ISBC Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A ________ is a data collection that addresses the needs of a particular department or functional area of a business. A) data mart B) data room C) datasheet D) dataspace

A

As a user of IS, an employee has a responsibility to avoid ________. A) unauthorized hardware modifications B) changing system password frequently C) backup procedures D) applying software patches

A

In ________, hardware and both operating system and application software are leased. A) SaaS B) outsourcing C) PaaS D) IaaS cloud hosting

A

The IS department's principal manager is the ________. A) CIO B) CEO C) CTO D) COO

A

The source, format, assumptions, constraints, and other facts concerning certain data are called ________. A) metadata B) data structures C) microdata D) network packets

A

Which of the following is a risk of outsourcing information systems? A) Vendors can gain access to critical knowledge of the outsourcing company. B) Vendors are not subject to a contractual agreement with the outsourcing company. C) The long-term costs of information systems are outweighed by their benefits. D) Organizations opting for outsourcing cannot gain economies of scale.

A

Which of the following is true of the alignment between information systems and organizational strategies? A) Information systems must evolve with the changes made in the organizational strategies. B) The information systems infrastructure can be easily influenced by the strategic changes. C) Integrating different information systems applications with organizational strategies is inexpensive. D) Maintaining the alignment between information systems and strategies is a final process.

A

Which of the following statements is true of a data warehouse? A) A data warehouse is larger than a data mart. B) A data warehouse functions like a retail store in a supply chain. C) Users in a data warehouse obtain data pertaining to a business function from a data mart. D) Data analysts who work with a data warehouse are experts in a particular business function.

A

Which of the following statements is true of data with granularity? A) Granularity refers to the level of detail represented by the data. B) If granularity is too coarse, data can be made finer by summing and combining. C) The granularity of clickstream data is too coarse. D) If granularity is too coarse, data can be separated into constituent parts using regression.

A

________ is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics. A) Cluster analysis B) Content indexing C) Regression analysis D) Cloud computing

A

________ is the process of delivering business intelligence to users without any request from the users. A) Push publishing B) Pull publishing C) Data acquisition D) Data mining

A

In the case of ________, data miners develop models prior to conducting analyses and then apply statistical techniques to data to estimate parameters of the models. A) pull publishing techniques B) supervised data mining C) push publishing techniques D) unsupervised data mining

B

The CTO heads the ________ group in the IS department. A) operations B) technology C) trading and sales D) outsourcing relations

B

Which of the following is a fundamental category of business intelligence (BI) analysis? A) data acquisition B) data mining C) push publishing D) pull publishing

B

Which of the following is a responsibility of a systems analyst? A) advising the CIO on emerging technologies B) determining system requirements C) monitoring and fixing computer networks D) managing the IT department

B

Which of the following staff functions is at the top most of a typical senior-level reporting relationship? A) Chief Information Officer B) Chief Operating Officer C) Chief Technology Officer D) Chief Financial Officer

B

Which of the following statements is true of unsupervised data mining? A) Analysts apply data mining techniques to estimate the parameters of a developed model. B) Analysts create hypotheses only after performing an analysis. C) Regression analysis is the most commonly used unsupervised data mining technique. D) Data miners develop models prior to performing an analysis.

B

________ is the process of hiring another organization to perform a service. A) Insourcing B) Outsourcing C) Crowdsourcing D) Open-sourcing

B

________ refers to the level of detail represented by data. A) Abstraction B) Granularity C) Dimensionality D) Aggregation

B

________ requires users to request business intelligence results. A) Push publishing B) Pull publishing C) Data acquisition D) Data mining

B

A ________ is a facility for managing an organization's business intelligence data. A) datasheet B) dataspace C) data warehouse D) data room

C

In organizations where primary information systems support only accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical. A) CEO B) COO C) CFO D) CTO

C

The use of an organization's operational data as the source data for a BI system is not usually recommended because it ________. A) is not possible to create reports based on operational data B) is not possible to perform business intelligence analyses on operational data C) requires considerable processing and can drastically reduce system performance D) considers only external data and not internal data regarding an organization's functions

C

Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it? A) data acquisition B) BI analysis C) publish results D) data mining

C

Which of the following is a right of a user of information systems? A) expecting hand-holding for basic operations B) making hardware modifications to your computer as you see fit C) contributing to requirements for new system features and functions D) receiving repetitive training and support for the same issues

C

Which of the following is an advantage of outsourcing information systems? A) An outsourcing company is typically in complete control of the process. B) The long-term costs may exceed long-term benefits. C) It can be an easy way to gain expertise otherwise not known. D) The vendors can gain significant knowledge of the outsourcing company.

C

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data encryption B) Push publishing C) Data mining D) Pull publishing

C

________ process operational and other data in organizations to analyze past performance and make predictions. A) Virtualization software B) Live migration techniques C) Business intelligence systems D) Windowing systems

C

________ techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence, and machine-learning. A) Push publishing B) Pull publishing C) Data mining D) Exception reporting

C

In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the CIO reports to the ________ is more common and effective. A) CTO B) CFO C) CSO D) CEO

D

The purpose of a ________ is to extract data from operational systems and other sources, clean the data, and store and catalog that data for processing by business intelligence tools. A) data mart B) data center C) data room D) data warehouse

D

Users in a data mart obtain data that pertain to a particular business function from a ________. A) data room B) data center C) datasheet D) data warehouse

D

Which of the following is a responsibility of an information systems user? A) expecting hand-holding for basic operations B) receiving repetitive support for the same issue C) making unauthorized hardware modifications D) following security and backup procedures

D

Which of the following statements is true of BigData? A) BigData contains only structured data. B) BigData has low velocity and is generated slowly. C) BigData cannot store graphics, audio, and video files. D) BigData refers to data sets that are at least a petabyte in size.

D

Which of the following statements is true of business intelligence (BI) systems? A) Business intelligence systems are primarily used for developing software systems and data mining applications. B) The four standard components of business intelligence systems are software, procedures, applications, and programs. C) The software component of a business intelligence system is called an intelligence database. D) Business intelligence systems analyze an organization's past performance to make predictions.

D

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data interpretation B) Pull publishing C) Push publishing D) Data acquisition

D


संबंधित स्टडी सेट्स

Chapter 28: Seed Plants (Part 3 & 4)

View Set

ICT Gaming Essentials Review Questions

View Set

Chapter 4 Learning & Transfer of Training

View Set