BCIS 3610 Exam 3 Review (9-12)

________ is defined as information containing patterns, relationships, and trends of various
forms of data

business intelligence

Which of the following statements is true of source data for a business intelligence (BI)
system?

it refers to data that the organization purchases from data vendors

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source
data.

data acquisition

Which of the following is a fundamental category of business intelligence (BI) analysis?

data mining

Push publishing delivers business intelligence ________.

according to a schedule or as a result of an event or particular data condition

________ requires the user to request business intelligence (BI) results.

pull publishing

In large organizations, a group of people manage and run a(n) ________, which is a facility
for managing an organization's BI data.

data warehouse

________ refers to the source, format, assumptions and constraints, and other facts about the
data.

metadata

Problematic operational data is termed as ________.

dirty data

________ is a term that refers to the level of detail represented by the data.

granularity

Which of the following statements is true about operational data?

purchased operational often contains missing elements

Which of the following phenomena states that the more attributes there are, the easier it is to
build a model that fits the sample data?

curse of dimensionality

A ________ takes data from the data manufacturers, cleans and processes the data, and
locates the data on the shelves.

data warehouse

A data ________ is a data collection, smaller than the data warehouse that addresses the
needs of a particular department or functional area of the business.

mart

Which of the following statements is true about data marts?

data marts address the needs of a particular department or functional area of business

Which of the following statements is true about reporting applications?

reporting applications refer to business applications that input data from one or more sources and applies reporting operations to that data to produce business intelligence

Which of the following is a basic operation used by reporting applications to produce
business intelligence?

calculating

________ analysis is a way of analyzing and ranking customers according to their
purchasing patterns.

RFM

RFM analysis is used to analyze and rank customers according to their ________.

purchasing patterns

U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the
customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics
relates SAMCROW with its RFM score?

SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods

Jackson Steel Inc. has four major customers. Based on the following RFM scores of these
customers, the sales team at Jackson's should attempt to up-sell more expensive steel to
________.

Castellano Automobiles with an RFM score of 113

Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has
not ordered linen in some time, but when it did order in the past it ordered frequently, and its
orders were of the highest monetary value. Under the given circumstanc

511

Opezim Plastics has been supplying raw materials to JM Toys for five years. JM Toys has an
RFM score of 545. With reference to the score, how should the sales team at Opezim respond to
JM Toys?

the sales team should let go of JM toys, for the loss will be minimal

OLAP stands for ________.

online analytical processing

The viewer of an OLAP report can change its format. Which term implies this capability?

online

The remarkable characteristic of OLAP reports is that they are ________, as they are online
and the viewer of the report can change their format.

dynamic

An OLAP report has measures and dimensions. Which of the following is an example of a
dimension?

sales region

Which of the following accurately defines a dimension in an OLAP report?

it is a characteristic of a measure

Which of the following is an example of a measure in an OLAP report?

average cost

An ________ and an OLAP report are the same thing.

OLAP cube

Which of the following observations about RFM and OLAP reports is true?

OLAP reports are more dynamic than RFM reports

________ is the application of statistical techniques to find patterns and relationships among
data for classification and prediction.

data mining

Which of the following terms is used as a synonym for data mining?

knowledge discovery in databases (KDD)

Which of the following statements is true about unsupervised data mining?

analysts do not create a model or hypothesis before running the analysis

A(n) ________ is a complicated set of possibly nonlinear equations

neural network

In ________, statistical techniques can identify groups of entities that have similar characteristics.

cluster analysis

Samuel, a researcher, deduces that single women between the ages of 25 and 30, who usually
live in the suburbs and make thrifty purchases, prefer a particular brand of washing machines. In
this case, Samuel uses ________ to understand customer behavior.

cluster analysis

In ________, data miners develop a model prior to the analysis and apply statistical
techniques to data to estimate parameters of the model.

supervised data mining

Which of the following is an example of a supervised data mining technique?

regression analysis

Matt, a sales analyst, predicts the sale of luxury cars by formulating an equation that uses
variables such as the customer's age and monthly salary. Which of the following methods does
Matt use in this case?

regression analysis

Which of the following techniques determine sales patterns?

market-based analysis

In marketing transactions, the fact that customers who buy product X also buy product Y
creates a ________ opportunity. That is, "If they're buying X, sell them Y" or "If they're buying
Y, sell them X.

cross-selling

In market-basket terminology, ________ describes the probability that two items will be
purchased together.

support

Judy is analyzing weekly sales transactions at a supermarket. She finds that the support value
for bed sheets and pillow covers is 0.9. Given this information, which of the following
statements is true?

customers who buy bed sheets usually also buy pillow covers

In market-basket terminology, the ratio of confidence to the base probability of buying an
item is called ________.

lift

A ________ is a hierarchical arrangement of criteria that predict a classification or a value.

decision tree

Which of the following is a characteristic of decision trees?

they are used to select variables that are then used by other types of data mining tools

Which of the following is a characteristic of BigData?

it is generated rapidly

________ is a technique for harnessing the power of thousands of computers working in
parallel.

MapReduce

________ includes a query language titled Pig.

Hadoop

________ is the process of creating value from intellectual capital and sharing that
knowledge with employees, managers, suppliers, customers, and others who need it.

knowledge management

Knowledge management (KM) benefits organizations because it ________.

improves process quality and increases team strength

In the context of knowledge management systems, ________ are rule-based systems that
encode human knowledge in the form of If/Then rules.

expert systems

Which of the following observations concerning expert systems is true?

these systems encode human knowledge in the form of If/Then rules

________ are information systems that support the management and delivery of documents
including reports, Web pages, and other expressions of employee knowledge.

