Advertisement Upgrade to remove ads

Which of the following is a basic concept associated with Web 2.0?
a. Allows user to form active so customer bases
b. Shift in users' role from the passive consumer of content to its creator
c. Provides public users with a data base

shift in users' role from the passive consumer of content to its creator

Which of the following is a consequence of the use of social software?
a. People are sharing more personal information
b. A rise in antisocial behavior
c. People literally turning into vaginas

People are sharing more personal information

The use of _______ within a company's boundaries or between a company and its
customers or stakeholders is referred to as Enterprise 2.0.
a. Web 2.0 techniques and social software
b. Vaginas
c. Social Networking Sites

Web 2.0 techniques and social software

Which of the following statements is true about web 1.0?
a. It allows consumers to more easily access information.
b. VAGINA
c. It helps rulers find information

It helps rulers find information

A major benefit of social software is the ability to harness the "wisdom of
crowds", which is also referred to as _____.
a. Crowd analysis
b. Collective Intelligence
c. Vaginas
d. Crowd intelligence

Collective Intelligence

The concept of _____ is based on the notion that distributed groups of people
with a divergent range of information and expertise will be able to outperform
the capabilities of individual experts.
a. Crowd analysis
b. Collective Analysis
c. Collective Intelligence
d. Crowd intelligence
e. Vagina intelligence

Collective Intelligence

Which of the following statements is true about a discussion forum?
a. It is dedicated to a specific topic, and users can start new threads
b. It is dedicated to a bunch of vaginas
c. Provide services to consumers

It is dedicated to a specific topic, and users can start new threads

Which of the following statements is true about blogs?
a. They allow individuals to express their thoughts in a one-to-many fashion
b. They allow individuals to restrict their privacy settings
c. They allow users to post about vaginas

They allow individuals to express their thoughts in a one-to-many
fashion

Which of the following Web 2.0 applications has been classified as the
"amateurization" of journalism?
a. Social Network
b. Blogs
c. Email
d. internet

Blogs

Keith Norat, the Chief Technology Officer of Kender Internationals, relies on
blogs while making decisions. In his words, "Blogs are an important part of our
purchase decisions." Which of the following is an underlying assumption?
a. Blogs lead to the "amateurization" of journalism
b. Blogs deny users the ability to post
c. Blogs lead to vaginas
d. Blogs allow users to do stuff

Blogs lead to the "amateurization" of journalism

Which of the following explains the term "blogosphere"?
a. How blogs are made
b. The community of all blogs
c. Where all blogs go to die

The community of all blogs

Social presence tools are also known as ________ tools.
a. Blogs
b. Microblogging
c. Macroblogging
d. Vagina-blogging

Microblogging

Which of the following facilitates real-time written conversations?
a. Email
b. Snap chat
c. Instant Messaging
d. Blogging

Instant Messaging

_______ take the concept of real-time communication a step further by allowing
people to communicate using avatars.
a. Virtual Worlds
b. Virtual Intelligence
c. Vagina Intelligence
d. Spacial Worlds

Virtual Worlds

Which of the following statements is true about virtual worlds?
a. It allows people do act inappropriately with little consequence
b. It allows people to virtual date.
c. It allows people to communicate using avatars

It allows people to communicate using avatars

The network effect refers to the notion that the value of a network is dependent
on ______.
a. Who owns the network
b. The number of other users
c. The customers of that network
d. Your moms vagina

The number of other users

_____ is a cooperative Web 2.0 application making use of the network effect.
a. Media sharing
b. Message sharing
c. email sharing

Media sharing

_______ is the distribution of digital media, such as audio or video files via
syndication feeds for playback on digital media players.
a. Internet
b. Netcasting
c. Social Media

Netcasting

Podcasting is a misnomer because podcasts _______.
a. Can be played on a variety of devices in addition to Apple's iPods
b. Can be streamed to any technological device
c. Is compatible with Apple's Vag-ipod

Can be played on a variety of devices in addition to Apple's iPods

Social bookmarking allows users to share Internet bookmarks and to create
categorization systems. These categorization systems are referred to as _____.
a. Technology economics
b. Sociology
c. Folksonomies

Folksonomies

Which of the following statements is true about social bookmarking?
a. It allow users to "tag" their friend
b. It allows users to create folksonomies
c. It allows users to bookmark

It allows users to create folksonomies

______ is the creation of a categorization system made by users.
a. Media cataloging
b. Social cataloging
c. Vagina cataloging
d. Folksonomy cataloging

Social cataloging

_____ refers to manually adding metadata to media or other content.
a. Tagging
b. Blogging
c. Economics
d. Dirp

Tagging

Which of the following statements is true about tagging?
a. It is the process of adding metadata to pieces of information
b. It is the process of adding your friends on Facebook
c. It is the process of spray painting a public wall illegally
d. It is the process of deleting data from an interphase.

