test 3 Flashcards
Competitive strategy determines all of the following except
________.
A) structure of the information system
B) goals and objectives
C) features
D) functions
E) the company’s PE ratio
E. the company’s PE ratio
Porter’s five forces model is used to assess ________.
A) industry structure
B) market share
C) internal competition
D) life cycles of products
E) future product demand
A. industry structure
A mining company develops a new processing technique using only light, 3-D
printed drills and patents the process. This situation is characterized by ________.
A) low threat of substitutions
B) high bargaining power of customers
C) high threat of new entrants
D) low bargaining power of suppliers
E) low threat of new entrants
A. low threat of substitutions
Focused cost leadership is observed when a product has the lowest cost
________.
A) within an industry segment
B) across the product mix offered by a company
C) across the entire industry
D) among a group of competitors
E) across multiple product categories
A. within an industry segment
A retail company sells agricultural produce and consumer products. The
company procures materials from farmers and local producers. This process is an
example of ________.
A) outbound logistics
B) inbound logistics
C) operational management
D) internal marketing
E) customer service
B. inbound logistics
A(n) ________ is a network of activities that generate worth by transforming
inputs into outputs.
A) business process
B) competitive strategy
C) value chain
D) information system
E) linked investment
A. business proess
The cost of the business process is the sum of the cost of the inputs and the
________.
A) cost of the activities
B) cost of the outputs
C) value of the outputs
D) value of the products
E) cost of the products
A. cost of the activities
RAC Associates is a car rental company that rents cars to tourists in the
United States. The company uses tracking devices and magnetic locks to prevent car theft.
These procedures are examples of ________.
A) primary business processes
B) core activities
C) strategic activities
D) supporting business processes
E) premeditated activities
E. Premeditated activities
Streamtech, a manufacturer of automobiles, recently received a patent for an
unmanned search boat. By doing this, Streamtech has ________.
A) created an entry barrier
B) introduced product differentiation
C) locked in its suppliers
D) reduced the cost of operations
E) established an alliance
B. introduced product differentiation
________ is a concept that computer systems will become sophisticated enough that
they can adapt and create their own software and hence adapt their behavior without
human assistance.
A) Expert systems
B) Artificial Intelligence
C) Knowledge management
D) Business intelligence systems
E) Moore’s Law
B. artifical inteligence
________ is the extraction of knowledge from data based on algorithms created from
training data.
A) Machine learning
B) Historical analysis
C) Simulation
D) Computer analysis
E) Processing data
A. Machine Learning
How do machines learn?
A) By humans teaching them things
B) Through experience
C) By listening to the surroundings
D) With repetition of the same facts
E) By listening for a wake word
B. Through Experience
Machine learning is focused on predicting accurate outcomes based on ________ data.
A) previously known training
B) current
C) future
D) questionable
E) a complete set of
A. perviously known training
A sales report that is current at the time the user accessed it on a Web server is an example of
a(n) ________.
A) static report
B) dynamic or exception report
C) expert system
D) hybrid market report
E) temporal report
B. dynamic or exeption report
Differentiate between unsupervised and supervised data mining.
Data mining techniques fall into two broad categories: unsupervised and supervised.
With unsupervised data mining, analysts do not create a model or hypothesis before running
the analysis. Instead, they apply a data mining application to the data and observe the results.
With this method, analysts create hypotheses after the analysis, in order to explain the patterns
found. With supervised data mining, data miners develop a model prior to the analysis and
apply statistical techniques to data to estimate parameters of the model.
Which of the following is an example of a supervised data mining technique?
A) cluster analysis
B) market-basket analysis
C) regression analysis
D) click streaming
E) metadata matching
C. regression analysis
Samuel, a researcher, deduces that single women between the ages of 25 and 30, who
usually live in the suburbs and make thrifty purchases, prefer a particular brand of washing
machines. In this case, Samuel uses ________ to understand customer behavior.
A) supervised data mining
B) cluster analysis
C) neural networks
D) market-basket analysis
E) unsupervised learning
D. market-basket analysis
What is the difference between cluster analysis and classification?
Cluster analysis groups data according to their similarities (that we don’t know
beforehand), and classification predicts output categories based given input data (we
know the data is labeled).