Content Management Systems (CMS)

________ is the application of social media and related applications for the management and
delivery of organizational knowledge resources.

Hyper-social knowledge management

A sales report that is current at the time the user accessed it on a Web server is an example of
a(n) ________.

dynamic report

Which of the following statements is true about business intelligence (BI) publishing
alternatives?

BI servers extend alert/RSS functionality to support user subscriptions

BI servers use ________ to determine what results to send to which users and on which
schedule.

metadata

________ is a concept that computer systems will become sophisticated enough that they
can adapt and create their own software and hence adapt their behavior without human
assistance

The Stringularity

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets
illegally, without the owner's permission and often without the owner's knowledge.

threat

Which of the following is considered a threat caused by human error?

an employee inadvertently installing an old database on top of the current one

Which of the following is considered a computer crime?

hacking of information systems

Molly received a call from a person claiming to be her bank representative. The representative
asked her to verify her bank account details and credit card number. A few days after the call
Molly noticed unusual activity on her account; a large sum had be

pretexting

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples
of ________.

unauthorized data disclosure

Kenneth is working on a confidential government project. Daniel, a coworker, and he are the
only two members who are authorized to access the project's information system. Kenneth, while
away on a business trip, receives an email from Daniel asking for hi

phishing

Email spoofing is a synonym for ________.

phishing

________ is a technique for intercepting computer communications through a physical
connection to a network or without a physical connection in the case of wireless networks.

sniffing

________ take computers with wireless connections through an area and search for
unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured
wireless networks.

wardrivers

Which of the following is a sniffing technique?

adware

Kate was among the top ten applicants for an honorary scholarship at her university. The
scholarship would be decided by a written exam and an interview. Kate had outperformed the
others in the interview, but she was not sure of her written exam's results

hacking

Which of the following is most likely to be a result of hacking?

an unauthorized transaction from a user's credit card

________ occurs through human error when employees do not follow proper procedures or
when procedures have not been well designed.

incorrect data modification

________ occurs when computer criminals invade a computer system and replace legitimate
programs with their own, unauthorized ones that shut down legitimate applications.

usurpation

Which of the following usually happens in a malicious denial-of-service attack?

a hacker floods a web server with millions of bogus service requests

________ present(s) the largest risk for an organization's infrastructure loss.

natural disasters

Which of the following statements is true about losses due to computer security threats?

surveys suggest that some organizations do not report all of their computer crime losses, and some will not report such losses at all

Which of the following is a personal security safeguard?

removing high-value assets from computers

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries
every possible combination of characters.

brute force

________ are small files that enables a browser to access Web sites without having to sign in
every time.

cookies

Removing and disabling ________ that may contain sensitive security data presents an
excellent example of the trade-off between improved security and cost.

cookies

Which of the following is a critical security function that should be addressed by the senior
management of an organization?

establishing the security policy

In information security, which of the following is true about managing risk?

organizations should implement safeguards that balance the trade-off between risk and cost

Which of the following was passed to give individuals the right to access their own health
data created by doctors and other healthcare providers?

the HIPAA of 1996

Which of the following is classified as a technical safeguard?

firewalls

A(n) ________ has a microchip in it to hold data.

smart card

Users of smart cards are required to enter a ________ to be authenticated.

personal identification number

Which of the following is used for biometric authentication?

facial features

Which of the following statements is true about biometric identification?

it often faces resistance from users for its invasive nature

A ________ is a string of bits used to encrypt data.

key

In asymmetric encryption, each site has a ________ for encoding messages

public key

With ________, the sender and receiver transmit a message using different keys.

asymmetric encryption

Secure Sockets Layer is also known as ________

Transport Layer Security

Which of the following statements is true about the Secure Sockets Layer (SSL)?

it is used to send sensitive data such as credit card numbers

Mark is transferring funds online through the Web site of a reputed bank. Which of the
following will be displayed in the address bar of his browser that will let him know that the bank
is using the Secure Sockets Layer (SSL) protocol?

https

A ________ examines each part of a message and determines whether to let that part pass.

packet-filtering firewall

Packet-filtering firewalls ________.

can filter both inbound and outbound traffic

________ is a broad category of software that includes viruses, spyware, and adware.

malware

In the context of malware protection, the program code that causes the unwanted actions is
called the ________.

payload

________ are viruses that masquerade as useful programs or files.

trojan horses

A ________ is a type of virus that self-propagates using the Internet or other computer
network

worm

Sarah was browsing an online shopping site when a program got downloaded onto her
system without her knowledge. The next day she found that her search engine had been changed,
and she received pop-up advertisements of the shopping site she had visited the

adware

Which of the following is likely to be accepted by a poorly designed application thereby
leading to improper disclosure of data?

