BUS 101 Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Information systems that provide​ computer-based activity or action at a distance are known as​ _____________.

remote action systems

Which term refers to some measure that individuals or organizations take to block a threat from obtaining an​ asset?

safeguard

Despite the power and low cost of cloud services through the​ Internet, organizations must beware of​ ________.

security threats

The primary way for most social media providers to make money is to​ _________.

sell advertising

Which of the following is an unsupervised data mining​ technique? A. Cluster analysis B. Regression analysis C. Variety D. Hadoop E. Modeling

A. Cluster analysis

Which of the following could reduce costs and increase profit? A. increased productivity B. improved reputation C. flexible pricing D. improved response

A. Increased Productivity

Which of the following is NOT a benefit of content delivery​ networks? A. Increased load on origin server B. Increased reliability C. Decreased, even guaranteed load time D. Reduced delivery costs for mobile users E. Protection from DoS attacks

A. Increased load on origin server

Which activity does NOT occur during the Acquire Data phase in the BI​ process? A. Print B. Organize and relate C. Cleanse D. Obtain E. Catalog

A. Print

Which of the following is NOT used to produce business intelligence through reporting​ applications? A. Retracting B. Sorting C. Filtering D. Summing E. Grouping

A. Retracting

What will NOT be a feature of new mobile​ devices? A. They will be based on ERP. B. They will be based on dynamic virtualization. C. They will be based on cloud computing. D. They will have innovative mobile device UX. E. They will be coupled with dynamic and agile information systems.

A. They will be based on ERP.

You can expect the outputs of a business intelligence system to be used for all of the following purposes EXCEPT​ ________. A. eliminating the need to access the corporate data warehouse B. making decisions C. solving problems D. providing management information E. conducting project management

A. eliminating the need to access the corporate data warehouse

Operational data is generally not immediately suitable for a data warehouse due to all of the following factors​ EXCEPT_________. A. having too few attributes B. having missing values C. having the wrong granularity D. lacking integration E. including dirty data

A. having too few attributes

The three fundamental activities of the BI process are Perform​ Analysis, Publish​ Results, and​ _____________.

Acquire Data

What is the first step in the BI​ process?

Acquire data

What are the two forms of monetization that social media companies typically use to generate revenue for their​ services?

Advertising and charges for premium service

Which of the following is a PaaS service that could provide Falcon Security with a Linux or Web server on which Falcon Security would install its own​ software?

Amazon EC2

Database management systems​ (DBMS) are sometimes included in cloud​ vendor's offerings.​ ___________ is a​ petabyte-scale data warehouse available through Amazon.

Amazon Redshift

A successful quality strategy begins with

An organizational culture that fosters quality

Which of the following statements about static and dynamic reports is NOT​ accurate? A. In the BI​ context, most static reports are published as PDF documents. B. A printed sales analysis is an example of a dynamic report. C. Publishing a dynamic report typically requires the BI application to access a database or other data source at the time the report is delivered to the user. D. Dynamic reports are BI documents that are updated at the time they are requested. E. Static reports are BI documents that are fixed at the time of creation and do not change.

B. A printed sales analysis is an example of a dynamic report.

Which is a FALSE statement concerning BYOD​ policy? A. It is a liberal policy. B. It assigns work computers to employees. C. It is secure. D. It enables devices to be used in a unique way. E. It enables you to use your own device.

B. It assigns work computers to employees.

Which of the following is NOT a valid function performed by the data​ warehouse? A. To obtain data B. To redefine data C. To cleanse data D. To organize and relate data E. To catalog data

B. To redefine data

Disclosure is considered to be important in the use of social media for employee communication. All of the following are elements of​ "disclosure" EXCEPT​ ________. A. truthfulness B. oversharing C. transparency D. writing what you know E. pointing out if you have a vested interest

B. oversharing

A Web server that is specially built to manage and deliver business intelligence is called a​ _________.

BI server

​_________ are information systems that process operational and other data to analyze past performance and to make predictions.