Classification is supervised learning and cluster analysis is unsupervised learning.
An OLAP report has measures and dimensions. Which of the following is an example of a
dimension?
A) total sales
B) average sales
C) sales region
D) average cost
E) average net sales
C. Sales Region
Define descriptive analysis, predictive analysis, and prescriptive analysis.
Use my example of a medical doctor going through your annual physical. Doctor
analyzes your current health conditions (descriptive), he tries to foresee what your health will
be in the future (predictive), and give you recommendations/solutions (e.g., consume less sugar)
as the outcome prescriptive analysis to improve your well-being.
Which of the following is an example of a supervised data mining
technique?
a. cluster analysis
b. regression analysis
c. market-basket analysis
d. click streaming
e. metadata matching
c. market basket analysis
What separates classification from cluster analysis?
a. Classification is done by BI, while cluster analysis is done by
human
b. Cluster analysis is more powerful than classification
c. Classification has an existing research question knowing what to
look for and cluster does not
d. Classification uses the Internet but cluster analysis does not
C. classification has an existing research question knowing what to look for and cluster does not
Which of the following reports focuses on reporting anomolies?
a. Exception Report
b. Cluster Report
c. Classification Report
d. Regular Report
C. clssification report
Samuel, a researcher, deduces that people between the ages of 25 and 30,
who usually live in downtown and make thrifty purchases, prefer a particular
brand of coffe. In this case, Samuel uses ________ to understand customer
behavior.
a. supervised data mining
b. cluster analysis
c. neural networks
d. market-basket analysis
e. unsupervised learning
D. market-basket analysis
An OLAP report has measures and dimensions. Which of the following is an
example of a dimension?
a. total sales
b. average sales
c. sales region
d. average cost
e. average net sales
C. sales region
Porter’s five forces model is used to assess ________.
a. market share
b. internal competition
c. product lifecycle
d. industry structure
A. market share
The bargaining power of customers will likely be high when they purchase:
a. limited edition apparel
b. patented drugs
c. A bit that represents on
d. standardized products
e. rare antique arts
D. standardized products
A company develops and patents a unique reusable rocket transportation
technology allowing man travel to the moon, and is totally safe. This
situation is characterized by ________.
a. low threat of substitutions
b. high bargining power of suppliers
c. low bargining power of customers
d. low threat of new entrants
A. low threat of substitutions
One of the support activities in a value chain is:
a. Outbound logistics
b. Inbound logistics
c. Hiring employees
d. Manufacturing products
C. hiring employees
An example of a primary value chain activity is:
a. Procurement
b. Customer Service
c. Human Resources
d. Information Systems
B. customer service
Many companies create ________, which are false targets for computer
criminals to attack.
a. honeypots
b. operational procedures
c. backups of company data
d. security checkpoints
e. hacker centers
A. honeypots
All of the following should be in an incident-response plan except
________.
a. how employees respond to security problems
b. the person who caused the incident
c. who should be contacted in case of an incident
d. the reports that should be created because of the incident
e. how to reduce further loss
B. the person who caused the incident
The Gramm-Leach-Bliley (GLB) Act protects consumer data stored by many
financial insitutions EXCEPT for _____.
a. JP Morgan Chase
b. Wells Fargo
c. Department of Treasury
d. Citigroup
C. department of treasury
Machine learning is an important tool for Artificial Intelligence to
_____.
a. increase data capacity
b. enhance data security
c. improve data quality
d. identify and reveal hidden patterns among data
D. identify and reveal hidden patterns amoung data
Which unsupervised technique below identifies the patter without a prior
model or research question/hypothesis?
a. Classification
b. Regression Analysis
c. Cluster Analysis
d. Statistics
C. cluster Analysis
What separates unsupervised data mining from supervised data mining?
a. The amount of memory needed
b. The speed of data processing
c. Unsupervised analysis does not create a model or hypothesis
beforehand
d. Supervised analysis does not create a model or hypothesis beforehand
e. Unsupervised analysis develop a model prior to the analysis
c. unsupervised analysis does not create model or hypothesis beforehand
Sally has been working really hard lately and asks her manager for a
raise. Her manager tells her that she is already the highest paid employee on
the floor. Sally doesn’t believe her manager, and illegally accesses the
employee database to look at salary data. Sally’s act can be termed as
________.
a. phishing
b. pretexting
c. spamming
d. hacking
D. hacking
Which of the following characteristics is NOT important for an effective
collaborator to have?
a. target
b. threat
c. key escrow
d. cipher
B. threat
Carlos owns a small business and is striving to keep his organization
running smoothly while remaining profitable in a highly competitive market.
