In a BPMN process diagram, all activities for a
given role are shown in that role's ________.Swim lane
The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources.
Configuration control
The situation that occurs when adding more
resources creates inefficiencies is known as ________.Diseconomies of scale
In a BPMN process diagram, a ________ represents an activity.
Rectangle w/ rounded corners
In a business process, a role refers to ________.
A collection of activities
In the SDLC, the first major task for an
assembled project team is to ________.Plan the project
In paired programming ________.
Two team members share the same computer to write a computer program together
The Information Systems Audit and Control Association has created a set of standard practices called ________ that are often used in the assessment stage of the BPM cycle.
COBIT
The resulting project plan from the system
definition is the input to the second SDLC phase, which is ________.Requirement analysis
________ is a standard set of terms and graphical notations for documenting business processes.
Business Process Modeling Notation
Which of the following is true of information
systems?Every information system has at least one application
A ________ is a person who is well versed in an organization's strategy and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies.
Business analyst
A ________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function.
Business process
In BPMN, ________ depict the flow or sequence of activities in a process.
Solid lines
The rapid application development, the unified
process, extreme programming, and Scrum are examples of ________.SLDC
During the requirements definition stage of
developing an information system, the project team will include mostly ________.Business and systems analysts
In business process management, once the as-is model is created, the very next step that a team must take is to ________.
Create system components
Fixing a system so that it works correctly, or
adapting it to changes in requirements, occurs in the ________ phase of the SDLC.Maintenance
________ include identifying what is to be
produced, how frequently and how fast it is to be produced.Requirements
The final WBS plan is denoted as the ________ WBS, and it shows planned tasks, dependencies, durations, and resource
assignments.Baseline
The ________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes.
OMG
The first step in the system definition phase of
systems development is to ________.Determine the goals and scope
Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system.
Implementation
The final phase of systems development involves ________.
Maintaining the system
A ________ shows the tasks, start and finish
dates, and dependencies for the tasks of a project.Gantt chart
Once we have defined a project's goals and
scope, the immediate next step is to _______.Access feasibility
Project teams create a ________, which is a
hierarchy of the tasks required to complete a project.Work-breakdown structure
An as-is model ________.
Documents the current situation of a business process
A(n) ________ is a formal description of a
system's response to use and misuse scenarios.Test plan
In a business process, resources are _______.
People or computer applications that are assigned to roles
The ________ is a sequence of activities that determines the earliest date by which a project will be completed.
Critical path
When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________.
Vendor
Which of the following is true about outsourcing?
It saves both direct & indirect management time
Users should not bother IS personnel for trivial
issues, so they have a responsibility to _______.Learn basic computer skills
Which of the following statements is true of the operations group in an organization's IS department?
It monitors the user experience & responds to user problems
Which of the following is a right of users of
information systems?Receiving effective training according to their requirements
________ is the process of hiring another
organization to perform a service.Outsourcing
Outsourcing gathers all of the possible risks
into the risk of choosing the right ________.Vendor
Which of the following is NOT a function of the
information systems department?Conducting external audits
If the primary information systems in an
organization support only accounting and finance activities, the CIO should most likely report to the ________.CFO
In organizations that operate significant
nonaccounting information systems, the chief information officer is most likely to report to the ________.Chief executive officer
Which of the following is a function of the
technology office in an organization's IS department?Investigating new IS technologies
Which of the following is an outsourcing
alternative, in which hardware and both operating system and application software are leased?Software as a service (SaaS)
In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.
Development
A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
System analyst
In 2005, Marriott International chose Hewitt
Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing.Business function
The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies.
Data administration
Which of the following is a risk of outsourcing
IS/IT functions?It involves the potential loss of intellectual capital
Which of the following is true about the "maintenance" of information systems?
It involves fixing problems or adapting existing systems to support new features
Which of the following is an example of a company that offers SaaS?
Salesforce.com
Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.
Information systems
International outsourcing companies like Amazon.com are particularly advantageous as they provide ________.
Customer support
The responsibilities of a computer technician
include ________.Installing software & repairing networks
Users of smart cards are required to enter a
________ to be authenticated.Personal identification number
You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in your browser's address bar will let you know that the bank is using the SSL protocol?
https
________ involve the people and procedure
components of information systems.Human safeguards
________ is a technique for intercepting
computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.Sniffing
What is a major difference between spyware and adware?
Unlike spyware, adware does not perform malicious acts
________ is the process of transforming clear
text into coded, unintelligible text for secure storage or communication.Encryption
________ are the primary means of authentication and are important not just for access to a user's computer, but also for
authentication to other networks and servers to which the user may have access.Passwords
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers,
Social Security numbers, account passwords, and so forth.Phisher
Which of the following statements is true of
biometric identification?It often faces resistance from users for its invasive nature
A(n) ________ has a microchip in it to hold data.
Smart card
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to achieve ________.