It is the process of adding metadata to pieces of information

______ refer(s) to a way of visualizing user generated tags or content on a site.
a. Tag generator
b. Tag simulator
c. Tag clouds
d. Vagina

Tag clouds

Which of the following is one of the uses of geotagging?
a. Boredom
b. To know the location of a person sending out a breaking news update
c. To geographically tag your anus
d. To know the area of the servers technological orientation

To know the location of a person sending out a breaking news update

Which of the following is an example of synchronous communication?
a. Instant messaging
b. Email.
c. Intranets
d. Videoconferencing

C) Intranets or D) Videoconferencing

Which of the following is an example of asynchronous communication?
a. Instant messaging
b. Videoconferencing
c. Shared whiteboards
d. Vagina

Shared whiteboards

Which of the following factors differentiates asynchronous communication from
synchronous communications?
a. The location of the communication
b. The f word
c. Coordination in time

Coordination in time

In today's business environment, project teams comprise highly specialized
members, many of whom are not collocated. _______ are comprised of members from different geographic areas.
a. Virtual teams
b. Virtual collections
c. Virtual spendings

Virtual teams

Which of the following is an electronic communication tool that allows users to
files, documents, and pictures to each other and share information?
a. Instant messaging
b. E-mail
c. Social Media

E-mail

Which of the following is an electronic conferencing tool that facilitates
information sharing and rich interactions between users?

a. Vagina
b. E-mail
c. Social Media
d. Instant messaging

Instant messaging

Which of the following is a collaboration management tool that is used to
facilitate virtual or collocated meetings?
a. Intranets
b. E-Mail
c. Instant messaging

Intranets

Web-based collaboration tools ________.
a. Allow for easy transferability from one person to another
b. Create an easier interphase to data base communication link
c. Vagine

Allow for easy transferability from one person to another

Which of the following statements is true about Gmail?
a. It allows users to select a custom domain name for an additional fee
b. It allows users to access their banking accounts
c. It allows user to stream their photos directly by phone.

It allows users to select a custom domain name for an additional fee

Which of the following Google Apps is an instant messaging client?
a. Google Talk
b. Google Text
c. Google Chat

Google Talk

______ is an online office suite comprised of a spreadsheet application, a word
processor, and a presentation application
a. Google Docs
b. Google Word
c. Google Write

Google Docs

Which of the following statements is true about Google Sites?
a. It is a social networking tool that allows users to view each others profiles.
b. It is an enterprise-level collaboration tool that allows users to create group websites and share team information
c. It is a business to consumer tool that allows users to sell their merchandise online.

It is an enterprise-level collaboration tool that allows users to create
group websites and share team information

A(n) _______ system allows users to publish, edit, version track, and retrieve
digital information.
a. Content management
b. Publish management
c. Digital management

Content management

Which of the following statements is true about content managing systems?
a. It allows the assignment of different roles for different users
b. It allows the user to organize micro data
c. It denies access to foreign servers

It allows the assignment of different roles for different users

Which of the following is the responsibility of an administrator in a content
management system?
a. Over see all account activity
b.
c. Managing account access levels to the digital information

Managing account access levels to the digital information

______ is the creation of goods or services by self-organizing communities.
a. Peer production
b. Community production
c. Community services

Peer production

Which of the following statements is true about peer production?
a. Allows for the creation of goods and services through corporate manufacturers
b. Anyone can help in producing or improving the final outcome
c. Denies access to anyone outside your peer connections

Anyone can help in producing or improving the final outcome

Which of the following occurs during wiki wars?
a. Contributors continuously edit or delete each other's posts
b. Contributors create wikis slandering other users.
c. Legal battles sprung from discredited information.

