K201 final

question
Which of the IS components below is part of a Business Intelligence Information System
answer
Hardware Software Data Procedures People
question
What is the software component of a BI System called?
answer
BI Application
question
Data produced from actual viewing habits of customers is more reliable than data produced via focus groups because buyers often say they want one thing, but purchase something else.
answer
True
question
The Business Intelligence Process contains three primary activities. What are they?
answer
Acquire data, Perform analysis, Publish results
question
Which of the following are examples of unsupervised data mining techniques?
answer
Market-basket analysis Decision trees
question
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
answer
unauthorized data disclosure
question
In information security, which of the following is true about managing risk?
answer
Organizations should implement safeguards that balance the trade-off between risk and cost.
question
Which of the following is classified as a technical safeguard?
answer
firewalls
question
A ________ is a type of virus that self-propagates using the Internet or other computer network.
answer
worm
question
If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
answer
True
question
A team of ALDI District Managers working to increase the overall Quarter 3 sales in the U.S. is an example of _______________.
answer
Cooperation
question
_____________ decisions involve the day-to-day operations.
answer
operational
question
Project data is data that includes tasks, schedules, budgets, etc.
answer
True
question
When all team members meet over Skype to discuss a plan for the xP assignment, they are participating in _____________________ communication.
answer
Synchronous
question
Project data is data that includes tasks, schedules, budgets, etc.
answer
False; project metadata
question
Version management tools limit, and sometimes even direct user activity to control workflow.
answer
False
question
There are three roles in a social media information system (SMIS). Which role is ALDI with their Twitter account @AldiUSA?
answer
user
question
Amanda is at her first IU Basketball game. She posts a selfie to Instagram getting several likes and comments. Her post along with the likes and comments are examples of _____________.
answer
content data
question
Social CRM is a(n) ________ process.
answer
unstructured and uncontrolled
question
A revenue model where advertisers display ads to potential customers for free and pay only when the customer interacts with the ad is known as ________.
answer
Freemium
question
According to McAfee, suggesting content to employees based on tags created is a characteristic of the ________ component of Enterprise 2.0.
answer
extensions
1 of

Unlock all answers in this set

Unlock answers
question
Which of the IS components below is part of a Business Intelligence Information System
answer
Hardware Software Data Procedures People
question
What is the software component of a BI System called?
answer
BI Application
question
Data produced from actual viewing habits of customers is more reliable than data produced via focus groups because buyers often say they want one thing, but purchase something else.
answer
True
question
The Business Intelligence Process contains three primary activities. What are they?
answer
Acquire data, Perform analysis, Publish results
question
Which of the following are examples of unsupervised data mining techniques?
answer
Market-basket analysis Decision trees
question
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
answer
unauthorized data disclosure
question
In information security, which of the following is true about managing risk?
answer
Organizations should implement safeguards that balance the trade-off between risk and cost.
question
Which of the following is classified as a technical safeguard?
answer
firewalls
question
A ________ is a type of virus that self-propagates using the Internet or other computer network.
answer
worm
question
If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
answer
True
question
A team of ALDI District Managers working to increase the overall Quarter 3 sales in the U.S. is an example of _______________.
answer
Cooperation
question
_____________ decisions involve the day-to-day operations.
answer
operational
question
Project data is data that includes tasks, schedules, budgets, etc.
answer
True
question
When all team members meet over Skype to discuss a plan for the xP assignment, they are participating in _____________________ communication.
answer
Synchronous
question
Project data is data that includes tasks, schedules, budgets, etc.
answer
False; project metadata
question
Version management tools limit, and sometimes even direct user activity to control workflow.
answer
False
question
There are three roles in a social media information system (SMIS). Which role is ALDI with their Twitter account @AldiUSA?
answer
user
question
Amanda is at her first IU Basketball game. She posts a selfie to Instagram getting several likes and comments. Her post along with the likes and comments are examples of _____________.
answer
content data
question
Social CRM is a(n) ________ process.
answer
unstructured and uncontrolled
question
A revenue model where advertisers display ads to potential customers for free and pay only when the customer interacts with the ad is known as ________.
answer
Freemium
question
According to McAfee, suggesting content to employees based on tags created is a characteristic of the ________ component of Enterprise 2.0.
answer
extensions
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New