Physical security
The process of hardening is actually a _______
safeguard.Technical
A ________ is a type of virus that propagates
using the Internet or other computer networks.Worm
A ________ is a person or organization that
seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.Threat
________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee
data, and other proprietary and confidential data.Hacking
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
HIPAA of 1996
Which of the following is an example of a technical safeguard?
Firewalls
________ enable you to access Web sites without having to sign in every time.
Cookies
________ is a staff function to the chief information officer.
Data administration
Which of the following is an example of a sniffing technique?
Adware
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
IDS
-
A ________ examines each part of a message and determines whether to let that part pass.
Packet-filtering firewall
Which of the following is considered a threat
caused by human error?An employee inadvertently installs an old database on top of the current one
________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing
to spy, steal and manipulate data, or other purposes.Usurpation
_______ present the largest risk for an organization's infrastructure loss.
Natural disaster
Secure Socket Layer is also known as ______.
Transport layer security
Which of the following is true of the Secure Socket Layer (SSL)?
It is a useful hybrid of symmetric and asymmetric encryption techniques
________ occurs through human error when
employees do not follow proper procedures or when procedures have not been well designed.Incorrect data modification
If a defined project is determined to be feasible in the SDLC, the immediate next step is to ________.
Form the project team
________ set the stage for the requirements or any information systems and applications that need to be created or adapted.
Business process models
With ________ installation, the organization implements the entire system/business processes on a limited portion of the business.
Parallel
A ________ involves balancing of three critical factors: requirements, cost, and time.
Trade-off
According to Brooks' Law, adding more people to a late project will ________.
Create diseconomies of scale
A ________ installation is the riskiest because
the old system is shut down and the new system is introduced.Plunge
According to the Scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________.
Points
According to the SDLC, progress of a business process goes in a linear sequence from requirements to design to implementation. This is called the ________.
Waterfall method
Once a system has passed integrated testing, the organization installs the new system. Which term is used to refer to this activity?
System conversion
In systems development, documents, designs, prototypes, data models, database designs, working data entry screens, and the like are examples of ________.
Deliverables
The first phase of systems development involves ________.
Defining the system
Which of the following is true for the relationship between business processes and information systems?
A business process need not relate to any information system, but an information system relates to at least one business process.
The traditional technique for developing information systems is ________.
The system development life cycel
Plunge installation is sometimes called _______ installation.
Direct
What are the four dimensions of feasibility?
Cost, schedule, technical, and organizational feasibility
In BPMN diagrams, a square with a plus sign means that ____.
An activity is independent of the process
_____ are collections of related tasks that receive inputs and produce outputs
Activities
Which of the following is a form of hardware outsourcing?
IaaS cloud hosting
One of the reasons outsourcing is undertaken is to ________.
Cap an organization's financial exposure
The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.
Chief technology officer
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
Technical writer
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.
Steering committee
Which of the following is true about IS infrastructure?
Changing IS infrastructure is expensive and time-consuming
____ is a form of outsourcing.
Acquiring licensed software
The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.
Chief information officer
Which of the following is a critical security function of senior management in an organization?
Establishing the security policy and managing risk
An SQL ________ occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
Injection attack
The Privacy Act of 1974 provides protection to
individuals regarding ________.Records held by the U.S. government
Which of the following is generally a responsibility of users of information systems?
Following security and backup procedures
Which of the following is true about users of information systems?
They must learn standard techniques and procedures for the applications they use
Which of the following is a function of the steering committee for an IS department?
Setting IS priorities
Which of the following statements is true about the steering committee of an IS department?
Its meetings are conducted by the IS department
If an organization does not develop programs
in-house, then the development group of the IS department will be staffed primarily by ________.Business and systems analysts
Which of the following systems procedures is specifically the responsibility of operations personnel?
Creating back up system database
A ________ is a number used to encrypt the data.
Key
________ are viruses that masquerade as useful programs or files.
Trojan horses
In asymmetric encryption, each site has a ________ for encoding messages.
Public key
In a locked room, maintaining the computers of an organization that run the DBMS is a part of ________.
Physical security procedures
In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
Manufacturing
Which of the following is true about the changes and developments foreseen for 2023?
Most organizations will more their internal hardware infrastructure into the cloud
As an IS user, you have a right to a secure computing environment. This means that ________.
The organization should protect your computer and its files
Organizational feasibility concerns whether the
new system aligns with ________.Legal requirements
Which of the following statements about human safeguards for employees is true?
Users' computer accounts should give users the least possible privilege necessary to perform their jobs
________ protect databases and other organizational data.
Data safeguards
Which of the following is used for biometric authentication?
Facial features
________ are false targets for computer criminals to attack.
Honeypots
Which of the following would be the most disruptive to an organization when implementing an information system?
Changing reporting relationships
Abstract reasoning is the ability to ______.
Make and manipulate models
Which of the following is the least critical aspect of good information?
Additional data
The five-component framework considers individuals who maintain the data and who support the networks of computers as ______ components.
You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is _______.
