Exam 2: Ch. 5-8

Ace your homework & exams now with Quizwiz!

9) An effective ________ process can create customer satisfaction, speed up the collection process, and serve to provide valuable inputs into business intelligence and customer relationship management applications. A) order-to-cash B) make-to-order C) procure-to-pay D) make-to-stock

A) order-to-cash

13) An effective ________ process can help to obtain favorable conditions, reduce transaction costs, and, ultimately, create customer goodwill as it helps to efficiently fulfill customer orders. A) procure-to-pay B) procure-to-buy C) find-to-buy D) procure-to-sell E) find-to-sell

A) procure-to-pay

1) Traditionally, companies are organized around five distinct functional areas. Which of the following is one of them? A) supply chain management B) risk management C) technology management D) communication management

A) supply chain management

30) Which of the following statements is true about a data mart? A) It standardizes the format of data retrieved from different systems. B) It contains selected data from a data warehouse. C) It stores master data only. D) It is a compilation of data from the database that is organized and produced in printed format. E) It helps to eliminate data duplication.

B) It contains selected data from a data warehouse.

67) Business analytics augments business intelligence by using ________ modeling to help identify trends or predict business outcomes. A) refinement B) threat C) predictive D) multivariate E) decision

C) predictive

10) Subprocesses of the procure-to-pay process include ________. A) collecting the payment B) creating customer records C) price and terms negotiations D) creating customer satisfaction E) speeding up the collection process

C) price and terms negotiations

22) Which of the following goods are typically produced under a make-to-order approach? A) expensive high-volume goods B) cheap high-volume goods C) very expensive low-volume goods D) mass-produced goods E) goods from external vendors

C) very expensive low-volume goods

74) Which of the following is a role of data mining agents? A) tracking inventory levels B) sending a report at the first of the month automatically C) assembling customized news D) analyzing data warehouses to detect changes deemed important by a user

D) analyzing data warehouses to detect changes deemed important by a user

11) Big Data is ________. A) structured data which fit neatly into spreadsheets B) semistructured data such as clickstream and sensor data C) unstructured data such as audio and video D) characterized based on its high velocity

D) characterized based on its high velocity

65) Which of the following is a recording of a user's path through a Web site? A) clustering B) normalization C) slicing and dicing D) clickstream data E) inferencing

D) clickstream data

2) "Backward looking" budgets are typically based on ________. A) forecasts B) marketing research C) future trends D) historical data

D) historical data

19) In core business processes, which of the following uses a push-based approach? A) order-to-cash B) procure-to-pay C) production-to-order D) make-to-stock E) make-to-order

D) make-to-stock

18) The organization waits for an order, allowing the organization to initiate a ________ sequence to move the order through the production process. A) pushing B) rotating C) working D) pulling E) propelling

D) pulling

27) The purpose of a data warehouse is to ________. A) standardize the format of data retrieved from different systems B) allow managers to run queries and reports themselves without having to know query languages or the structure of the underlying data C) provide capabilities for discovering hidden predictive relationships in the data D) put key business information into the hands of more decision makers E) increase the complexity of the data to be analyzed

D) put key business information into the hands of more decision makers

26) Inbound logistics involves business activities associated with ________. A) distributing end products within the order-to-cash business process B) creating marketing literature C) communicating with potential and existing customers D) receiving and stocking raw materials, parts, and products E) order processing

D) receiving and stocking raw materials, parts, and products

20) A query is used to ________. A) organize and sort the data in a database B) allocate storage space for a database C) eliminate data duplication D) retrieve data from a database

D) retrieve data from a database

24) ________ activities are performed by the functional areas that process inputs and produce outputs. A) Base B) Core C) Support D) Extended

B) Core

73) Which of the following is a role of monitoring and sensing agents? A) keeping track of key data B) sending a report at the first of the month automatically C) assembling customized news D) analyzing data warehouses to detect changes deemed important by a user E) finding the best price for a particular product a user wants to purchase