Contributors continuously edit or delete each other's posts

_____ is a phenomenon where companies use everyday people as a cheap labor
force.
a. Outsourcing
b. Crowdsourcing
c. Vaginasourcing
d. Hiring illegal immigrants

Crowdsourcing

_______ enables people to work in more flexible ways on a variety of Internet-
related projects.
a. E-lancing
b. A-lancing
c. C-lancing
d. Freelancing

E-lancing

______ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.
a. Email
b. Blogging
c. Social Networking
d. Instant messaging

Social Networking

Which of the following statements is true about viral marketing?
a. It uses the network effect to increase brand awareness
b. It uses the viral effect to increase brand awareness
c. It uses the doppler effect to increase brand awareness.
d. It uses your moms vagina to increase brand awareness.

It uses the network effect to increase brand awareness

Which of the following is a critical factor in the success of a viral marketing
campaign?
a. Advertisement
b. Media marketing
c. Making sequels

Making sequels

______ attempts to provide relevant search results by including content from
blogs and microblogging services.
a. Google search
b. Social search
c. Bing search

Social search

Which of the following statements is true about Real Simple Syndication (RSS)?
a. It helps to syndicate the consumers orders in a user friendly environment
b. It is used in nearly every aspect of social networking
c. It is used to publish the most current blogs, podcasts, videos and news stories

It is used to publish the most current blogs, podcasts, videos and news stories

For companies operating in the digital world, online collaboration with
suppliers, business partners, and customers is crucial to being successful.
________ allow(s) data to be accessed without intimate knowledge of other
organizations' systems, enabling machine-to-machine interaction over the
Internet.
a. Web services
b. Data Services
c. Micro-Services

Web services

Android is a Web service hosted by Google to _______.
a. Compete with Apple's iPhone
b. Build mobile phone applications
c. Be compatible with Google

Build mobile phone applications

Which of the following statements is true about widgets?
a. They are small interactive tools used for a single purpose
b. They are used in blogging to add and delete information
c. They are used to send information from one serve to the next.

They are small interactive tools used for a single purpose

Together, Web services and widgets enable the creation of ______.
a. Intranets
b. Mashups
c. Web servers

Mashups

Which of the following statements is true about a mashup?
a. It allows for compatibility with html files
b. It is an application or a Website that integrates one or more Web services
c. It is something

It is an application or a Website that integrates one or more Web
services

Which of the following is a reason for the development of semantic Web?
a. Web pages can be understood by people but not by computers
b. Web pages cannot be understood by people but by computers
c. Web pages can be use with virtually every type of server.

Web pages can be understood by people but not by computers

Which of the following is NOT true about an Enterprise 2.0 strategy?
a.
b.
c. Enterprise 2.0 applications are not suited to traditional top-down organizational structures

Enterprise 2.0 applications are not suited to traditional top-down organizational structures

Enterprise 2.0 is likely to fail if _______.
a. The state has a regressive tax structure
b. The nation is in an economic crisis
c. An organization's workforce is dominated by baby boomers.

An organization's workforce is dominated by baby boomers.

1) Which of the following statements is true about business intelligence?
A) It is the act of outsourcing tasks, traditionally performed by an employee or contractor, to an undefined, large group of people or community, through the use of information technology.
B) It is the process by which a customer-owned mutual organization or co-operative changes legal form to a joint stock company.
C) It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.
D) It is an organization's process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people.
E) It is the use of human resources to gather and analyze information from external sources in order to make better business decisions.

It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.

"Backward looking" budgets are typically based on ________.
A) forecasts
B) marketing research
C) future trends
D) historical data
E) current market conditions

historical data

3) Responding to threats and opportunities and continuous planning is based on analyzing data from the ________ level of the organization.
A) operational
B) executive
C) tactical
D) business
E) strategic

operational

4) Taking entities as tables, each row is a ________.
A) field
B) record
C) attribute
D) form
E) query

record

5) Taking entities as tables, each column is a(n) ________.
A) attribute
B) record
C) form
D) bot
E) query

attribute

6) An attribute is also referred to as a(n) ________.
A) form
B) record
C) field
D) query
E) bot

