Filters
Question type

Study Flashcards

What are the two major types of data mining?


A) supervised and unsupervised  
B) random and sequence  
C) affinity and association  
D) sequence and affinity

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following allows companies to exchange information and conduct transactions by purposely providing outsiders with direct,Web browser-based access to authorized parts of a company's intranet?


A) extranet  
B) virtual portal  
C) Web service  
D) corporate portal

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is data mining? Describe the two kinds of data mining. How can data mining be used to invade the privacy of individuals,given the large amount of data that is collected and stored electronically on people in their everyday transactions?

Correct Answer

verifed

verified

Data mining is a new form of information...

View Answer

Why do companies use firewalls?


A) Firewalls are a way to protect hardware. 
B) Firewalls are in the form of software only. 
C) Firewalls prevent unauthorized use of data. 
D) Firewalls sit between the computers in an internal organizational network and the organizations main frame hardware.

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

According to the resource-based view of information technology,what sustains competitive advantage?


A) simplified technology  
B) continuous improvement from the use of raw data  
C) similar technology across the entire firm  
D) when information technology creates value

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

According to the resource-based view of information technology,sustainable competitive advantage occurs when information technology adds value,is different across firms,and is difficult to create or acquire.

A) True
B) False

Correct Answer

verifed

verified

Which of the following uses internal and external sources of data to provide managers and executives with the information they need to monitor and analyze organizational performance?


A) an executive information system  
B) a managerial information service  
C) an expert system  
D) a decision support system

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Narrative 16-1 Take a look in your purse or wallet-do you see an Air Miles card You and about 10 million Canadians have one. They can be used at stores including Shell,Sobeys,Rexall,and others. They work by recording your purchase history and uniquely linking it to your Air Miles program number. You can redeem the points you acquire for rewards in various forms. -Refer to Narrative 16-1. Air Miles collected purchase data information for itself and its sponsors,and then looked for behaviour patterns that could provide useful market information for its sponsors. What was Air Miles engaged in?


A) environmental scanning  
B) prospect collecting  
C) electronic scanning  
D) data mining

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Five kinds of costs are associated with information: acquisition,processing,retrieval,communication,and storage.

A) True
B) False

Correct Answer

verifed

verified

Discuss the issues,advantages,and risks associated with using information to gain or maintain strategic advantage.

Correct Answer

verifed

verified

According to the resource-based view of ...

View Answer

The first company to gain first-mover advantage typically benefits from higher profits and larger market share.

A) True
B) False

Correct Answer

verifed

verified

What does it mean when someone says that an organization protects its information? Why is it important? What are the basic steps to properly securing data and data networks?

Correct Answer

verifed

verified

Protecting information is the process of...

View Answer

Data mining often reveals data clusters where three or more database elements occur together.

A) True
B) False

Correct Answer

verifed

verified

What type of costs are associated with cooling server infrastructure?


A) processing  
B) communication  
C) storage  
D) retrieval

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Artificial intelligence and data mining can be used to retrieve relevant information from large data sets.

A) True
B) False

Correct Answer

verifed

verified

When you purchase a book or CD on Amazon.com,as soon as you put your selection in the shopping cart,you are offered a series of other items that people who made the same purchase as you did also bought. Which pattern of data mining is Amazon.com making use of?


A) sequence  
B) association  
C) predictive  
D) adjacency

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Real-time streaming data from an airplane are more likely to be complete than a "black box" recorder.

A) True
B) False

Correct Answer

verifed

verified

Which of the following can public key encryption be used for?


A) protecting files sent over the Internet  
B) eliminating hacking  
C) erasing cookie files  
D) setting up firewalls

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Communication costs are decreasing over time.

A) True
B) False

Correct Answer

verifed

verified

Which two critical steps are required to make sure that data can be accessed by authorized users and no one else?


A) authentication and authorization  
B) authorization and empowerment  
C) delegation and authentication  
D) delegation and empowerment

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 158

Related Exams

Show Answer