Inaccurate
_____ states that the number of transistors per square inch on an integrated chip doubles every 18 months.
Moore's Law
Which of the following components in the five-component model of information system is considered an actor?
Hardware
The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the details of each invoice drawn up in the previous quarter. This information is not good because it is ________.
More that what is required
Which of the following is true about the quality of information?
The storage disk in your computer is an example of the _____ component of information systems.
Hardware
Which of the following is a common description of information?
Knowledge derived from data
Vera wants to create a password. Which one is the strongest?
NOOCSmypw$42
Which of the following types of skills is most likely be outsourced to the lowest bidder?
Accounting skills
Which of the following is a major implication of Moore's Law?
Costs of data communications and storage have become very low
Which of the following statements is true of good information?
Good information should be based on correct and complete data
Which of the following is a component of an information system, but not of information technology?
People
Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
Buying and installing new computers in the new outlets
You follow certain steps to access the supplementary readings for a course when using your organization's library management system. These steps that you follow are examples of the________ component of an information system.
Procedure
Which of the following components of information system is the easiest to change and causes the least amount of organizational disruption when changed?
Hardware
Glazer & Hicks is a firm that offers enterprise software solutions to independent retailers. The firm recently bagged a contract from a major national retail chain to develop and implement proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?
Training the employees to use and manage the new system
Identify how information technology differs from information systems.
You can buy information technology, but not information systems
According to the five-component model of information systems, the ______ component function as instructions for the people who use the information system
Procedure
You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.
____ is the activity of two or more people working together to achieve a common goal, result, or work product.
Collaboration
Good information must be _____.
Relevant
The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.
Data
Which of the following statements regarding information technology (IT) is true?
Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information.
The words that you type in a MS Word document is an example of ______.
Data
Which of the following is a valid guideline for maintaining good password etiquette?
Never ask someone else for their password
Which of the following is a low-tech information system?
A file of email addresses stored in an email program
Which of the following is a non routine cognitive skill?
System thinking ability
Which of the following ratios has fallen as a result of Moore's Law?
You have a spreadsheet that provides the airfares to different cities from New York. If this is used to make a decision, it will be considered as ________.
Data
Which of the following components constitute the computer side of information systems?
Hardware and software
An operating system like Windows or Linux is an example of the ________ component of an information system.
Software
You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.
Irrelevant
Which of the following is the best description of data?
Recorded facts or figures
Kerin is a business student interning at Benson and Hodgson, a firm specializing in exports of sophisticated equipment to other countries. She finds that she is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that she lacks ________ skills.
Abstract reasoning
Which of the following is a critical characteristic of good information?
Accuracy
Which of the following components constitute the human side of information systems?
People and procedures
You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill.
Systems thinking
The process of automation is a process of moving work from ________.
Human side to computer side
Adobe Acrobat is an application that allows users to create and edit digital documents. Adobe Acrobat is an example of a ________.
Software
Identify how information technology differs from information systems.
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
Systems thinking
As the IT manager of your organization, you need to use a coworker's account to access some information. In keeping with password etiquette, how would you go about getting his password?
You ask the coworker to type in the password where required, while you look away
The hardware components of an information system will act as a(n) ________.
Actor on the computer side
A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________ component.
Data
The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.
Irrelevant
Which among the following is the most appropriate technique for creating memorable, strong passwords?
Base your password on the first letter of the word in a phrase
The use of a conference call is an example of ________ communication.
Synchronous
The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
Strategic
Which of the following is an example of a strategic decision?
Deciding to open a centralized distribution system
-
Version-management systems ________.
Track changes to shared documents
Which of the following alternatives for sharing content provides version control?
Microsoft SharePoint
Collaboration occurs when a number of people ______.
Work together to achieve a common goal
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________phase of project management.
Planning
Being ________ is one of the most important characteristics of an effective collaborator.
Able to give negative feedback
Who is most likely to use asynchronous communication?
Members of a team who work in different time zones
One of the procedures of a collaboration project is task status reporting. This is performed in the _____ phase of the project.
Doing
______ communication occurs within a team when all team members meet at the same time.
Synchronous
Which of the following questions is best answered through unstructured decision making?
Should we continue to outsource our bookkeeping process?
Which of the following is a feature of Microsoft Lync?
Multi-party text chain
_____ decisions are decisions that support day-to-day activities
Operational
Which of the following is a comprehensive tool for content sharing?
SharePoint
Identify the project management phase in which the tasks of a project are performed.
Doing
The main purpose of the planning phase in a project is to ________.
Determine who will do what and by when
A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following is lacking in this activity?
Collaboration
A project manager has to manage tasks and budgets and solve problems during the ________ phase of project management.
Doing
Andrea, the floor supervisor at a call center, calls Bryan, a call attendant, to her office. She reports observing a few critical omissions in his calls, a finding supported by recent customer surveys. Bryan feels that Andrea is just throwing her weight around. Which of the following is a valid observation of this scenario?