field

7) A(n) ________ is a collection of related attributes about a single instance of an entity.
A) bot
B) form
C) query
D) field
E) record

record

8) In DBMS, data are kept separate from the applications' programming code. This means that ________.
A) an application cannot be changed without making changes to the database
B) an application's programming code needs to be updated continuously to keep up with the database
C) an application needs to be changed when database is changed
D) database does not need to be changed if a change is made to an application
E) database needs to be changed when a change is made to an application

database needs to be changed when a change is made to an application

9) A common way to represent a data model is a(n) ________.
A) entity-relationship diagram
B) normalization diagram
C) report-query diagram
D) form-record diagram
E) report generator

entity-relationship diagram

10) Data type helps the DBMS ________.
A) present the data in a useful format
B) format data
C) allocate storage space
D) eliminate data duplication
E) retrieve information

allocate storage space

11) To finalize the data model in order to actually build the database, a process called ________ is used to make sure the database will operate efficiently.
A) slicing and dicing
B) normalization
C) clustering
D) visualization
E) inferencing

normalization

12) In DBMS, normalization helps to ________.
A) eliminate data duplication
B) retrieve information
C) format data
D) present the data in a useful format
E) allocate storage space

eliminate data duplication

13) Once the data model is created, the format of the data is documented in a(n) ________.
A) data warehouse
B) data mart
C) expert system
D) data type
E) data dictionary

data dictionary

14) A data dictionary is also known as ________.
A) data mart
B) data warehouse
C) metadata repository
D) entity-relationship diagram
E) clickstream data

metadata repository

15) Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory levels for its stores. It is planning to implement Oracle database systems to replace this legacy system. Which of the following most supports Bringes' decision to replace its legacy system with an Oracle database system?
A) Implementing Oracle database system means hiring additional specialized personnel to manage it.
B) Partial implementation of the Oracle database system can create more problems than it solves.
C) Conversion cost required for the implementation of Oracle database system is supported by IT budgets.
D) Bringes' channel partners use a database system that supports the Oracle database system.
E) Maintenance cost of an Oracle database system is more than the legacy system presently in use.

Bringes' channel partners use a database system that supports the Oracle database system.

6) Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company's internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston's database system?
A) Microsoft launched a new version of Enterprise Microsoft Access which is better than Treston's database system.
B) The maintenance cost of Treston's new database system was three times more than the one it was previously using.
C) Treston's new database system was not supported by the database system of its suppliers and distributors.
D) Treston's competitors implemented its database a few days prior to Treston's implementation date.
E) Treston had to hire specialized personnel to manage its new database system, which added to its costs.

Treston's new database system was not supported by the database system of its suppliers and distributors.

17) Business rules are captured by the designers of the database and included in the data dictionary to ________.
A) organize and sort the data, complete calculations, and allocate storage space
B) prevent illegal or illogical entries from entering the database
C) eliminate data duplication
D) make sure that each table contains only attributes that are related to the entity
E) capture the structure of the database

prevent illegal or illogical entries from entering the database

________ are used to capture data to be added, modified, or deleted from the database.
A) Forms
B) Reports
C) Queries
D) Bots
E) Layers

Forms

A(n) ________ is a compilation of data from the database that is organized and produced in printed format.
A) form
B) attribute
C) field
D) entity
E) report

report

20) A query is used to ________.
A) organize and sort the data in a database
B) allocate storage space for a database
C) eliminate data duplication
D) retrieve information from a database
E) prevent illegal or illogical entries from entering the database

retrieve information from a database

Which of the following statements is true about query by example capabilities in a database?
A) It helps to create a query quickly and easily.
B) It refers to immediate automated responses to the requests of users.
C) It is designed to handle multiple concurrent transactions from customers.
D) Its primary use is gathering new information.
E) It prevents illegal entries into a database.

It helps to create a query quickly and easily.

22) The systems that are used to interact with customers and run a business in real time are called ________.
A) tactical systems
B) strategic systems
C) operational systems
D) informational systems
E) executive systems

operational systems

23) ________ is the data that is deemed most important in the operation of a business.
A) Metadata
B) Master data
C) Reference data
D) Query data
E) Tactical data

Master data

24) Which of the following statements is true about an operational system?
A) Its primary purpose is to support managerial decision making.
B) It consists of historical or point-in-time data.
C) Its goal is to enhance ease of access and use.
D) It consists of narrow and simple updates and queries.
E) It is primarily used by managers.