A) keeping track of key data

21) Which of the following uses a pull-based approach? A) make-to-order B) make-to-stock C) plan-to-produce D) account-to-report E) acquire-to-dispose

A) make-to-order

12) Which of the following is the first step in the procure-to-pay process? A) negotiate price and terms B) issue purchase order C) receive goods D) receive invoice E) settle payment

A) negotiate price and terms

3) Responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ________ level of an organization. A) operational B) executive C) tactical D) business

A) operational

5) For most businesses, the ________ process entails several subprocesses including creating a customer record, checking the customer's creditworthiness, creating an order, checking and allocating stock, and shipping. A) order-to-cash B) make-to-order C) procure-to-pay D) make-to-stock E) plan-to-produce

A) order-to-cash

26) ________ integrates data from various operational systems. A) A data warehouse B) A metadata repository C) Data modeling D) Master data E) Data mining

A) A data warehouse

28) ________ involves standardizing the format of data retrieved from different systems. A) Data cleansing B) Data mining C) Digitizing D) Content mining

A) Data cleansing

83) Which of the following explains the term geocoded? A) Data is transformed into coordinates. B) Data is shared on the Internet. C) Data is used to create Web pages. D) Data is compared with similar historical data. E) Data is converted into soft data

A) Data is transformed into coordinates.

18) ________ are used to capture data to be added, modified, or deleted from a database. A) Forms B) Reports C) Queries

A) Forms

70) ________ allows using approximations or subjective values to handle situations where information about a problem is incomplete. A) Fuzzy logic B) Normalization C) Clustering D) What-if analysis E) Stickiness

A) Fuzzy logic

59) Which of the following statements is true about association discovery? A) It is a technique used to find correlations among sets of items. B) It is the process of grouping related records together on the basis of having similar values for attributes. C) It is the use of analytical techniques for extracting information from textual documents. D) It is a type of intelligent system that uses reasoning methods based on knowledge about a specific problem domain in order to provide advice. E) It makes sure that each table contains only attributes that are related to an entity.

A) It is a technique used to find correlations among sets of items.

21) ________ systems are designed to handle multiple concurrent transactions from customers. A) Online transaction processing B) Product allocation C) Yield optimization management D) Network transaction maximization

A) Online transaction processing

53) How do online analytical processing systems improve performance? A) They pre-aggregate data so that only the subset of the data necessary for the queries is extracted. B) They use reasoning methods to outline how sensitive information will be handled, stored, transmitted, and destroyed. C) They make hypothetical changes to the data associated with a problem. D) They allow for multiple dimensions to be added to a traditional two-dimensional table. E) They provide capabilities for discovering hidden predictive relationships in the data.

A) They pre-aggregate data so that only the subset of the data necessary for the queries is extracted.

46) Which of the following statements is true about key-indicator reports? A) They provide a summary of critical information on a recurring schedule. B) They help analyze why a key indicator is not at an appropriate level or why an exception occurred. C) They are produced at predefined intervals to support routine decisions. D) They highlight situations that are out of the normal range. E) They answer unplanned information requests to support a non-routine decision.

A) They provide a summary of critical information on a recurring schedule.

64) ________ is used by organizations to determine patterns in customers' usage data. A) Web usage mining B) Web crawling C) Text mining D) Decision making E) Web content mining

A) Web usage mining

5) When we consider entities as tables, each column is a(n) ________. A) attribute B) record C) form D) applet

A) attribute

23) Which of the following goods are produced using the make-to-order approach? A) commercial aircrafts B) air conditioners C) home appliances D) televisions E) refrigerators

A) commercial aircrafts

68) A(n) ________ system is a special purpose information system designed to provide assistance to organizational decision making related to a particular recurring problem. A) decision support B) intelligent C) expert D) decision generator E) decision level

A) decision support

76) Identify the primary goal for deploying a knowledge management system. A) identifying how to recognize, generate, store, share, and manage tacit knowledge B) presenting a view of long-term technology integration C) grouping related records together on the basis of having similar values for attributes D) allowing hypothetical changes to the data associated with a problem and having tacit knowledge on how these changes influence the results