Bryan needs to learn to receive feedback
With version-control systems, shared documents are placed into shared directories called ______.
Libraries
Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function?
Finalizing
Asynchronous communication occurs when team members________.
Do not meet at the same time
A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making.
Unstructured
________ decisions are the most structured and have very little need for collaboration.
Operational
Identify the least important characteristic for an effective collaborator.
Being an experienced businessperson
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.
Structured
________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.
Version control
Which of the following is a primary purpose of collaboration?
Becoming informed
_____ is a popular commercial webinar product used in virtual sales presentations.
WebEx
The fundamental purpose of the starting phase of a project is ______.
Setting the ground rules for the collaboration
Which of the following information system requirements fall into the content sharing category?
Tracking versions of many documents
The decisions about team members' roles and authorities is made during the _____ phase of a project.
Starting
Project metadata is data that is ________.
Utilized to manage the project
Which of the following observations about the relationship between decision type and decision process is true?
The higher levels of decision making are associated with unstructured decision processes
Which of the following statements is true about working with Google Drive?
Google tracks document revisions, with brief summaries of changes made
An organization defines the rules that govern a project that it needs to undertake and the people who should perform the tasks. The project is in the ________ phase of project management.
Finalizing
The need for collaboration is greatest for ________ decisions.
Strategic
Which of the following decisions is least likely to involve collaboration?
How much of product A should be ordered from vendor B
The term ________ refers to a collaboration tool where team members can easily respond and the management can easily identify the people who have not responded to a request.
Wikis
Which of the following is a key difference between strategic decisions and managerial decisions?
Managerial decisions concern allocation and utilization of resources, whereas strategic decisions concern organizational issues.
Using a standardized procedure to calculate the incentives of employees is an example of a(n)________ decision.
Structured
Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.
Managerial
Which of the following is a reason why discussion forums are better than emails in asynchronous communication?
They keep the discussion from getting off track
According to Hackman, which of the following is a primary criterion for judging team success?
Growth in team capability
Which of the following collaboration activities is mainly concerned with content sharing rather than communication?
Iteration
Which of the following tools facilitates asynchronous communication?
Discussion forum
Project data is data that is ________.
Part of the collaboration's work product
Which of the following is an example of project data?
Design document
Project leaders have to take decisions on the allocation and utilization of materials and labor. Such decisions are called ________ decisions.
Managerial
A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
Inbound logistics
According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market?
Military services
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?
A firm that sells the only drug used for a disease
Which of the following is a support activity in the value chain?
Setting up contractual arrangements for procurement
Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?
Customer service
Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
Inbound logistics
Which of the following principles of competitive advantage is associated with product implementations?
Differentiating service offerings
The difference between the value that an activity generates and the cost of the activity is called the ________.
Margin
ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC Motors is characterized by ________.
High bargaining power over its suppliers
Porter's five forces model is used to assess ________.
Industry structure
Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
Outbound logistics
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
Outbound logistics
According to Porter's model of business activities, interactions across value activities are called ________.
Linkages
The difference between the total value added and the total costs incurred is called the ________ of the value chain.
Total margin
A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________.
Establishing alliances
A ________ is a collection of something, such as data and raw materials.
Repository
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
Switching costs
RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than its competitors and uses tamperproof containers to ship its products. RedDart distinguishes itself from competitors by ________.
Providing an enhanced service
According to Porter's five forces model, in which of the following situations would the suppliers have the highest bargaining power?
A single vendor providing raw materials to many department stores
A group of grain farmers in a surplus year will have reduced ________.
Bargaining power
Which of the following principles of competitive advantage is related to process implementations?
Locking in suppliers
Porter defined value as the ______.
Amount of money that a customer is willing to pay for an offering
Focused differentiation occurs when ________.
A better product is provided within an industry segment
Organizations can lock in suppliers by making it difficult to switch to another organization or by ________.
Making it easy to work with the organization
PowerCruise, a holiday cruise firm, recently offered its existing customers, who had registered for a two-year membership, an extension of six months to their membership without any additional charges. By doing this, which competitive strategy did PowerCruise implement?
Locking in customers
According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?
Southwest Airlines
Which of the following value chain activities involves transforming raw materials into a finished product or service?
Operations
A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. The strategy used is ________.
Switching cost strategy
N-joi Ice Cream recently faced competition against their flagship brand of "black currant ice cream." The competitor made significant in-roads into this market by offering three varieties of "black currant ice cream." N-joi decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is N-joi implementing?
Product differentiation
Which of the following statements is consistent with the central idea of business process design?
Organizations should create new business processes rather than improve existing systems.
Bargaining power of customers is likely to be the highest for markets involving ________.
Industrial products
A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.
Low threat of substitutions
Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?
Sales and marketing
Which of the following is a primary activity in the value chain?
Receiving and disseminating inputs to the product
A database is an example of a ________.
Repository
Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz has ________.
Created an entry barrier
The automobile industry is characterized by many manufacturers and intense competition among them. This statement illustrates ________.