It consists of narrow and simple updates and queries.

Which of the following statements is true about informational systems?
A) Its primary purpose is to run the business on a current basis.
B) It is primarily used by online customers, clerks, salespersons, and administrators.
C) It consists of narrow and simple updates and queries.
D) Its goal is to enhance performance.
E) Its goal is to enhance ease of access and use.

Its goal is to enhance ease of access and use.

________ integrates data from various operational systems.
A) Data warehouse
B) Metadata repository
C) Data modeling
D) Master data
E) Data mining

Data warehouse

The purpose of a data warehouse is to ________.
A) standardize the format of data retrieved from different systems
B) allow managers to run queries and reports themselves without having to know query languages or the structure of the underlying data
C) provide capabilities for discovering "hidden" predictive relationships in the data
D) put key business information into the hands of more decision makers
E) reduce the complexity of the data to be analyzed

put key business information into the hands of more decision makers

________ refers to the process of standardizing the format of data retrieved from different systems.
A) Data cleansing
B) Data mining
C) Normalization
D) Content mining
E) Clustering

Data cleansing

A ________ is a data warehouse that is limited in scope.
A) metadata repository
B) master data
C) data model
D) data reduction
E) data mart

data mart

Which of the following statements is true about a data mart?
A) It standardizes the format of data retrieved from different systems.
B) It contains selected information from the data warehouse.
C) It stores master data only.
D) It is is a compilation of data from the database that is organized and produced in printed format.
E) It helps to eliminate data duplication.

It contains selected information from the data warehouse.

Information and knowledge discovery tools are used primarily to ________.
A) standardize the format of data retrieved from different systems
B) reduce the complexity of the data to be analyzed
C) extract information from existing data
D) discover "hidden" predictive relationships in the data
E) allow managers to learn query language for the effective maintenance of the database

extract information from existing data

________ are produced at predefined intervals to support routine decisions.
A) Ad hoc queries
B) Exception reports
C) Drill-down reports
D) Scheduled reports
E) Key-indicator reports

Ad hoc queries

Which of the following statements is true about key-indicator reports?
A) They provide a summary of critical information on a recurring schedule.
B) They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
C) They are produced at predefined intervals to support routine decisions.
D) They highlight situations that are out of the normal range.
E) They answer unplanned information requests to support a nonroutine decision.

They provide a summary of critical information on a recurring schedule.

Which of the following statements is true about exception reports?
A) They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
B) They are produced at predefined intervals to support routine decisions.
C) They answer unplanned information requests to support a nonroutine decision.
D) They provide a summary of critical information on a recurring schedule.
E) They highlight situations that are out of the normal range.

E) They highlight situations that are out of the normal range.

________ help analyze why a key indicator is not at an appropriate level or why an exception occurred.
A) Ad hoc queries
B) Exception reports
C) Drill-down reports
D) Scheduled reports
E) Key-indicator reports

Drill-down reports

Which of the following statements is true about ad hoc queries?
A) They are produced at predefined intervals to support routine decisions.
B) They provide a summary of critical information on a recurring schedule.
C) They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
D) They answer unplanned information requests to support a nonroutine decision.
E) They highlight situations that are out of the normal range.

They answer unplanned information requests to support a nonroutine decision.

________ refers to the process of quickly conducting complex, multidimensional analyses of data stored in a database that is optimized for retrieval, typically using graphical software tools.
A) Inferencing
B) Online analytical processing
C) Normalization
D) Data mining
E) Predictive analysis

Online analytical processing

Online analytical processing tools enable users to ________.
A) discover "hidden" predictive relationships in the data
B) find associations or correlations among sets of items
C) analyze different dimensions of data beyond simple data summaries
D) group related records together on the basis of having similar values for attributes
E) extract textual information from Web documents

analyze different dimensions of data beyond simple data summaries

Which of the following statements is true about online analytical processing server?
A) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
B) It groups related records together on the basis of having similar values for attributes.
C) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
E) It understands how data is organized in the database and has special functions for analyzing the data.

It understands how data is organized in the database and has special functions for analyzing the data.