A) identifying how to recognize, generate, store, share, and manage tacit knowledge

10) Identify an advantage when the database approach makes it easier to deploy and control data access. A) improved data accessibility B) improved data consistency C) improved data quality D) increased security

A) improved data accessibility

31) Which of the following is NOT a type of report generated by businesses? A) Scheduled report B) Business report C) Drill-down report D) Key-indicator report E) Exception report

B) Business report

79) Which of the following statements is true about a digital dashboard? A) It is the combination of various analysis techniques and interactive visualization to solve complex problems. B) It is used to support push reporting, exception reporting and alerts, and pull reporting usage models. C) It can visualize features and relationships between features drawn from an underlying geographic database. D) It is used to combine geographic, demographic, and other data for locating target customers

B) It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.

23) ________ are the data that is deemed most important in the operation of a business. A) Metadata B) Master data C) Reference data

B) Master data

50) ________ refers to the process of quickly conducting complex, multidimensional analyses of data stored in a database that is optimized for retrieval. A) Concept implementation B) Online analytical processing C) compartmentalization D) Data mining E) Predictive analysis

B) Online analytical processing

101) Which of the following statements is true? A) Explicit knowledge assets reflect knowledge that cannot be documented. B) Tacit knowledge assets reflect the processes and procedures that are located in a person's mind on how to effectively perform a particular task. C) A knowledge management system is based on a single technology to codify a database. D) The successful deployment of a knowledge management system should be linked to numerous business objectives

B) Tacit knowledge assets reflect the processes and procedures that are located in a person's mind on how to effectively perform a particular task.

78) ________ refers to the display of complex data relationships using a variety of graphical methods. A) Normalization B) Visualization C) Clustering D) Inferencing E) Textual mining

B) Visualization

7) In the order-to-cash process, checking credit is followed by ________. A) collecting payment B) creating an order C) allocating stock D) picking, packing, and shipping E) preparing and sending the invoice

B) creating an order

9) One of the advantages of a database approach is program-data independence. This means that it is ________. A) easier to deploy and control data access using a centralized system B) easier to evolve and alter software to changing business needs when data and programs are independent C) a centralized system, thereby making it easier to enforce access restrictions D) a centralized system, thereby making it much easier to enforce standards and rules for data creation, modification, naming, and deletion

B) easier to evolve and alter software to changing business needs when data and programs are independent

17) In the ________ process, goods are produced based on forecasts and are stored in a warehouse, and sales orders are then fulfilled from inventory. A) configure-to-stock B) make-to-stock C) make-to-order D) engineer-to-order E) assemble-to-order

B) make-to-stock

2) Which of the following is a core business process? A) time-to-purchase B) make-to-stock C) plan-to-produce D) account-to-report E) hire-to-retire

B) make-to-stock

3) Buying a book at Amazon.com illustrates which of the following core business processes? A) time-to-purchase B) order-to-cash C) plan-to-produce D) account-to-report E) hire-to-retire

B) order-to-cash

17) Business rules are captured by the designers of a database and included in a data dictionary to ________. A) organize and sort the data, complete calculations, and allocate storage space B) prevent illegal or illogical entries from entering the database C) eliminate data duplication

B) prevent illegal or illogical entries from entering the database

57) Data mining complements online analytical processing in that it ________. A) finds associations or correlations among sets of items B) provides capabilities for discovering hidden predictive relationships in the data C) extracts textual information from Web documents D) groups related records together on the basis of having similar values for attributes E) analyzes different dimensions of data beyond simple data summaries

B) provides capabilities for discovering hidden predictive relationships in the data

4) When we consider entities as tables, each row is a ________. A) field B) record C) bot D) form

B) record

25) Which of the following is a core activity according to the value chain model? A) human resource activities B) technology development C) operations and manufacturing D) administrative activities E) infrastructure activities

C) operations and manufacturing

4) Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the payment to the customer's credit card. This process of selling a product or service is known as the ________ process. A) make-to-order B) time-to-market C) order-to-cash D) procure-to-pay E) make-to-stock