High levels of rivalry
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-enabled games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing?
Product differentiation
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
Business process
July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing?
Locking in customers
In a manufacturing business, the ________ transforms finished goods into cash.
Sales process
________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.
Business process design
Reduction in production cost results in ______.
Increased profitability
Focused cost leadership is observed when a product has the lowest cost ________.
Within an industry segment
An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that?
Establishing alliances
The cost of the business process is the sum of the cost of the inputs and the ________.
Cost of the activities
An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________.
Industry-wide differentiation
Mae manages delivery at a custom-kitchen outlet. Based on her customer's feedback, she contacts Gem Cabinets and places an order for a full-motion wall mount. Which of the following primary activities is Mae performing here?
Inbound logistics
Which of the following factors determines the structure, features, and functions of an information system used in a company?
The competitive strategy
Which of the following devices is an example of a storage hardware device?
Optical disk
Main memory is also known as ________.
Random access memory
A spreadsheet program is an example of a(n) ________.
Horizontal-market application software
Which of the following statements is true of closed source projects?
Only trusted programmers are allowed to make changes to a closed source project
When you buy an operating system for your personal computer, you are actually buying a software ________.
License
10 TB is equivalent to ______ gigabytes
10,240
Linux applications are developed using ________.
Java
Which of the following is the operating system designed by Apple?
Mac OS
A ________ is equivalent to 1,024 bytes.
Kilobyte
Which of the following is a nonvolatile memory device?
Optical memory device
Programs that perform business functions, such as general ledger and accounting, are known as ________.
Application software
Mac OS and iOS applications are constructed using _______.
Objective C
Which of the following is an output device?
Projector
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.
PC virtualization
Which of the following terms refers to a collection of servers?
Server farm
Which of the following is an example of an application program?
Microsoft Word
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access.
Mobile device
A user interface (UI) is the ________ format of an application.
Presentation
Which of the following is an advantage to the organization, if its BYOD policy offers wireless network to mobile devices?
The organization can sniff employee's mobile traffic
Thin-client applications are limited by the capabilities of the ________.
Browser
The term "open source" means that the source of the code of the program is ____.
Available to the public
Linux is an example of a(n) ____.
Open source operating system
Thin-client applications are developing using ___.
HTML5
Bits are grouped into 8-bit chunks called ____.
Bytes
Machine code ________.
Cannot be modified by humans
Which of the following terms refers to the process of a single server hosting many versions of desktop operating systems?
Desktop virtualization
With ________, a computer, such as a desktop or portable computer, hosts several different operating systems.
PC virtualization
Which of the following is a function of an application program?
Accessing a customer database
________ is installed in special, read-only memory in devices like printers or communication devices.
Firmware
Bits are used for computer data because they ________.
Are easy to represent electronically
Server application programs are programs that ________.
Are processed on server computers
An application that requires support beyond a browser on the user's computer is known as a(n) ________.
Thick-client application
________ is data delivered to the user at the precise time it is needed.
Just-in-time data
Which of the following memory devices is volatile in nature?
Cache
Which of the following is an example of an open source operating system?
Ubuntu
Android applications are developed using _______.
Java
Which of the following is an open source browser?
Firefox
________ is a version of Unix that was developed by an open source community.
Linux
To run a program or process data, the computer first transfers the program or data from disk to the ________.
Main memory
Which of the following is an example of a closed source project?
Microsoft Office
A client-server application that nothing more than a browser is called a ________.
Thin-client application
Which of the following statements is true of firmware?
Users do not need to load firmware into a device's memory
________ occurs when users move their activities, especially long-running transactions, across devices.
Roaming
When using volatile memory, the ________.
Contents are lost when power is off
DenTimes, a software package for dentists, is an example of a ________.
Vertical-market application software
Which of the following is an example of a vertical-market application software?
Inventory tracking software for an auto manufacturer
Which of the following is an input hardware device?
Bar code scanner
________ install and update software, back up and restore mobile devices, wipe software and data from devices in the event the device is lost or the employee leaves the company, report usage, and provide other mobile device management data.
MDM software
In a data model, a(n) ________ is something that a user wants to track.
Entity
Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.
Development
A ________ is a collection of forms, reports, queries, and programs that process a database.
Database application
From among the following, identify the open source DBMS product.
MySQL
Which of the following types of DBMS products is designed for smaller and simpler database applications?
Personal DBMS
Which of the following is a nonrelational data store developed by Amazon?
Dynamo
A(n) ________ is a program used to create, process, and administer a database.
DBMS
________ is an example of a personal DBMS.
Access
When you modify or delete data present in a database, you are ________.
Processing the database
In a database, when data items disagree with one another, this leads to a(n) _______.
Data integrity problem
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________.
Entities
A ________ is a request for data from a database.
Query
Which of the following data elements is placed higher than records in the data hierarchy?
File
A(n) ________ DBMS is designed to process large organizational and workgroup databases.
