? A) Surveys on computer crimes provide accurate results since they use standard parameters to measure and tally computer crime costs. B) Some organizations don't report all their computer crime losses, and some won't report such losses at all. C) Losses due to natural disasters can be measured accurately. D) Losses due to human error are insignificant.
Some organizations don't report all their computer crime losses, and some won't report such losses at all.
Microsoft SQL Server Report manager
The ________ is the most popular BI server today. A) Oracle BI Server B) Microsoft Windows Vista C) Microsoft SQL Server Report manager D) Pentaho BI Server
dynamic
The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. A) extensible B) informal C) specific D) dynamic
online
The viewer of an OLAP report can change its format. Which term implies this capability? A) processing B) analytical C) dimension D) online
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score? A) SAMCROW has ordered recently and orders frequently, but it orders the least expensive goods. B) SAMCROW has not ordered in some time but when it did order in the past, it ordered frequently, and its orders were of the highest monetary value. C) SAMCROW has not ordered for some time and it did not order frequently, but when it did order, it bought the least-expensive items. D) SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
it is a characteristic of a measure
Which of the following accurately defines a dimension in an OLAP report? A) It is a characteristic of a measure. B) It is the item that is processed in the OLAP report. C) It is the data item of interest. D) It is referred to as a decision tree.
calculating
Which of the following is a basic operation used by reporting applications to produce business intelligence? A) coalescing B) transposing C) dispersing D) calculating
data mining
Which of the following is a fundamental category of BI analysis? A) automation B) catalog C) report servers D) data mining
average cost
Which of the following is an example of a measure in an OLAP report? A) customer type B) purchase date C) sales region D) average cost
regression analysis
Which of the following is an example of a supervised data mining technique? A) cluster analysis B) market-basket analysis C) regression analysis D) click streaming
It refers to data that the organization purchases from data vendors.
Which of the following is true of source data for a BI system? A) It refers to the organization's metadata. B) It refers to data that the organization purchases from data vendors. C) It refers to the level of detail represented by the data. D) It refers to the hierarchical arrangement of criteria that predict a classification or a value.
Analysts do not create a model or hypothesis before running the analysis.
Which of the following is true of unsupervised data mining? A) Analysts do not create a model or hypothesis before running the analysis. B) Neural networks are a popular unsupervised data mining application. C) Unsupervised data mining requires tools such as regression analysis. D) Unsupervised data mining requires analysts to fit data to suggested hypotheses.
OLAP reports are more dynamic than RFM reports.
Which of the following observations about RFM and OLAP reports is true? A) RFM is more generic than OLAP. B) OLAP reports are more dynamic than RFM reports. C) RFM reports have measures and dimensions. D) RFM reports can drill down into the data.
These systems encode human knowledge in the form of "If/Then" rules.
Which of the following observations concerning expert systems is true? A) The "If/Then" rules used in these systems are created by mining data. B) These systems have lived up to the high expectations set by their name. C) These systems typically have fewer than a dozen rules. D) These systems encode human knowledge in the form of "If/Then" rules.
market basket analysis
Which of the following shows the products that customers tend to buy together? A) regression analysis B) market-basket analysis C) neural networks D) cluster analysis
BI servers extend alert/RSS functionality to support user subscriptions.
Which of the following statements is true about BI publishing alternatives? A) Most dynamic reports are published as PDF documents. B) For Web servers and SharePoint, the push option is manual only C) BI servers extend alert/RSS functionality to support user subscriptions. D) Publishing static BI content requires more skill, compared to publishing dynamic BI content.
Data marts address the needs of a particular department or functional area of a business.
Which of the following statements is true about data marts? A) A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. B) Data mart users possess the data management expertise that data warehouse employees have. C) Data marts address the needs of a particular department or functional area of a business. D) Data marts are larger than data warehouses.
Purchased operational data often contains missing elements
Which of the following statements is true about operational data? A) It is always better to have data with too coarse a granularity than with too fine a granularity. B) If the data granularity is too coarse, the data can be made finer by summing and combining. C) Purchased operational data often contains missing elements. D) Problematic operational data are termed rough data.