Business intelligence systems

All of the following are possible problems with source data EXCEPT​ __________. A. Inconsistent data B. Wrong granularity C. Data not interpreted D. Too much data E. Missing values

C. Data not interpreted

Which of the below is NOT a source of a UGC​ problem? A. Junk and crackpot contributions B. Inappropriate content C. Favorable reviews D. Mutinous movements E. Unfavorable reviews

C. Favorable reviews

Which of the following does not increase profit by improving quality? A. increased productivity B. flexible pricing C. higher warranty costs D. improved reputation

C. Higher warranty costs

Which of the following statements is​ true? A. In the​ future, employers will have to stop allowing employees to bring their own devices to work. B. Within ten​ years, organizations will disappear. C. Managers may sense a loss of control in the​ future, but managing employees may mean you have to harness the power of social behavior to advance your strategy. D. Because of social media and other technological​ advances, it will be impossible to manage employees in the future. E. There will be no more need for managers and executives in businesses because all employees will become directly empowered to interact directly with one another and accomplish company tasks without costly supervisory overhead.

C. Managers may sense a loss of control in the​ future, but managing employees may mean you have to harness the power of social behavior to advance your strategy.

Which of the below is an example of platform as a​ service? A. Amazon EC2 B. Apple iCloud C. Microsoft Azure D. Amazon S3 E. Microsoft Office 365

C. Microsoft Azure

With​ _________, the vendor might lose control of the customer relationship.

CRM

What actions could an organization take that may produce a biased study in the publish report phase of the BI​ process?

Changing criteria until they achieve a desired result

A new organizational​ position, called​ _________, is likely to be common in the future as organizations seek to develop and manage innovative social media programs.

Chief Digital Officer

A​ _______ network delivers user data in many different geographical locations and makes those data available in a way that minimizes response time.

Content delivery

________________ measures the frequency that someone who clicks on an ad makes a purchase.

Conversion rate

All of the following are social media providers EXCEPT​ ________. A. Pinterest B. Twitter C. Facebook D. Linksys E. LinkedIn

D. Linksys

Managing Quality helps build successful strategies of

Differentiation, low cost and response

What is a key pillar given in​ Intel's Rules of Social Media​ Engagement?

Disclosure

Which of the following is NOT an example of​ SaaS? A. Apple iCloud B. Salesforce.com C. Microsoft Office 365 D. Microsoft OneDrive E. Elastic Cloud 2

Elastic Cloud 2

Which of the following is NOT used in social​ CRM?

Email

Which of the following converts plain text to garbled text that can later be converted​ back?

Encryption

Which of the following is a true statement when using social media and human​ resources?

HR employees use Facebook to form opinions about job applicants.

A new employee does not fully understand the procedures involved when updating customer information and fails to complete all the changes needed. This is an example of which type of​ threat?

Human error

What is the main issue concerning advertisements and mobile​ devices?

It is a design problem.

What is an example of the​ "Use Common​ Sense" pillar?

Keep it cool

Amazon.com will preinstall either​ ___________ or Windows Server on the cloud hardware.

Linux

What is a risk associated with customer service when considering a​ SMIS?

Loss of control

If Falcon Security wished to install some of its own custom developed application software in the​ cloud, it would need to obtain​ ________ cloud resources.

PaaS​ (Platform as a​ Service)

What is the name of the query language used in​ Hadoop?

Pig

Which term refers to delivering business intelligence reports to users based on their explicit requests for BI results of data​ analysis?

Pull publishing

_________ delivers business intelligence to users without any request from the users.

Push publishing

__________ is NOT a valid BI data source.

RFM

What is one way an organization can publish BI​ results?

RSS Feeds

Capital is a key term in economic analysis. What does social capital primarily refer​ to?

Relationships

Which of the following cloud service categories provides the more comprehensive and complete set of​ services?

SaaS

The method of obtaining​ cloud-based services that include hardware​ infrastructure, an operating​ system, and application programs is termed​ _______.

SaaS​ (Software as a​ Service)

Which value chain element is affected most directly from​ peer-to-peer social media reviews of the product manufactured by a company posted by customers who have purchased that​ product?

Sales and marketing

Which of the following is NOT a threat related to computer​ crime?

Service interruption

​________ enables the relationship between customers and organizations to emerge in a dynamic process as both parties create and process content.

Social CRM

​________ is defined as the investment in social relations with the expectation of returns in the marketplace.

Social capital

​___________ is the use of information technology to support the sharing of content among networks of users.

Social media​ (SM)

What did the retail store Target do differently than its competitors who were still watching the local paper for life events such as graduations and baby​ announcements?

Target used BI to identify purchasing patterns.

​________ is a remote action system that enables physicians to provide service to patients located in hard to reach areas of the world.