Enterprise
A data integrity problem will occur only if ________.
Data are duplicated
Which of the following is a nonrelational data store developed by Google?
Bigtable
Which of the following is the smallest data element in a database?
Byte
A primary key used in a database is a _____.
Column or group of columns that identifies a unique row in a table
Which of the following is a valid observation of MySQL?
It is license-free for most application
The purpose of a(n) ________ is to keep track of things.
Database
Which of the following is an example of an enterprise DBMS?
SQL Server
Which of the following is true about the database development process?
Changing a relationship from 1:N to N:M is simply a matter of changing the notations
Entities in a data model have _____ that describe the characteristics of the entity.
Attributes
A database design team transforms entities into tables and expresses relationships by defining ________.
Foreign keys
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.
Query
Identify the first step in transforming a data model into a relational database design.
Creating a table for each entity
A ________ describes the data and relationships that will be stored in a database.
Data model
Which of the following database administration tasks is related to adaptation?
Managing configuration changes in systems
________ is the process of converting a data model into tables, relationships, and data constraints.
Database design
When using the relational model to represent data, one must ________.
Add a foreign key to one of the tables
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required.
Vertical bar
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
N:M
An organization buys a proprietary database application to be used by a small workgroup of five people. This is an example of a(n) ________ DBMS.
Personal
The database administrator of an organization constantly manages the processing rights and responsibilities of employees. This is an example of a(n) ________ task.
Operational
A data model is a ________.
Logical representation of database data
Every table in a normalized database has ________.
Single theme
Which of the following is true of N:M relationships?
They can have more than one entity on each side of the relationship
Which of the following is a nonrelational data store developed by Facebook?
Bigtable
________ forms are used to read, insert, modify, and delete data.
Data entry
Metadata are ____.
Data that describes data
The rows in a database are called ________.
Records
Which of the following is an example of a database management system?
Access
The forked lines on the right side of a line on an diagram that indicates a 1:N relationship between two entities is referred to as ________.
Kerberos
An administrator should create ________ before developing a database design.
Data model
Which of the following is a developmental task of database administration?
Creating and staffing the DBA function
Minimum cardinalities in an E-R diagram refer to the minimum number of entities required in a(n) ________.
Relationship
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
Users
What are the three tiers in three-tier architecture?
User, server, and database
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.
Switch
________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.
Cable
A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.
Router
A(n) ________ is a piece of a message that is handled by programs that implement IP.
Packet
A(n) ________ is a number that identifies a particular device.
IP address
A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.
HTML tag
For a printer or laptop to connect to a wireless LAN, it must have a ________.
WNIC
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
Network
A ________ is a worldwide-unique name that is affiliated with a public IP address.
Domain name
Which of the following TCP/IP application-layer protocols is used for email transmission?
SMTP
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.
IP
________ is the most common language for defining the structure and layout of Web pages.
HTML
Which of the following is true of DSL modems?
DSL modem signals do not interfere with telephone signals
Which of the following is the most basic cloud offering?
IaaS
The IEEE 802.3 protocol standard is also known as ________.
Ethernet
The organization responsible for assigning public IP addresses is called ________.
ICANN
Which of the following statements is true about the IEEE 802.11 protocol?
It allows speeds of up to 600 Mbps
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?
FTP
A private internet that is used exclusively within an organization is called a(n) ________.
Intranet
The top layer of TCP/IP Protocol architecture is related to ________.
Applications
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.
Layered protocol
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.
Bluetooth
________ typically have transmission speeds less than 56 Kbps.
Narrowband lines
-
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
Web servers
Which of the following statements is true about IEEE 802.3?
It is the protocol for wired LAN connections
Which of the following is the most common format for IP addresses?
IPv4
Communications speeds are expressed in ____.
Bits
Communications speeds are expressed in _____.
Hyperlink
A(n) ________ uses the Internet to create the appearance of private point-to-point connections.
VPN
Compared to in-housing hosting, cloud-based hosting _____.
Minimizes the risk of investing in technology that will soon become obsolete
A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services?
PaaS
In cloud computing, resources are said to be "pooled" because ________.
Organizations share the same physical hardware through virtualization
Amazon S3 (Simple Storage Service) is an example of ________.
IaaS
An HTML document has a(n) ________ that provides metadata about the page.
Heading
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?
The cloud
A ________ is a set of rules that programs on two communicating devices follow.
Protocol
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?
HTTP
An ________ and its value indicate which Web page is to be displayed when a user clicks on a link.
href
Which of the following is true about a VPN?
It encrypts messages to ensure secure transmissions
Which of the following is an example of IaaS?
Amazon EC2
Computers that reside in different geographic locations are connected using a(n) ________.
WAN
Which of the following is a function of an ISP?
It serves as a gateway to the Internet
Which of the following is an example of a PaaS?
Oracle on Demand
Which of the following protocols guarantees secure data transmission?
HTTPS
Most LAN connections are made using ________.