How do online analytical processing systems improve performance?
A) They preaggregate data so that only the subset of the data necessary for the queries is extracted.
B) They use reasoning methods based on knowledge about a specific problem domain.
C) They make hypothetical changes to the data associated with a problem.
D) They allow for multiple dimensions to be added to a traditional two-dimensional table.
E) They provide capabilities for discovering "hidden" predictive relationships in the data.

They preaggregate data so that only the subset of the data necessary for the queries is extracted.

41) In online analytic processing systems, ________ are the values or numbers the user wants to analyze.
A) dimensions
B) forms
C) measures
D) queries
E) entities

measures

In online analytic processing systems, ________ provide a way to summarize the data.
A) forms
B) measures
C) facts
D) records
E) dimensions

dimensions

Which of the following statements is true about the online analytic processing cube?
A) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
B) It groups related records together on the basis of having similar values for attributes.
C) It understands how data is organized in the database and has special functions for analyzing the data.
D) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
E) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.

It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.

Data mining complements online analytic processing in that it ________.
A) finds associations or correlations among sets of items
B) provides capabilities for discovering "hidden" predictive relationships in the data
C) extracts textual information from Web documents
D) groups related records together on the basis of having similar values for attributes
E) analyzes different dimensions of data beyond simple data summaries

provides capabilities for discovering "hidden" predictive relationships in the data

________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals.
A) Data cleansing
B) Normalization
C) Clustering
D) Data reduction
E) Inferencing

Data reduction

Which of the following statements is true about association discovery?
A) It is a technique used to find correlations among sets of items.
B) It is the process of grouping related records together on the basis of having similar values for attributes.
C) It is the use of analytical techniques for extracting information from textual documents.
D) It is a type of intelligent system that uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
E) It makes sure that each table contains only attributes that are related to the entity.

It is a technique used to find correlations among sets of items.

47) ________ is the process of grouping related records together on the basis of having similar values for attributes.
A) Normalization
B) Data mining
C) Clustering
D) Inferencing
E) Slicing and dicing

Clustering

48) Which of the following is a recording of a user's path through a Web site?
A) clustering
B) normalization
C) slicing and dicing
D) clickstream data
E) inferencing

clickstream data

________ is the ability to attract and keep visitors.
A) Normalization
B) Inferencing
C) Stickiness
D) Crowdsourcing
E) Visualization

Stickiness

Which of the following analysis are you conducting to make hypothetical changes to the data associated with a problem and observe how these changes influence the results?
A) predictive analysis
B) time-series analysis
C) linear regression analysis
D) what-if analysis
E) multivariate analysis

what-if analysis

Which of the following statements is true about expert systems?
A) It is composed of a network of processing elements that work in parallel to complete a task, attempt to approximate the functioning of the human brain and can learn by example.
B) It is a program that works in the background to provide some service when a specific event occurs.
C) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
D) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.
E) It groups related records together on the basis of having similar values for attributes.

It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.

Which of the following statements is true about a rule in expert systems?
A) It groups related records together on the basis of having similar values for attributes.
B) It makes sure that each table contains only attributes that are related to the entity.
C) It allows multiple dimensions to be added to a traditional two-dimensional table.
D) It is typically expressed using an "if--then" format.
E) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.

It is typically expressed using an "if--then" format.

________ allows expert system rules to be represented using approximations or subjective values in order to handle situations where information about a problem is incomplete.
A) Fuzzy logic
B) Normalization
C) Clustering
D) What-if analysis
E) Stickiness

Fuzzy logic

The processing in an ES is called ________.
A) clustering
B) inferencing
C) normalization
D) recommending
E) data cleansing

inferencing

Which of the following statements is true about neural networks?
A) It allows multiple dimensions to be added to a traditional two-dimensional table.
B) It works in the background to provide some service when a specific event occurs.
C) It attempts to approximate the functioning of the human brain and can learn by example.
D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
E) It helps analyze why a key indicator is not at an appropriate level or why an exception occurred.

It attempts to approximate the functioning of the human brain and can learn by example.

Which of the following statements is true about user agents?
A) They are also known as Web spiders.
B) They are agents that search to find the best price for a particular product you wish to purchase.
C) They are agents that continuously analyze large data warehouses to detect changes deemed important by a user.
D) They are agents that automatically perform a task for a user.
E) They are agents designed by spammers and other Internet attackers to farm e-mail addresses off Web sites or deposit spyware on machines.