C) order-to-cash

60) ________ is the process of grouping related records together based on having similar values for attributes. A) Normalization B) Data mining C) Clustering D) Inferencing E) Slicing and dicing

C) Clustering

48) ________ help in analyzing why a key indicator is not at an appropriate level or why an exception occurred. A) Activity reports B) Exception reports C) Drill-down reports D) Scheduled reports E) Key-indicator reports

C) Drill-down reports

71) Which of the following statements is true about a neural network? A) It allows multiple dimensions to be added to a traditional two-dimensional table. B) It works in the background to provide some service when a specific event occurs. C) It attempts to approximate the functioning of the human brain and can learn by example. D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.

C) It attempts to approximate the functioning of the human brain and can learn by example.

1) Which of the following statements is true about business intelligence? A) It is an act of outsourcing tasks, traditionally performed by an employee or contractor, to an undefined, large group of people or community, through the use of information technology. B) It is the process by which a customer-owned mutual organization or cooperative changes legal form to a joint stock company. C) It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions. D) It is an organization's process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people.

C) It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.

75) Which of the following statements is true about an explicit knowledge asset? A) It reflects the processes and procedures that are located in a person's mind on how to effectively perform a particular task. B) It reflects a person's ability to effectively solve a problem without external help. C) It reflects knowledge that can be documented, archived, and codified, often with the help of information systems. D) It reflects an individual's special knowledge about a new-to-the-world product.

C) It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.

A) Normalization B) Freecycling C) Stickiness D) Crowdsourcing E) Showrooming

C) Stickiness

61) ________ refers to the use of analytical techniques for extracting information from textual documents. A) Web usage mining B) Text underlining C) Text mining D) Decision making E) Web content mining

C) Text mining

16) Treston, an automobile manufacturer, recently implemented a new database system. It was confident that this system would help enhance the company's internal (employees) and external (customers and channel partners) communication. Treston had planned to pursue a just-in-time inventory system soon after the database system was implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following can be cited as a reason for the failure of Treston's database system? A) Aerodoungle launched a new version of Enterprise Database Access, which was better than Treston's database system. B) The maintenance cost of Treston's new database system was less than the one it was previously using. C) Treston's new database system was not supported by the database system of its suppliers and distributors. D) Treston's competitors implemented its database a few days prior to Treston's implementation date.

C) Treston's new database system was not supported by the database system of its suppliers and distributors.

14) A data dictionary is also known as ________. A) a data mart B) a data warehouse C) a metadata repository D) ubiquitous computing

C) a metadata repository

12) Data type helps a database management system (DBMS) to ________. A) present the data in a useful format B) format data C) allocate storage space D) eliminate data duplication

C) allocate storage space

51) Online analytical processing tools enable users to ________. A) discover hidden predictive relationships in the data B) find associations or correlations among sets of items C) analyze different dimensions of data beyond simple data summaries D) group related records together based on having similar values for attributes E) extract textual information from Web documents

C) analyze different dimensions of data beyond simple data summaries

8) In an order-to-cash process, identify the next step that the online retailer takes after creating an order for a customer. A) collect payment B) create customer record C) check and allocate stock D) pick, pack, and ship E) prepare and send invoice

C) check and allocate stock

6) An attribute is also referred to as a ________. A) form B) record C) field D) query

C) field

14) In the procure-to-pay process, the negotiation of price and terms is followed by ________. A) settling the payment B) creating the customer record C) issuing the purchase order D) receiving the goods E) receiving the invoice

C) issuing the purchase order

54) In online analytic processing systems, ________ are the values or numbers the user wants to analyze. A) dimensions B) forms C) measures D) queries E) entities

C) measures

22) Systems that are used to interact with customers and run a business in real-time are called ________ systems. A) tactical B) strategic C) operational D) informational

C) operational

81) While using digital dashboards, pull reporting is conducted to ________. A) alert the user of any items that require immediate attention B) provide the decision makers with a quick overview of key performance indicators C) discover hidden predictive relationships in the data D) analyze the root causes of an exception E) extract textual information from Web documents

D) analyze the root causes of an exception

100) Which of the following statements is true about a GIS? A) A GIS is a system for creating, storing, analyzing, and managing abstract data. B) A GIS can be used to track user input. C) A GIS works behind the scenes to create a knowledge management system. D) A GIS can link the square footage of commercial real estate to its exact location in terms of latitude and longitude.