UTP cable
Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?
Training employees on the successful use of the new system
Which ERP vendor acquired PeopleSoft and Siebel?
Oracle
Which of the following is a characteristic of dynamic processes?
They are adaptive processes that change structure rapidly and readily
The information system that a restaurant uses to order supplies and ingredients from its suppliers is an example of a(n) ________.
Inter-enterprise information system
Which of the following statements is true of enterprise application integration?
It connects system "island" via a new layer of software
Which of the following workgroup processes is related to customer service?
Accounting tracking
________ refers to a person's belief that he or she can be successful at his or her job.
Self-efficacy
The inherent processes defined in an ERP solution are known as ________.
Process blueprints
________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
Enterprise resource planning
Enterprise application integration is ________.
A suite of software application that consolidates existing systems by providing layers of software that connects applications together
Which of the following workgroup processes is related to sales and marketing?
Lead tracking
The major benefit of enterprise application integration is that it ________.
Enables organization to use existing applications
________ is a measure of the ratio of process outputs to inputs.
Process efficiency
________ are predesigned procedures for using software products.
Inherent processes
Process ________ is a measure of how well a process achieves organizational strategy.
Effectiveness
The two dimensions of process quality are ________.
Efficiency and effectiveness
To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.
Industry-specific soultions
When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is ________.
Developing committees and steering groups
ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category?
Steps for using the application to accomplish the activities in processes
Which of the following statements about a structured inter-enterprise information system is true?
Its procedures are formalized and the problem solutions affect multiple organizations
________ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.
Customer relationship management
________ is an example of an inter-enterprise information system.
PRIDE
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product?
Relationship management
________ processes span an organization and support activities in multiple departments.
Enterprise
________ are flexible, informal, and adaptive processes that normally involve strategic and less specific managerial decisions and activities.
Dynamic processes
________ is a major task when implementing enterprise systems.
Gap identification
A stored procedure is a ________.
Computer program stored in a database that is used to enforce business rules
Which of the following information systems minimizes data duplication among departments?
Enterprise information systems
A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise.
Trigger
________ is one of the SOA protocols.
OData
Which of the following is an example of a structured process?
Purchasing raw materials
ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________.
Train the trainer
The four major ERP products of ________ are AX, Nav, GP, and Solomon.
Microsoft Dynamics
Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects?
Marketing
ERP vendor Infor acquired which of the following ERP products?
Baan
Which of the following is true of SOA?
It enables the requesting and releasing of cloud resources.
________ is the activity of altering and designing business processes to take advantage of new information systems.
Business process reengineering
_______ are formally defined, standardized processes that involve day-to-day operations.
Structured processes
Which of the following workgroup processes is related to human resources?
Assessment
The primary purpose of an ERP system is _____.
Integration
Which of the following conditions exists when data are isolated in separated information systems?
Information silo
Which of the following is an example of a dynamic process?
Nike uses Facebook and Twitter to generate buzz about its new line of running shoes
The top two ranked ERP vendors are ________.
Oracle and SAP
Which of the following workgroup processes is related to manufacturing?
Planning and scheduling
Which of the following statements is true regarding workgroup information systems?
They support 10 to 100 users
Information systems improve process quality by ________.
Controlling process flow
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
Sponsors
________ is the application of social media to facilitate the cooperative work of people inside organizations.
Enterprise 2.0
The Web 2.0 business model relies on _______for revenue.
Advertising
To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.
Strength of a relationship
Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?
Possibility of error
Highest advertising revenue is generated from ________.
Mobile users
-
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.
Defenders-of-belief
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
Social capital
________ measures the frequency that someone who clicks on an ad makes a purchase, Likes a site, or takes some other action desired by the advertiser.
Conversion rate
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
Extensions
Deleting problematic content on social networking sites is best reserved for when ________.
The content is obscene and inappropriate
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.
Social
Web 2.0 companies provide software _______.
As a free service
A(n) ________ is a person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
Key user
Defenders-of-belief communities facilitate activities like ________.
Sales and marketing
Which of the following best represents the value of social capital?
Number of Relationships X Relationship Strength X Entity Resources
Web 2.0 as Web-delivered services and content that are paid for by ________.
Advertising
A characteristic of Web 2.0 is that the value of a Web site increases ________.
With the number of users
A ________ is content structure that has emerged from the processing of many user tags.
Folksonomy
The first step that any hypersocial organization should take is to develop and publicize a(n) ________ policy.
Social media
Which of the following revenue model is followed by companies providing Web 2.0 services?
Pay per click
Which of the following is a significant risk of using social media for inbound and outbound logistics?
Loss of privacy
________ is the essence of SM relationships.
User-generated content
Which of the following observations is true about a hypersocial organization?
It creates relationships in which both parties perceive and gain value
Which of the following statements is true of defenders-of-belief communities?
They seek conformity and want to convince others of the wisdom of their belief
Emergence in the context of management means loss of control of ________.