Telediagnosis

What is the LEAST likely future for​ cloud-based hosting​ services? A. They will become less costly over time. B. They will become even more secure over time. C. They will become less popular over time. D. There will be an explosion of employment opportunities for people to operate and manage hosting sites. E. More companies will opt to build private clouds instead.

They will become less popular over time.

What is the primary purpose of a business intelligence​ system?

To utilize operational and other data for analyzing company performance and making predictions

​__________ is a subset of a public cloud that has highly​ restricted, secure access.

VPC

​________ can be used to create what appears to be a private secure network over the Internet.

Virtual Private Networks

Unlike static​ reports, dynamic reports​ ________.

are updated at the time they are requested

Organizations can place data in the​ _______ and even have that data be made elastically available.

cloud

Social media data consists of two​ components: _________ and​ __________.

content; connections

The likelihood that someone who clicks on an ad completes a transaction that benefits the advertiser is termed the​ ________.

conversion rate

Content data is​ ___________ that are contributed by users.

data and responses to data

A​ ________ is a facility for managing an​ organization's BI data.

data warehouse

Once data from various sources are​ obtained, cleansed, and​ organized, they are placed in​ a(n) ________.

data warehouse

Another term for problematic data is​ ________________.

dirty data

The goal of Big Data analysis is to​ ____________.

find patterns and relationships

The​ _____________ revenue model offers users a basic service for free and then charges a premium for upgrades or advanced features.

freemium

PaaS leases​ __________ and operating systems from the cloud vendor.

hardware

Social media users are​ ________.

individuals and organizations

If you are​ a(n) _____________ in your social​ network, your opinion may force a change in​ others' behaviors and beliefs.

influencer

The consumers of the processes of a business intelligence system are termed​ __________.

knowledge workers

When organizations enable customers to help each other solve problems with the​ organization's products via social​ media, the primary concern is​ ________.

loss of control

The main purpose of Project Loon​ is________________.

providing Internet access to remote locations

The purpose of developing a​ _________ is to delineate​ employees' rights and responsibilities regarding social media.

social media policy

Organizations such as​ Facebook, Snapchat, and LinkedIn are termed​ ________, since they provide the platforms that enable the creation of social networks.

social media providers

The​ ___________ component of a BI system is called a BI application.

software

Google has projects underway that will increase the​ Internet's ________.

speed and spread

To an​ organization, the​ ____________ is the likelihood that the other person in the relationship will do something that benefits the organization.

strength of a relationship

Organizations seek to​ _________ relationships in order to increase the likelihood that the other party in the relationship will do something beneficial to the organization.

strengthen

A BI server extends​ alert/RSS functionality to support user​ ___________, which are user requests for particular BI results on a particular schedule or in response to particular events.

subscriptions

​Tele-surgery uses​ _____________ to link surgeons to robotic equipment at distant locations.

telecommunications

Mobility, social​ media, and​ ___________ mean fascinating opportunities for your​ non-routine cognitive skills in the next 10 years.

the cloud

A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' permission.

threat

A​ _____________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owner's permission, and often without the​ owner's knowledge.

threat

A​ virtual, private pathway over a public or shared network from the VPN client to the VPN server is also called​ a(n)___________.

tunnel

Cluster analysis is an example of​ ________.

unsupervised data mining

When an analyst studies some data and develops a hypothesis after viewing the results to explain the​ observations, the analyst is using​ _________.

unsupervised data mining

A virtual private network​ ________.

uses tunneling and encryption to create secure private communication using the public Internet

According to Henk​ Flap, the​ ____________________ is determined by the number of relationships in a social​ network, by the strength of those​ relationships, and by the resources controlled by those related.

value of social capital

A​ ________ is an opportunity for threats to gain access to individual or organizational assets.

vulnerability

​________ includes the risk of inappropriate and negative comments.

​User-generated content


Ensembles d'études connexes

Final Exam - Chapters 6, 7, 8, 9

View Set

Chapter 8 Skeletal System: Axial Skeleton

View Set

Life Insurance Policies Chapter Quiz

View Set

Introduction to Animals - Vocabulary

View Set

Continente Americano: Aspectos Gerais e Analogias Geográficas

View Set

MAN 3240 Module 12 quiz 12 ch 14

View Set

CCENT 1.2 Compare and Contrast TCP and UDP Protocols

View Set

economics concepts and choices chapter 17

View Set