D) A GIS can link the square footage of commercial real estate to its exact location in terms of latitude and longitude.

15) Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory levels for its stores. It is planning to implement an Oracle database system to replace this legacy system. Which of the following most supports Bringes' decision to replace its legacy system with an Oracle database system? A) Implementing an Oracle database system will require Bringe to hire additional specialized personnel to manage it. B) Partial implementation of the Oracle database system can create more problems than it is likely to solve. C) Conversion cost required for the implementation of an Oracle database system is not supported by the IT budget. D) Bringes' channel partners use a database system that supports the Oracle database system

D) Bringes' channel partners use a database system that supports the Oracle database system

58) ________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals. A) Data cleansing B) Normalization C) Clustering D) Data reduction E) Inferencing

D) Data reduction

15) ________ immediately after the purchase order is issued in the procure-to-pay process. A) Payment is settled B) Price and terms are negotiated C) Credit is checked D) Goods are received E) Invoices are received

D) Goods are received

44) Select the correct statement below. A) Artificial intelligence is the science of enabling humans to simulate machine thinking. B) Predictive modeling helps build unexplained models. C) Machine learning allows systems to learn by imitating humans. D) Intelligent systems emulate and enhance human capabilities. E) Intelligent agents (also called 'bots') are used by users to control how programs are opened

D) Intelligent systems emulate and enhance human capabilities.

24) Which of the following statements is true about an operational system? A) Its primary purpose is to support managerial decision making. B) It consists of historical or point-in-time data. C) Its goal is to enhance ease of access and use. D) It consists of narrow and simple updates and queries.

D) It consists of narrow and simple updates and queries.

56) Which of the following statements is true about the online analytic processing cube? A) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results. B) It groups related records together on the basis of having similar values for attributes. C) It understands how data are organized in the database and has special functions for analyzing the data. D) It is a data structure allowing for multiple dimensions to be added to a traditional twodimensional table. E) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.

D) It is a data structure allowing for multiple dimensions to be added to a traditional twodimensional table.

45) ________ are produced at predefined intervals to support routine decisions. A) Security reports B) Exception reports C) Drill-down reports D) Scheduled reports E) Key-indicator reports

D) Scheduled reports

49) Which of the following statements is true about ad hoc queries? A) They are produced at predefined intervals to support routine decisions. B) They provide a summary of critical information on a recurring schedule. C) They help analyze why a key indicator is not at an appropriate level or why an exception occurred. D) They answer unplanned information requests to support a non-routine decision. E) They highlight situations that are out of the normal range.

D) They answer unplanned information requests to support a non-routine decision.

72) Which of the following statements is true about user agents? A) They are also known as Web spiders. B) They are agents that search to find the best price for a particular product a user wishes to purchase. C) They are agents that continuously analyze large data warehouses to detect changes deemed important by a user. D) They are agents that automatically perform a task for a user. E) They are agents designed by spammers and other Internet attackers to farm e-mail addresses off Web sites or deposit spyware on machines.

D) They are agents that automatically perform a task for a user.

63) Which of the following is used for Web content mining? A) clustering B) Web underlining C) neural networks D) Web crawler E) data reduction

D) Web crawler

8) In a database management system (DBMS), data are kept separate from the application's programming code. This means that ________. A) an application cannot be changed without making changes to the database B) an application's programming code needs to be updated continuously to keep up with the database C) an application needs to be changed when the database is changed D) the database does not need to be changed if a change is made to an application E) the database needs to be changed when a change is made to an application

D) the database does not need to be changed if a change is made to an application

69) Which of the following analyses involves making hypothetical changes to the data associated with a problem and observing how these changes influence the results? A) predictive analysis B) time-series analysis C) linear regression analysis D) what-if analysis E) multivariate analysis