He chooses to use process implementation to give his company a competitive
pricing edge over others. Which of the following principles is he most likely
to implement?
a. enhancing service
b. differentiate products
c. create a new product
d. reducing cost
D. reducing cost
Make Time for You, Inc. provides therapeutic massage therapy services via
a mobile spa which enables them to provide those services at the time and
place most convenient to their clientele. Which of the following is most
likely the reason the owners of Make Time for You, Inc. chose this business
model?
a. reducing cost
b. locking in customers
c. raising barriers for new entrants
d. Software
B. locking in customers
Focused cost leadership is observed when a product has the lowest cost
________.
a. across the product mix offered by a company
b. within an industry segment
c. across the entire industry
d. among a group of competitors
e. across multiple product category
B. within an industry segment
A ________ is a person or an organization that seeks to obtain or alter data or other
IS assets illegally, without the owner’s permission and often without the owner’s
knowledge.
A) target
B) vulnerability
C) threat
D) key escrow
E) cipher
C. threat
Which of the following is considered a threat caused by human error?
A) an employee inadvertently installing an old database on top of the current one
B) an employee intentionally destroying data and system components
C) a virus and worm writer infecting computer systems
D) a hacker breaking into a system to steal for financial gain
E) a tsunami floods a data center causing total data loss
A. an employee inadvertently installing an old database on top of the current one
Which of the following is considered a computer crime?
A) accidental deletion of important records
B) poorly written programs resulting in information loss
C) loss of data as a result of flooding
D) hacking of information systems
E) failure to correctly back up customer data
D. hacking information systems
A person claiming to be from central IT called Chris and asked him to participate in a
password reset audit. The person had Chris change his password to the word “123456”,
and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd
system behavior, and then the system crashed. Chris was a victim of ________.
A) hacking
B) usurping
C) sniffing
D) pretexting
E) appropriating
D. pretexting
Sally has been working really hard lately and asks her manager for a raise. Her manager tells
her that she is already the highest paid employee on the floor. Sally doesn’t believe her
manager, and illegally accesses the employee database to look at salary data. Sally’s act can be
termed as ________.
A) pretexting
B) phishing
C) hacking
D) spoofing
E) skimming
C. hacking
Which of the following statements is TRUE about biometric identification?
A) It involves the use of a personal identification number (PIN) for authentication.
B) It provides weak authentication.
C) It is a relatively inexpensive mode of authentication.
D) It often faces resistance from users for its invasive nature.
E) It will decline in usage in the future
D. It often faces resistance from users for its invasive nature.
Which of the following statements is TRUE about the Secure Sockets Layer (SSL)?
A) It uses asymmetric encryption exclusively.
B) It is used to send sensitive data such as credit card numbers.
C) It uses one set of encryption keys for multiple sessions.
D) It is a stronger version of https.
E) It is used in wireless encryption suites.
B. It is used to send sensitive data such as credit card numbers.
Layla is purchasing a new laptop from an online vendor. Which of the following will be
displayed in the address bar of his browser that will let her know that the online retailer is using
the Secure Sockets Layer (SSL) protocol?
A) ftp
B) www
C) https
D) .com
E) smtp
C. https
Jason attempts to hack into a banking site to steal customer information. He finds the security
of the Web site lacking and is able to access the site with ease. Jason is arrested the next day
and charged with computer crime. The banking site was able to track Jason’s IP address because
he had unknowingly attacked a ________.
A) botnet
B) hot site
C) honeypot
D) Web beacon
E) Trojan horse
C. honeypot
If an organization turns an employee’s access off to the building while they are at lunch as a
means of termination, this would be considered ________.
A) a hostile situation
B) mean
C) an unfriendly termination
D) enforcement of company rules
E) separation termination
C. an unfriendly termination