Employees
Which of the following is true of the model of social media developed by Gossieaux and Moran?
It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.
Which of the following activities would seekers of the truth facilitate?
Operations
________ differentiates SMIS from Web site applications.
Connection data
Social capital depreciates, but such depreciation can be ameliorated by ________.
Adding something of value to the interaction
Being linked to a network of highly regarded contacts is a form of ________.
Social credential
SM communities differ from communities in the past because SM communities are ________.
Formed based on mutual interests
________ is the use of information technology to support the sharing of content among networks of users.
Social media
________ is data and responses to data that are contributed by users and SM sponsors.
Content data
A ________ is an inducement for passing the message along through the tiers.
Viral hook
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.
Authoring
Which of the following is an SM application provider?
LinkedIn
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.
Seekers of the truth
The primary risk of peer-to-peer support is ________.
Loss of control
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component.
Signals
If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.
Leave it
A student invests money and time in taking a business administration course. In this example, the student invests in ________.
Human capital
Which of the following describes the meaning of "sense" activity, in the SEAMS dynamic process?
The communities which are important to a person
Which of the following is one of the main principles used by companies implementing Web 2.0 to attract viewers?
Free content
Web 2.0 encourages ________, which occur when the output from two or more Web sites is combined into a single user experience.
Mashups
A social media policy is a statement ________.
That delineates employee's rights and responsibilities
Responding to problematic content on social networking sites is best reserved for when ____.
The problematic content has caused the organization to do something positive as a result
In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y," or "If they're buying Y, sell them X."
Cross-selling
OLAP stands for ________.
Online analytical processing
KM benefits organizations because it ________.
Enables employees and partners to work smarter
In market-basket terminology, ________ describes the probability that two items will be purchased together.
Support
Which of the following statements is true about reporting applications?
Two important reporting applications are RFM analysis and OLAP
Which of the following is a basic operation used by reporting tools to produce information from data?
Calculating
Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor.
Curse of dimensionality
Which of the following shows the products that customers tend to buy together?
Market-basket analysis
________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.
RFM
Which of the following is fundamental category of BI analysis?
Data mining
A sales report that is current, as of the time the user accessed it on a Web server, is an example of a(n) ________.
Dynamic report
BI servers use ________ to determine what results to send to which users and on which schedule.
Metadata
________ is a hierarchical arrangement of criteria that predict a classification or a value.
A decision tree
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.
Supervised data mining
The ________ is the most popular BI server today.
Microsoft SQL Server Report manager
Which of the following statements is true about data marts?
Data marts address only a particular component or functional area of business
With ________, statistical techniques can identify groups of entities that have similar characteristics.
Cluster analysis
________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.
Content Management Systems (CMS)
A data ________ is a data collection, smaller than the data warehouse, that addresses a particular department or functional area of the business.
Mart
Which of the following terms is used as a synonym for data mining?
Knowledge discovery in database
Which of the following is an example of a measure in an OLAP report?
Average cost
Which of the following observations about RFM and OLAP reports is true?
OLAP reports are more dynamic than RFM reports
Ajax is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.
511
A ________ takes data from the data manufacturers, cleans and processes the data, and then stores it.
Data warehouse
Which of the following is an example of a supervised data-mining technique?
Regression analysis
________ attempt to directly capture employee expertise.
Expert systems
Problematic operational data are termed ________.
Dirty data
________ is the application of social media and related applications for the management and delivery of organizational knowledge resources.
Hyper-social knowledge management
U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
The viewer of an OLAP report can change its format. Which term implies this capability?
Online
The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format.
Dynamic
Which of the following observations concerning expert systems is true?
These systems encode human knowledge in the form of "If...Then" rules.
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
Data mining
________ is defined as information containing patterns, relationships, and trends of various forms of data.
Business intelligence
Which of the following accurately defines a dimension in an OLAP report?
It is a characteristic of measure
________ is a term that refers to the level of detail represented by the data.
Granularity
Because of the various problems with operational data, large organizations choose to extract operational data and store them into a(n) ________.
Data warehouse
________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.
Knowledge management
An OLAP report has measures and dimensions. Which of the following is an example of a dimension?
Sales region
An ________ and an OLAP report are the same thing.
OLAP cube
Which of the following statements is true about operational data?
Purchased operational data often contains missing elements.
Which of the following is true of source data for a BI system?
It refers to data that the organization purchases from data vendors.
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.
113
Data ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
Acquisition
How should a sales team respond to a customer who has an RFM score of 545?
The sales team should let go of this customer; the loss will be minimal.
In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________.
Lift
________ requires the user to request BI results.
Pull publishing
Which of the following is true about knowledge management (KM)?
KM boosts revenues by getting products and services to market faster.
Which of the following statements regarding information technology (it) is true?
Which of the following BEST describes Information Technology (IT)? IT refers to everything that involves computers.
Information system refers to various information technology systems like computers, software, database, communication systems, the internet, devices, and others used by an organization to collect, transfer, organize, and store data.