Business Intelligence Systems Ch 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Challenges of Content Management

- Huge databases - Dynamic content - Documents refer to one another - Perishable contents - In many languages

The singularity

-Computer systems adapt and create their own software without human assistance -Machines will possess and create information for themselves

functions of BI server

1. Management 2. Delivery

Which of the below exactly defines a Content Management​ System? A. They are information systems that support the management and delivery of documents including​ reports, Web​ pages, and other expressions of employee knowledge. B. It is a data​ collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. C. They are​ rule-based systems that encode human knowledge in the form of​ If/Then rules. D. It is the data collections that are characterized by huge​ volume, rapid​ velocity, and great variety. E. It is a technique for harnessing the power of thousands of computers working in parallel.

A

Which of the below is NOT a feature of a data​ mart? A. Data marts distribute data to all of the data warehouses. B. It is smaller than a data warehouse. C. It is a collection of data. D. It addresses the needs of a particular department. E. Users in a data mart obtain data that pertain to a particular business function.

A

Which of the following is NOT an​ AI-enabled human assistant currently available to​ consumers? A. Kalvin B. Siri C. Cortana D. Google Assistant E. Alexa

A

What is one risk in supply chain problem solving via social media?

A company would be solving their problem in front of their computer

OLAP (online analytical processing)

A dynamic type of reporting system that provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. Such reports are dynamic because users can change the format of the reports while viewing them.

_________ is a BI application that inputs data from one or more sources and applies reporting operations to that data to produce business intelligence

A reporting application

RFM analysis

A technique readily implemented with basic reporting operations to analyze and rank customers according to their purchasing patterns.

Which type of job will be MOST threatened by advances in​ automation?

Agricultural laborer

Which of the following statements is TRUE about unsupervised data mining:

Analysts do not create a model or hypothesis before running the analysis

unsupervised data mining

Analysts do not create a model or hypothesis before running the analysis.

Which of the following is a benefit of knowledge​ management? A. Improves the quality of data purchased from external sources B. Improves process quality C. Big Data D. Improves granularity of data E. Encourages individualism as a valued trait within the organization

B

static reports

BI documents that are fixed at the time of creation and do not change

dynamic reports

BI documents that are updated at the time they are requested

Project Management

Build in-store cafés. Expand to other locations.

Which of the below statements is INCORRECT with respect to BI​ systems? A. Business intelligence can be used to identify what is well within the system. B. Decision support systems allow businesses to make decisions. C. Business intelligence may not be able to show future business trends. D. Business intelligence can be used during project management. E. Business intelligence can be used to identify what could be well within the system.

Business intelligence may not be able to show future business trends.

Which is NOT a function of a data​ warehouse? A. Obtaining data B. Cleansing data C. Making decisions on data D. Cataloging data E. Organizing and relating data

C

Which of the following forces driving AI innovation refers to developments with neural​ networks? A. Large data sets B. Cloud scalability C. New AI techniques D. Increased device connectivity E. Increased computing power

C

Which of the following is NOT an expected productivity gain associated with​ automation? A. ​24/7 availability B. Elimination of errors C. Higher employee turnover D. Elimination of work breaks E. Elimination of absences due to illness

C

Which of the below​ devices/applications does not support a BI​ system?

Calculator

What is a new position created because of social media?

Chief Digital Officer (CDO)

Which of the following is NOT part of data​ acquisition? A. Organizing data B. Cataloging data C. Cleansing data D. Obtaining data E. Collapsing data

Collapsing data

_______ are information systems that support the management and delivery of documents including reports, web pages, and other expressions of employee knowledge.

Content Management Systems (CMS)

____ are small filed that enables a browser to access Web Sites without having to sign in every time

Cookies

Which of the following statements is TRUE about data marts?

Data marts address the needs of a particular department or functional area of a business

Which of the following is NOT a suitable application for machine​ learning?

Designing an innovative medical device

Which of the following statements is true about the position definitions component of human safeguards?

Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk

Google states that it has over​ 1,000 working AI projects. This fact illustrates which of the following forces driving AI​ innovation? A. New AI techniques B. Large data sets C. Increased computing power D. Increased device connectivity E. Solve practical problems

E

In the OLAP​ report, which of the following operations is​ allowed? A. List Down B. Drill Down C. Cross Through D. Drill Below E. Drill From

E

​__________ is not a basic reporting operation performed in a business intelligence application.

Editing

A data mart is larger than a data warehouse

False

Data warehouses may include data that is purchased from outside sources

False

Secure Sockets Layer (SSL) is a protocol that is restricted to asymmetric encryption

False

data aggregators

Firms that collect and resell data.

_______ is a location service that allows applications to know when a user has crossed a specific location and then triggers an automated action

Geofencing

​__________ is not the problem associated with operational data.

Granular data

Problem Solving

How can we increase sales? How can we reduce food waste?