They are agents that automatically perform a task for a user.

Which of the following is a role of monitoring and sensing agents?
A) tracking inventory levels
B) sending a report at the first of the month
C) assembling customized news
D) analyzing data warehouses to detect changes deemed important to a user
E) finding the best price for a particular product the user wants to purchase

tracking inventory levels

Which of the following is a role of data mining agents?
A) tracking inventory levels
B) sending a report at the first of the month
C) assembling customized news
D) analyzing data warehouses to detect changes deemed important to a user
E) finding the best price for a particular product the user wants to purchase

analyzing data warehouses to detect changes deemed important to a user

Which of the following statements is true about explicit knowledge assets?
A) It reflects the processes and procedures that are located in a person's mind on how to effectively perform a particular task.
B) It reflects the person's ability to effectively solve a problem without external help.
C) It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.
D) It reflects an individual's special knowledge about a new-to-the-world product.
E) It reflects the strategies that are located in a person's mind on how to effectively perform a particular task.

It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.

Which of the following is the primary goal of a knowledge management system?
A) Identifying how to recognize, generate, store, share, and manage tacit knowledge.
B) Continuously analyzing large data warehouses to detect changes deemed important by a user.
C) Grouping related records together on the basis of having similar values for attributes.
D) Allowing hypothetical changes to the data associated with a problem to observe how these changes influence the results.
E) Identifying how to recognize, generate, store, share, and manage explicit knowledge.

Identifying how to recognize, generate, store, share, and manage tacit knowledge.

Social network analysis is a technique that attempts to ________.
A) analyze large data warehouses to detect changes deemed important by a user
B) analyze why a key indicator is not at an appropriate level or why an exception occurred
C) discover "hidden" predictive relationships in the data
D) allow hypothetical changes to the data associated with a problem to observe how these changes influence the results
E) find experts in particular subject areas

find experts in particular subject areas

________ refers to the display of complex data relationships using a variety of graphical methods.
A) Normalization
B) Visualization
C) Clustering
D) Inferencing
E) Textual mining

Visualization

Which of the following statements is true about digital dashboards?
A) It is the combination of various analysis techniques and interactive visualization to solve complex problems.
B) It supports usage models like push reporting, exception reporting and alerts, and pull reporting.
C) It can visualize features and relationships between features drawn from an underlying geographic database.
D) Analysts can combine geographic, demographic, and other data for locating target customers.
E) It a system for creating, storing, analyzing, and managing geographically referenced information.

It supports usage models like push reporting, exception reporting and alerts, and pull reporting.

Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends. This usage model is known as ________.
A) exception reporting
B) pull reporting
C) ad hoc reporting
D) drill-down reporting
E) push reporting

push reporting

While using digital dashboards, pull reporting is conducted to ________.
A) alert the user of any items that require immediate attention
B) provide the decision makers with a quick overview of key performance indicators
C) discover "hidden" predictive relationships in the data
D) analyze the root causes of an exception
E) extract textual information from Web documents

analyze the root causes of an exception

Which of the following statements is true about hard data?
A) It involves the use of text mining technologies.
B) It includes nonanalytical information.
C) It involves input from dedicated personnel.
D) It includes textual news stories.
E) It includes facts and numbers.

It includes facts and numbers.

Which of the following explains the phrase "data is geocoded"?
A) It is transformed into coordinates.
B) It is shared in the Internet.
C) It is used to create Web pages.
D) It is compared with similar historical data.
E) It is converted into soft data.

It is transformed into coordinates.