Two important reporting applications are RFM analysis and OLAP.
Which of the following statements is true about reporting applications? A) Reporting applications deliver business intelligence to users as a result of an event or particular data condition. B) Reporting applications consist of five standard components: hardware, software, data, procedures, and people. C) Two important reporting applications are RFM analysis and OLAP. D) Reporting applications produce business intelligence using highly sophisticated operations.
knowledge discovery in databases
Which of the following terms is used as a synonym for data mining? A) regression analysis B) data warehousing C) knowledge discovery in databases D) parallel processing in databases
supervised data mining
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. A) cluster analysis B) unsupervised data mining C) supervised data mining D) click streaming
cluster analysis
With ________, statistical techniques can identify groups of entities that have similar characteristics. A) regression analysis B) cluster analysis C) expert systems D) neural networks
Content Management Systems (CMS)
______ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. A) Decision Support Systems (DSS) B) Online Analytical Processing (OLAP) applications C) Content Management Systems (CMS) D) Data Transfer Protocols (DTP)
RFM
_______ analysis is a way of analyzing and ranking customers according to their purchasing patterns. A) TQM B) CRM C) Market-basket D) RFM
pull publishing
_______ requires the user to request BI results. A) Push publishing B) Pull publishing C) Desktop publishing D) Accessible publishing
MapReduce
________ is a technique for harnessing the power of thousands of computers working in parallel. A) IPP B) MapReduce C) Granularity D) Reposition
granularity
________ is a term that refers to the level of detail represented by the data. A) Granularity B) Intricacy C) Elaboration D) Complexity
business intelligence
________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Process mining B) Business process management C) Business intelligence D) Spatial intelligence
Hyper-social knowledge management
________ is the application of social media and related applications for the management and delivery of organizational knowledge resources. A) BI server management B) Hyper-social knowledge management C) Knowledge management protocol D) Online analytical processing
data mining
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data optimization B) Database normalization C) Data mining D) Data warehousing
Knowledge management
________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. A) Intellectual property protection B) Knowledge management C) Business process reengineering D) Repository management
data acquisition
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data entry B) Data acquisition C) Data mining D) Data encryption
metadata
________ records the source, format, assumptions and constraints, and other facts about the data. A) Clickstream data B) Dimensional data C) Outsourced data D) Metadata
Which of the following usually happens in a malicious denial-of-service attack? A) a hacker monitors and intercepts wireless traffic at will B) a hacker floods a Web server with millions of bogus service requests C) an intruder uses another site's IP address to masquerade as that other site D) a phisher pretends to be a legitimate company and requests confidential data
a hacker floods a Web server with millions of bogus service requests
Which of the following is an example of a sniffing technique? A) IP spoofing B) caches C) denial of service D) adware
adware
_______ is similar to spyware but it watches user activity and produces pop-ups. A) A cookie B) Adware C) A payload D) Shareware
adware
Which of the following is considered a threat caused by human error? A) an employee inadvertently installs an old database on top of the current one B) an employee intentionally destroys data and system components C) a virus and worm writer infects computer systems D) a hacker breaks into a system to steal for financial gain
an employee inadvertently installs an old database on top of the current one
Which of the following is most likely to be a result of hacking? A) certain Web sites being censored for hurting sentiments B) small amounts of spam in a user's inbox C) an unauthorized transaction from a user's credit card D) pop-up ads appearing frequently
an unauthorized transaction from a user's credit card
With ________, the sender and receiver transmit a message using different keys. A) asymmetric encryption B) block cipher C) symmetric encryption D) stream cipher
asymmetric encryption
Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters. A) denial-of-service B) sniffing C) brute force D) phishing
brute force
Packet-filtering firewalls ________. A) can filter both inbound and outbound traffic B) examine the destination address but not the source address C) are the most complex type of firewall D) seldom examine the data or the addresses of the message
can filter both inbound and outbound traffic
Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost. A) bookmarks B) pop-ups C) cookies D) toolbars
cookies
_______ are small files that the browser stores on the user's computer when he/she visits Web sites and enables him/her to access Web sites without having to sign in every time. A) Cookies B) Botnets C) Payloads D) Public keys
cookies
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. A) Data administration B) Authentication C) Usurpation D) Data encryption
data administration
________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database. A) Data encryption B) Database administration C) Data authentication D) Database normalization
database administration
_____ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will. A) Keyloggers B) Pretexters C) Drive-by sniffers D) Phishers
drive by sniffing
Which of the following is a critical security function that the senior management should address in an organization? A) sharing the private key with all systems connected to the network B) creating IS security software programs C) establishing the security policy D) avoiding the use of perimeter firewalls
establishing the security policy
Which of the following is used for biometric authentication? A) smart cards B) facial features C) passwords D) personal identification numbers
facial features
Which of the following is classified as a technical safeguard? A) cookies B) firewalls C) key escrow D) passwords
firewalls
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. A) Pretexting B) Phishing C) Hacking D) Spoofing
hacking
Which of the following is considered a computer crime? A) deletion of records by an employee who is unaware of operating procedures B) poorly written programs resulting in data losses C) loss of data as a result of flooding D) hacking of information systems
hacking of information systems
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol? A) ftp B) www C) https D) .com
https
______ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed. A) Unauthorized data disclosure B) Incorrect data modification C) Denial of service D) Loss of infrastructure
incorrect data modification
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer. A) intrusion detection system B) keylogger C) botnet D) access control system
intrusion detection system
A ________ is a number used to encrypt data. A) key B) honeypot C) cookie D) cache
key
________ is the term used to denote viruses, worms, and Trojan horses. A) Malware B) Cookie C) Firewall D) Spam
malware
________ present the largest risk for an organization's infrastructure loss. A) Employees B) Natural disasters C) Hackers D) Competitors
natural disasters
A ________ examines each part of a message and determines whether to let that part pass. A) packet-filtering firewall B) private key C) mail server D) drive-by sniffer
packet filtering firewall
A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________. A) payload B) kernel C) bot herder D) key escrow
payload
Users of smart cards are required to enter a ________ to be authenticated. A) Social Security number B) public key C) personal identification number D) private key
personal identification number
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. A) hacker B) phisher C) safeguard D) sniffer
phisher
Email spoofing is a synonym for ________. A) hacking B) phishing C) usurping D) sniffing
phishing
In asymmetric encryption, each site has a ________ for encoding messages. A) botnet B) private key C) public key
public key
Key escrow is a(n) ________. A) protocol used to secure communication over the internet B) safety procedure that allows a trusted party to have a copy of the encryption key C) device that prevents unauthorized network access D) encryption algorithm that uses both public and private keys
safety procedure that allows a trusted party to have a copy of the encryption key
A(n) ________ has a microchip in it to hold data. A) ATM card B) smart card C) cookie D) key escrow
smart card
_______ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks. A) Spoofing B) Phishing C) Sniffing D) Pretexting
sniffing
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? A) the Privacy Act of 1974 B) the Sarbanes-Oxley Act C) the HIPAA of 1996 D) the Gramm-Leach-Bliley Act
the HIPAA of 1996
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow
threat
Secure Socket Layer is also known as ________. A) application layer B) transport layer security C) presentation layer D) network interface layer security
transport layer security
________ are viruses that masquerade as useful programs or files. A) Adware programs B) Spyware programs C) Trojan horses D) Worms
trojan horses
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. A) unauthorized data disclosure B) incorrect data modification C) faulty services D) loss of infrastructure
unauthorized data disclosure
_______ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data. A) Encryption B) Spoofing C) Phishing D) Usurpation
usurpation
A ________ is a type of virus that propagates using the Internet or other computer networks. A) worm B) sniffer C) Trojan horse D) phisher
worm