Which of the following statements about the future of BI is NOT​ accurate?

Humans work faster than​ machines, but only machines can work​ 24/7.

What is the second step in developing a practical social media plan?

Identify success metrics

Business Intelligence Systems

Information systems that produce business intelligence

Which of the following is a BI data source that will increase in importance by​ 2031?

IoT devices

which of the following is true about the secure sockets layer SSL?

It is used to send sensitive data such as credit card numbers

Which of the following statements is TRUE of source data for a business intelligence (BI) system?

It refers to data that the oreanization purchases from data vendors

​__________ is the process of creating value from intellectual capital and sharing that knowledge with​ employees, managers,​ suppliers, customers, and others who need that capital.

Knowledge management

Which AI technique relies heavily on large data sets of training​ data?

Machine learning

According to a Ponemon Institute​ study, what is the most common type of attack?

Malware

________ is a broad category of software that includes viruses, spyware, and adware.

Malware

____ is a technique for harnessing the power of thousands of computers working in parallel

MapReduce

______ refers to the source, format, assumptions and constraints, and other facts about the data

Metadata

A _____ is a computing system modelled after the human brain that is used to predict values and make classifications.

Neutral network

Which of the following observations about RFM and OLAP reports is TRUE?

OLAP reports are more dynamic than RFM reports

______ are the primary means of authentication for a users computer and other networks and servers to which the user may have access

Passwords

Email spoofing is a synonym for ________.

Phishing

_____ requires the user to request business intelligence (BI) results.

Pull publishing

Which of the below is not a way of analyzing data in a Business intelligence​ (BI) system? A. Data mining B. Analytics C. Reporting D. Knowledge management E. Purchase management.

Purchase management

pig

Query language used with Hadoop

​__________ can be used to rank customers based on their buying patterns.

RFM analysis

Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data?

SQL INjection

Which of the following components of AI is NOT used in​ self-driving cars?

Speculating

Content Management System (CMS)

Support management and delivery of documents and other expressions of employee knowledge

Which of the following legal safeguards for data deals with the protection of consumer financial data stored by financial institutions

The Gramm-Leach-Biley GLB Act

_____ is a concept that computer systems will become sophisticated enough that they can adapt and create their own software and hence adapt their behavior with out human assistance

The Singularity

artificial intelligence (AI)

The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making.

Knowledge Management (KM)

The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.

Advertisers like digital ads because users can respond directly to Web ads by clicking on them

True

An OlAP cube and an OlAP report are the some thing

True

Companies should develop a social media policy for internal use.

True

Data mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction

True

One of the personal security safeguards is to use https at trusted, reputable vendors.

True

If you had a conversation and could not tell you were interacting with an AI​ system, the system has passed the​ __________ test.

Turing

Deciding

Which customers shop at each location? Create custom marketing plans per store.

Informing

Which products are selling quickly? Which products are most profitable?

BI server

a Web server application that is purpose-built for the publishing of business intelligence

data lake

a central repository for large amounts of raw unstructured data

neutral networks

a computing system modeled after the human brain that is used to predict values and make classifications

data mart

a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business

​Obtaining, cleansing,​ organizing, and cataloging data are functions of​ __________.

a data warehouse

data warehouse

a facility for managing an organization's BI data

Deep Learning

a method for stimulating multiple layers of neural networks rather than just a single layer

Map Reduce

a technique for harnessing the power of thousands of computers working in parallel

Big Data

a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety

The Naïve Bayes Classifier used in evaluating email messages is an example of​ a(n) __________.

algorithm

Hadoop

an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce

All of the following are forms of promotion using social media information systems created by employees for customers except

answering phone calls

When a Georgia Tech professor created​ "Jill Watson" to answer​ students' questions about his​ course, he was demonstrating an application of​ __________.

artificial intelligence

A kred score metric identifies with the _____ goal for social media metrics

brand awareness

Strong AI

can complete all of the same tasks a human can

Superintelligence AI

capable of intelligence more advanced than human intelligence

________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser.

conversion rate

John has been appointed as an operations manager at a software company. Which of the following systems procedures will be John's responsibility?

creating a backup of system databases

Artificial intelligence (Al) requires a large amount of ____ in order to learn, represent knowledge, and process natural language

data

structured data

data in the form of rows and columns

supervised data mining

data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model

push publishing

delivers business intelligence to users without any request from the users

Organizations normally use one strong firewall to protect the network

false

The social media flow can be diagrammed and designed because it is static

false

Weak AI

focused on completing a single specific task

LinkedIn uses the​ ________ because regular users access LinkedIn for free but you can upgrade individual upgrades range from​ $29 a month to use services such as the ability to direct email messages to LinkedIn users outside​ one's network.