D) what-if analysis

52) Which of the following statements is true about an online analytical processing server? A) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table. B) It groups related records together on the basis of having similar values for attributes. C) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results. D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice. E) It understands how data are organized in a database and has special functions for analyzing the data

E) It understands how data are organized in a database and has special functions for analyzing the data

25) Which of the following statements is true about an information system? A) Its primary purpose is to run the business on a current basis. B) It is primarily used by online customers, clerks, salespersons, and administrators. C) It consists of narrow and simple updates and queries. D) Its design goal is to enhance performance. E) Its design goal is to enhance ease of access and use.

E) Its design goal is to enhance ease of access and use.

47) Which of the following statements is true about exception reports? A) They help analyze why a key indicator is not at an appropriate level or why an exception occurred. B) They are produced at predefined intervals to support routine decisions. C) They answer unplanned information requests to support a non-routine decision. D) They provide a summary of critical information on a recurring schedule. E) They highlight situations that are out of the normal range.

E) They highlight situations that are out of the normal range.

62) ________ refers to extracting textual information from online documents. A) Web usage mining B) Web crawling C) Text mining D) Decision making E) Web content mining

E) Web content mining

6) An online retailer has finished creating a customer record. Identify the retailer's next step in an order-to-cash process. A) create order B) allocate stock C) pick, pack, and ship D) prepare and send invoice E) check customer's creditworthiness

E) check customer's creditworthiness

29) A ________ is a data warehouse that is limited in scope. A) metadata repository B) compound data C) data model D) data entity E) data mart

E) data mart

13) Once the data model is created, the format of the data is documented in a data ________. A) warehouse B) entry C) mart D) domain E) dictionary

E) dictionary

55) In online analytical processing systems, ________ provide a way to summarize the data. A) forms B) measures C) facts D) records E) dimensions

E) dimensions

77) Social network analysis is a technique that attempts to ________. A) analyze large data warehouses to detect changes deemed important by a user B) analyze why a key indicator is not at an appropriate level or why an exception occurred C) discover hidden predictive relationships in the data D) allow hypothetical changes to the data associated with a problem and observe how these changes influence the results E) find groups of people who work together

E) find groups of people who work together

20) In the ________ process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received. A) order-to-cash B) procure-to-pay C) make-to-stock D) acquire-to-dispose E) make-to-order

E) make-to-order

27) Assembly processes are ________ activities. A) outbound logistics B) marketing and sale C) customer sales D) administrative and marketing E) operations and manufacturing

E) operations and manufacturing

11) The several processes associated with the acquiring of goods from external vendors are collectively referred to as the ________ process. A) make-to-stock B) make-to-order C) order-to-cash D) plan-to-produce E) procure-to-pay

E) procure-to-pay

80) Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends. This usage model is known as ________ reporting. A) exception B) pull C) ad hoc D) drill-down E) push

E) push

16) Receiving the goods is followed by ________ in the procure-to-pay process. A) settling the payment B) negotiating the price and terms C) issuing the purchase order D) creating the order E) receiving the invoice

E) receiving the invoice

7) A ________ is a collection of related attributes about a single instance of an entity. A) bot B) form C) query D) field E) record

E) record

19) A(n) ________ is a compilation of data from a database that is organized and produced in printed format. A) form B) attribute C) field D) entity E) report

E) report

82) The combination of various analysis techniques and interactive visualization to solve complex problems is known as ________. A) security analysis B) digital analysis C) social network analysis D) concept analytics E) visual analytics

E) visual analytics


Related study sets

POSTPARTUM NEWBORN AND INFANT EXAM

View Set

Health Assessment Exam 1, Health Assessment - MS, Neuro, & GU, Health Assessment Exam 2

View Set

Power of Attorney, by Mathis, Donnie

View Set

(PrepU) Chapter 17: Implementing

View Set

chapter 7 learnsmart accounting 2010

View Set

Cultural Geography of Africa, Social Studies

View Set