CHAPTER 17 MGMT – Flashcards
Unlock all answers in this set
Unlock answersquestion
Data mining is the process of _____.
answer
Data mining is the process of discovering unknown patterns and relationships in large amounts of data.
question
Which of the following is the cost of physically or electronically archiving information for later retrieval and use?
a. Retrieval cost
b. Communication cost
c. Extraction cost
d. Storage cost
e. Collection cost
answer
Storage cost is the cost of physically or electronically archiving information for later retrieval and use.
question
_____ data mining usually begins with a user telling the data mining software to look and test for specific patterns and relationships in a data set.
a. Supervised
b. Heterogeneous
c. Specific
d. Unsupervised
e. Homogenous
answer
Supervised data mining usually begins with the user telling the data mining software to look and test for specific patterns and relationships in a data set.
question
____ occur in data mining when two or more database elements occur together in a significant pattern in which one of the elements precedes the other.
a. Logic clusters
b. Association patterns
c. Sequence patterns
d. Affinity patterns
e. Data clusters
answer
Sequence patterns appear when two or more database elements occur together in a significant pattern in which one of the elements precedes the other.
question
By examining customer checkout details, supermarkets have learned that people who are buying beer typically also buy a bag of salty snacks. As a result of this finding, supermarkets often place displays of beer near the chips and pretzel aisle. Which of the following methods of processing information is most likely to have been used for discovering such information?
a. Authenticating
b. Data mining
c. Perceptual filtering
d. Bar coding
e. Optical scanning
answer
Data mining is the process of discovering unknown patterns and relationships in large amounts of data.
question
_____ use standardized protocols to describe and transfer data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company.
a. Virtual private networks
b. Corporate portals
c. Intranets
d. Executive information systems
e. Web services
answer
Web services is a software that uses standardized protocols to describe data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company.
question
The expenses that are incurred in obtaining data that is not available to a company are known as _____.
a. investment costs
b. extrapolation costs
c. acquisition costs
d. production costs
e. extraction costs
answer
Acquisition cost is the cost of obtaining data that you don't have.
question
The key to sustaining competitive advantage is _____.
a. using information technology to continuously improve and support the core functions of a business
b. employing the Internet judiciously
c. using information technology that is similar across competing firms
d. using faster computers with more memory and larger hard drives
e. assigning the core functions of a business to various managers
answer
The key to sustaining a competitive advantage is using information technology to continuously improve and support the core functions of a business.
question
The two critical steps required to make sure that data can be accessed by approved users and no one else are _____.
a. delegation and empowerment
b. authorization and empowerment
c. encryption and empowerment
d. authentication and encryption
e. authentication and authorization
answer
The two critical steps required to make sure that data can be accessed by authorized users and no one else are authentication and authorization.
question
The term data mining refers to the process of discovering unknown patterns and relationships in large amounts of data.
a. True
b. False
answer
Data mining is the process of discovering patterns and relationships in large amounts of data.
question
A user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set using _____ data mining.
a. homogeneous
b. supervised
c. heterogeneous
d. specific
e. unsupervised
answer
With unsupervised data mining, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set.
question
According to _____, about every year, computer-processing power will double and its cost would drop by 50 percent.
a. the Peter principle
b. Moore's law
c. Gresham's Law
d. the rule of e-commerce
e. Gordon's law
answer
Moore's law is the prediction that about every two years, computer processing power would double and its cost would drop by 50 percent.
question
General Remedies is a store that wanted to hold a big sale of its merchandise at very low prices for its existing and new customers. It had the mobile numbers of its existing customers, but to get the numbers of new customers it had to pay a sum of money to a telecommunications company. In the context of the costs of useful information, General Remedies incurred a(n) _____ cost.
a. extrapolation
b. processing
c. porting
d. retrieval
e. acquisition
answer
Acquisition cost is the cost of obtaining data that you don't have.
question
The two major types of data mining are _____.
a. affinity and association
b. supervised and unsupervised
c. sequence and affinity
d. random and sequence
e. qualitative and quantitative
answer
The two types of data mining are supervised and unsupervised data mining.
question
The term _____ refers to facts and figures that are in an unusable form.
a. processed data
b. nonspecific information
c. relevant information
d. statistical data
e. raw data
answer
Raw data are facts and figures.
question
Three kinds of information technology are used by executives, managers, and workers inside the company to access and share information. They are _____.
a. Internet-accesses, SSL encryption, and intranets
b. expert systems, decision support system, and virtual private networks
c. executive information systems, portals, and intranets
d. local area networks, extranets, and management control systems
e. social networking sites, local area networks, and portals
answer
Executives, managers, and workers inside the company use three kinds of information technology to access and share information: executive information systems, intranets, and portals.
question
Which of the following is the cost of turning raw data into useful information?
a. Processing cost
b. Optimization cost
c. Extrapolation cost
d. Maximization cost
e. Retention cost
answer
Processing cost is the cost of turning raw data into usable information.
question
_____ information means transforming raw data into meaningful information that can be applied to business decision making.
a. Mining
b. Processing
c. Acquiring
d. Communicating
e. Extracting
answer
Processing information means transforming raw data into meaningful information that can be applied to business decision making.
question
According to the resource-based view of information technology, sustainable competitive advantage occurs when information technology adds value, is different across firms, and is difficult to create or acquire.
a. True
b. False
answer
True
question
Association patterns are also called sequence patterns.
a. True
b. False
answer
False
Association patterns are also called affinity patterns.
question
_____ is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users, but no one else.
a. Data insulation
b. Protecting information
c. Decryption
d. Processing information
e. Capturing information
answer
Protecting information is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users but no one else.
question
Data clusters _____.
a. occur when two database elements tend to occur together in a significant way
b. are used to create samples for statistical analyses
c. occur when three or more database elements occur together in a significant way
d. help identify database elements that are different
e. are data transformed into complex, scrambled digital codes
answer
Data clusters occur when three or more database elements occur together in a significant way.
question
Whenever people shop online, as soon as they put an item in a shopping cart, they are offered a series of other items that people who made the same purchase also bought. In the context of data mining, this is an example of a(n) _____ pattern.
a. adjacency
b. extrapolative
c. predictive
d. association
e. sequence
answer
An association pattern occurs when two or more database elements tend to occur together in a significant way.
question
_____ occurs when two companies convert their purchase and ordering information to a standardized format to enable the direct electronic transmission of that information from one company's computer system to the other company's computer system.
a. Transaction channeling
b. Data manipulation
c. Information exchange
d. Electronic data interchange
e. Automated processing
answer
Electronic data interchange (EDI) occurs when two companies convert their purchase and ordering information to a standardized format to enable the direct electronic transmission of that information from one company's computer system to the other company's computer system.
question
In the context of protecting information, _____ is making sure users are who they claim to be.
a. distinction
b. authorization
c. authentication
d. decryption
e. encryption
answer
Authentication is making sure users are who they claim to be.