Information systems chapter 6 MC Q
"he five broad categories of BI/analytics tech-niques include _______________. a.heuristics, predictive analytics, simulation, data mining, and linear programming B. .optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics C..regression analysis, data mining, Monte Carlo simulation, optimization, and time series analysis D. predictive analysis, scenario analysis, image analysis, optimization, and regression analysis
B. .optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics
12.An individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making is a(n) _______________. a.systems analyst B. .database administrator C. .data scientist D. data steward"
C. .data scientist
5.A _______________ is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers. a.relational databases B. .data lake C..data warehouse D. .data lake
C..data warehouse
14.Two specific BI/analytics techniques that are in the general category of descriptive analytics are _______________ a.data mining and linear programming B.scenario analysis and time series analysis C.regression analysis and visual analytics D.Monte Carlo simulation and genetic algorithm
C.regression analysis and visual analytics
6.The goal of the _______________ step of the ETL process is to take the source data from all the various sources and convert it into a single for-mat suitable for processing.
Extract
18.Encouragement of self-service analytics almost assuredly will eliminate the risk of erroneous analysis and reporting and the problem of differ-ent analyses yielding inconsistent conclusions. True or False?
False
19.Which of the following is not a disadvantage of self-service analytics? a.It raises the potential for erroneous analysis. b.It can lead to analyses with inconsistent conclusions. c.It can cause over spending on unapproved data sources and analytics tools .d.It places valuable data in the hands of end users."
It places valuable data in the hands of end users."
"The _______________ component of the Hadoop environment is composed of a procedure that performs filtering and sorting and a method that performs a summary operation. a.ETL B.Map/Reduce program C..JobTracker D,. Hadoop Distributed File System
Map/Reduce program
8.A _______________ differs from a _______________ in that it provides a means to store and retrieve data that is modelled using some means other than the simple two-dimensional tabular relations.a.data mart and NoSQL database B..data mart and data warehouse C.NoSQL database and relational databased. D. data warehouse and data lake"
NoSQL database and relational databased.
7.A _______________ database enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. a.NoSQLb B. normalized C. SQL D. relational
NoSQLb
16.Genetic algorithm and linear programming belong in the _______________ general category of BI/analytics. a.optimization B, scenario analysis C. heuristics D. predictive analytics
Optimization
17.While there are three key components that must be in place for an organization to get real value from its BI and analytics efforts, the one that is first and foremost is the existence of a solid data management program. True or False?
True
3.Choosing what data to store and where and how to store the data are two key challenges associ-ated with big data. True or False?
True
2.The fact that big data comes in many formats and may be structured or unstructured is an indicator of its _______________
Variety
"______________ is a measure of the quality of big data..?
Veracity
4._______________ is not a key challenge associ-ated with big data. a.How to derive value from the relevant data B. Which format the data should be stored in c.How to identify which data needs to be pro-tected from unauthorized accessd. D. How to find those nuggets of data that are relevant to the decision making at hand
Which format the data should be stored in
"The primary difference between business intelligence and analytics is that _______________. a.BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algo-rithms to determine relationships among data to develop predictions of what will happen in the future. b.analytics employs techniques like optimiza-tion, predictive analysis, and simulation while BI employs descriptive analysis and text and visual analysis. c.a data scientist is required to properly employ analytics while an end user working with a database administrator can employ BI. d.organizations used to employ BI but now are moving to greater use of analytics.
a.BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algo-rithms to determine relationships among data to develop predictions of what will happen in the future.
10.The primary advantage associated with the use of an in-memory database to process big data is that _______________. a.it is much cheaper than secondary storage B..it provides access to data at rates much faster than storing data on some form of secondary storage c.it enables the storage of much larger amounts of data. D. It enables the use of Hadoop procedures to process the data"
it provides access to data at rates much faster than storing data on some form of secondary storage
15.Data mining and time series belong in the gen-eral category of _______________ of BI/analytics. a.predictive analytics B. .heuristics C. scenario analysis D. optimization
predictive analytics