freemium revenue model

All of the following are sources Watson's acquires content except

from questions

BI system 5 components

hardware, software, data, procedures, and people

Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a ________.

honeypot

Business intelligence systems generate business intelligence by​ __________ data.

identifying patterns in

Knowledge management (KM) benefits organizations because it

improves process quality and increases team strength

All of the following are ways social capital adds value except ______

it allows to make more friends

Which of the following statements is true about data administration

it is involved in establishing data safeguards

all of the following are enterprise 2.0 SLATES components except

layers

organizations as social media users use the platforms to accomplish all of the following except:

monitor employees

In the recent decades all of the following have altered existing communication channels except

national newspapers

The ability of a computer system to understand spoken language is termed​ __________.

natural language processing

IBM's Watson uses ______ or the ability of a computer system to understand spoken human language.

natural language processing (NLP)

Functions of a Data Warehouse

obtain data, cleanse data, organize and relate data, catalog data

A ______ examines each part of a message and determines whether to let that part pass

packet-filling firewall

ABC Corp is partnering with a company to offer ads. The company will show the ads for free and ABC Corp only pays if the customer visits the page from that ad. ABC Corp is using the ________.

pay-per-click

All of these are ways to generate revenue using the freemium model except

pay-per-click

In the content of malware protection, the program code that caused the unwanted actions is called the

payload

All of the following are personal security safeguards except:

pop-ups

Machine learning is focused on predicting accurate outcomes based on

previously known training data

An overlooked but significant benefit of automation that extends beyond productivity gains is​ __________.

reduction in employee fraudulent behavior

Three fundamental categories of BI Analysis

reporting, data mining, BigData

pull publishing

requires the user to request BI results

Jobs requiring ________ are prime candidates for automation.

routine mental tasks

An OLAP report has measures and dimensions. Which of the following is an example of a dimension

sales region

Ray Kurzweil developed a concept he calls the​ __________, which is the point at which computer systems become sophisticated enough that they can adapt and create their own software and hence adapt their behavior without human assistance.

singularity

The factors included in social capital evaluation are ________.

social capital= number of relationships+relationship strength * entity resources

________ is the use of information technology to support the sharing of content among networks of users.

social media

Artificial intelligence (Al) research has been driven by the demand for applications that ________ such as ways to filter offense content

solve practical problems

The goal of creating an artificial general intelligence that can complete all of the same tasks a human can is termed​ __________ AI.

strong

BI servers extend functionality to allow users to create​ __________ to receive​ requested, published BI results.

subscriptions

It is commonly believed that it will take hundreds of years to create​ __________, which is more advanced than human intelligence.

superintelligence

Natural Language Processing (NLP)

the ability of a computer system to understand spoken human language

data mining

the application of statistical techniques to find patterns and relationships among data for classification and prediction

Machine Learning

the extraction of knowledge from data based on algorithms created from training data - focused on predicting outcomes based on previously known training data

Business Intelligence

the patterns, relationships, and trends identified by BI system

All of the following should be a incident response plan except

the person who caused the incident

BI analysis

the process of creating business intelligence

Publish results

the process of delivering business intelligence to the knowledge workers who need it

master data management

the process of making data acquired from different data sources uniform and consistent

automation

the process of making systems operate without human intervention

Data Aquisition

the process of obtaining, cleaning, organizing, relating, and cataloging source data

reporting analysis

the process of sorting, grouping, summing, filtering, and formatting structured data

BI application

the software component of a BI system

A _______ is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owners permission and often without the owners knowledge.

threat

A social media information system (SMIS) is an information system that supports the sharing of content among networks of users

true

Data protection laws may be stronger in other countries than in the US

true

Every organization should have an incident response plan

true

Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.

true

Organizations should use the same process for creating a plan to use enterprise social networks internally as using social media networks externally

true

Symmetric encryption is simpler and much faster than asymmetric encryption

true

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

unauthorized data disclosure

Julie explained to management that she only counts active users on the site and not only registered users. Measuring all of the registered users is considered a ________ and does not improve decision making.

vanity metrics

The Doggie Store created a "cutest dogs" competition with a grand prize of 100 gift certificate to the store and put it on their INSTA to create a _______

viral hook

Cost savings from automation comes primarily from reduced​ __________.

wage and benefit expenses

In social media, _____ are the product

you

​__________ is a data mining technique that determines product sales patterns.

​Market-basket analysis


Ensembles d'études connexes

Tout le travail d'introduction sur Le Canada, Province du Québec

View Set

Econ 202 - Study Guide Chapter 2

View Set

Adult health Chapter 23 Nursing management - patients with gastric and duodenal disorders

View Set

Fundamentals:Skills Physics: The mechanics of the Human Body

View Set

Physiological adaptation (goal > 65%)

View Set

MKT 473: Marketing Management: Policy and Strategy

View Set

ACLS Certification Exam Quiz 2020

View Set