1) Traditionally, companies are organized around four distinct functional areas. Which of the following is one of those four areas?
A) supply chain management
B) risk management
C) technology management
D) communication management
E) systems management

supply chain management

2) Which of the following is a core business process?
A) time-to-purchase
B) make-to-stock
C) plan-to-produce
D) account-to-report
E) hire-to-retire

make-to-stock

3) Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the customer's credit card. This process of selling a product or service is known as the ________ process.
A) make-to-order
B) time-to-market
C) order-to-cash
D) procure-to-pay
E) make-to-stock

order-to-cash

4) For most businesses, the ________ process entails subprocesses such as creating a customer record; checking the customer's creditworthiness; creating an order; checking and allocating stock; picking, packing, and shipping; invoicing; and collecting the payment.
A) order-to-cash
B) make-to-order
C) procure-to-pay
D) make-to-stock
E) plan-to-produce

order-to-cash

5) An online retailer has finished creating a customer record. What should the retailer do next in an order-to-cash process?
A) create order
B) allocate stock
C) pick, pack, and ship
D) prepare and send invoice
E) check customer credit

check customer credit

6) In the order-to-cash process, once "checking credit" is done, it is followed by ________.
A) collecting payment
B) creating an order
C) allocating stock
D) picking, packing, and shipping
E) preparing and sending the invoice

creating an order

7) An online retailer has just finished creating an order for a customer. In an order-to-cash process what should the retailer do next?
A) collect payment
B) create customer record
C) allocate stock
D) pick, pack, and ship
E) prepare and send invoice

allocate stock

8) The processes associated with the acquiring of goods from external vendors are together referred to as the ________ process.
A) make-to-stock
B) make-to-order
C) order-to-cash
D) plan-to-produce
E) procedure-to-pay

procedure-to-pay

9) Which of the following is typically the first step in the procure-to-pay process?
A) negotiate price and terms
B) issue purchase order
C) receive goods
D) receive invoice
E) settle payment

negotiate price and terms

10) In the procure-to-pay process, the negotiation of price and terms is followed by ________.
A) settling the payment
B) creating the customer record
C) issuing the purchase order
D) receiving the goods
E) receiving the invoice

issuing the purchase order

11) ________ immediately after the purchase order is issued in the procure-to-pay process.
A) Payment is settled
B) Price and terms are negotiated
C) Credit is checked
D) Goods are received
E) Invoices are received

Goods are received

12) Receiving the goods is immediately followed by ________ in the procure-to-pay process.
A) settling the payment
B) negotiating the price and terms
C) issuing the purchase order
D) creating the order
E) receiving the invoice

Receiving the invoice

13) In the ________ process, goods are produced based on forecasts and are stored in a warehouse and sales orders are then fulfilled from the inventory.
A) configure-to-stock
B) make-to-stock
C) make-to-order
D) engineer-to-order
E) assemble-to-order

make-to-stock

14) Which of the following uses a push-based approach?
A) order-to-cash
B) procure-to-pay
C) production-to-order
D) make-to-stock
E) make-to-order

make-to-stock

15) In the ________ process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received.
A) order-to-cash
B) procure-to-pay
C) make-to-stock
D) acquire-to-dispose
E) make-to-order

make-to-order

16) Which of the following uses a pull-based approach?
A) make-to-order
B) make-to-stock
C) plan-to-produce
D) account-to-report
E) acquire-to-dispose

make-to-order

17) Which of the following is typically the first step in the make-to-stock process?
A) scheduling production
B) procuring inputs
C) processing sales orders
D) negotiating price and terms
E) creating customer records

procuring inputs

18) Which of the following goods are typically produced under a make-to-order approach?
A) expensive high-volume goods
B) cheap low-volume goods
C) very expensive low-volume goods
D) mass-produced goods
E) goods from external vendors

very expensive low-volume goods

19) Which of the following goods are produced using the make-to-order approach?
A) commercial aircraft
B) shampoos
C) lipsticks
D) televisions
E) refrigerators

commercial aircraft

20) ________ are performed by the functional areas that process inputs and produce outputs.
A) Base activities
B) Core activities
C) Support activities
D) Extended activities
E) Focus activities

Core activities

21) Which of the following is a core activity?
A) human resource activities
B) technology development
C) operations and manufacturing
D) administrative activities
E) infrastructure activities

operations and manufacturing

22) Inbound logistics involves business activities associated with ________.
A) distributing end products within the order-to-cash business process
B) creating marketing literature
C) communicating with potential and existing customers
D) receiving and stocking raw materials, parts, and products
E) order processing

receiving and stocking raw materials, parts, and products

23) Assembly processes are ________ activities.
A) outbound logistics
B) marketing and sales
C) customer sales
D) administrative
E) operations and manufacturing

operations and manufacturing

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set