Bus 188-Final chapter 8,9,10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

CH 9)________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. A) Transaction Processing Systems (TPS) B) Decision Suport Systems (DSS) C) Content Management Systems (CMS) D) Executive Information Systems (EIS)

C) Content Management Systems (CMS)

CH 9) ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data mining B) Data warehousing C) Data optimization D) Data normalization

A) Data mining

CH 8) Success metrics are also known as ________. A) key performance indicators (KPI) B) vanity metrics (VM) C) performance scale identifiers (PSI) D) Conversion Rates (CR)

A) key performance indicators (KPI)

CH 10) Which of the following usually happens in a malicious denial-of-service attack? A)A phisher pretends to be a legitimate company and requests confidential data. B) A hacker floods a Web server with millions of bogus service requests. C) A hacker monitors and intercepts wireless traffic at will. D) An intruder uses another site's IP address to masquerade as that other site.

B) A hacker floods a Web server with millions of bogus service requests.

CH 8)Which of the following statements is true about social CRM (Customer Ralationship Management)? A) All the customer relationship processes in social CRM are structured. B) Each customer crafts his or her own relationship with the company. C)Though relationships emerge from joint activity, companies control the customers' experience. D)Customers likely to generate the most business get the most attention from the organization.

B) Each customer crafts his or her own relationship with the company.

CH 10)________ is (are) a broad category of software that includes viruses, spyware, and adware. A) Phishing B) Malware C) Spam D) Cookies

B) Malware

CH 9) In ________, statistical techniques can identify groups of entities that have similar characteristics. A) supervised data mining B) cluster analysis C) regression analysis D) neural networks

B) cluster analysis

CH 9) ________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Spatial intelligence B) Data mining C) Business intelligence D) Business information

C) Business intelligence (BI)

CH 9)OLAP stands for ________. A) organizational lead analysis process B) object-based lead analysis procedure C) online analytical processing D) object-oriented analytical protocol

C) online analytical processing

CH 9) ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data integration B) Data entry C) data mining D) Data acquisition

D) Data acquisition

CH 9)A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the "data shelves". A) data model B) data mine C) data link layer D) data warehouse

D) data warehouse

CH 10) Email spoofing is a synonym for ________. A)Sniffing B) hacking C) Phishing D) usurping

c) Phishing


Ensembles d'études connexes

Intro to Econ 211 - Lehman Final Exam

View Set

Vsim Sabina Vasquez (Complex) Pre/Post

View Set