SQL injection

________ refers to an organization-wide function that is in charge of developing data
policies and enforcing data standards

Data administration

________ is a function pertaining to a particular database that develops procedures and
practices to control and protect the database.

database administration

Which of the following statements is true about data administration?

it is involved in establishing data safeguards

Key escrow is a(n) ________.

safety procedure that allows a trusted party to have a copy of the encryption key

________ protect databases and other organizational data.

data safeguards

The computers that run the DBMS and all devices that store database data should reside in
locked, controlled-access facilities. This is done to ________.

provide physical security

Which of the following statements is true about the position definitions component of human
safeguards?

documenting position sensitivity enables security personnel to prioritize their activities based on possible risk

________ involve the people and procedure components of information systems.

human safeguards

Which of the following statements is true about human safeguards for employees?

user accounts should be defined to give users the least possible privilege needed to perform their jobs

When an employee is terminated, IS administrators should receive advance notice so that
they can ________.

remove the user account and password

________ a Web site means to take extraordinary measures to reduce a system's
vulnerability using special versions of the operating system

hardening

The process of hardening a Web site is a ________ safeguard.

technical

________ are the primary means of authentication for a user's computer and other networks
and servers to which the user may have access.

passwords

John has been appointed as an operations manager at a software company. Which of the
following systems procedures will be John's responsibility?

creating a backup of system databases

PL Technologies suffered considerable data loss when its database was infected by a virus.
George, an operations personnel, attempts to fix the damage by retrieving information from
backed up data. George is involved in the process of ________.

recovery

Firewalls produce ________ that include lists of all dropped packets, infiltration attempts,
and unauthorized access attempts from within the firewall.

activity logs

Jason attempts to hack into a banking site to steal customer information. He finds the
security of the Web site lacking and is able to access the site with ease. Jason is arrested the next
day and charged with computer crime. The banking site was able to

honeypot

Developing, operating, and maintaining an organization's computing infrastructure is a major
function of the ________ department.

information systems

Which of the following statements is true of the information systems (IS) department?

the operations group monitors user experience and responds to user problems

Thompson is the chief information officer at a processed food manufacturing company. The
information systems used in the company are manufacturing oriented and provide little support
to accounting. In this case, Thompson will most likely report to the ___

chief executive officer

Which of the following is a responsibility of a chief information officer (CIO)?

serving as the principal manager of the IS department

Which of the following is a function of the technology office in an organization's information
systems (IS) department?

investigating new information systems

In an information systems (IS) department, the ________ group manages computing
infrastructure, including individual computers, in-house server farms, networks, and
communications media.

operations

Which of the following statements is true of the operations group in an organization's
information system (IS) department?

it monitors the user experience and responds to their problems

Which of the following statements is true about the maintenance group of information systems
(IS)?

it involves adapting existing systems to support new features

In the information system (IS) department, the ________ group manages the process of
creating new information systems as well as maintaining existing information systems.

development

If an organization does not develop programs in-house, then the development group of the
information system (IS) department will be staffed primarily by ________ who work with users,
operations, and vendors to acquire and install licensed software and to

business and systems analysts

The purpose of a ________ group is to protect data and information assets by establishing
data standards and data management practices and policies.

data administration

A ________ works with users to determine system requirements, designs and develops job
descriptions and procedures, and helps determine test plans.

system analyst

Jamie's company manufactures 3D printers, and his job is to prepare user manuals for the
products. Jamie also prepares training material for the workers who are involved in the
manufacturing process. With reference to his job profile, Jamie is a ________.

technical writer

The responsibilities of a tech support engineer include ________.

helping users solve problems and providing training

The responsibilities of a ________ include advising the chief information officer, executive
group, and project managers on emerging technologies.

chief technology officer

Which of the following statements is true about a data administration staff function?

the group establishes standards to protect information assets

Which of the following is a limitation of aligning information systems (IS) with
organizational strategy?

adapting the IS to new versions of business processes is complex and time-consuming

The ________ is the representative for information systems (IS) and information technology
(IT) issues within the executive staff who provides the IS perspective during discussions of
problem solutions, proposals, and new initiatives.

chief information officer

A(n) ________ is a group of senior managers from the major business functions that works
with the chief information officer (CIO) to set the information systems (IS) priorities and decide
among major IS projects and alternatives.

steering committee

Which of the following is a function of the steering committee for the information systems
(IS) department?

setting IS priorities

Which of the following statements is true about the steering committee of the information
systems (IS) department?

the steering committee's meetings are conducted by the IS department

Which of the following statements is true about information systems (IS) planning functions?

the chief executive officer (CEO) and other executive staff decide the membership of the steering committee

Linela Insurance needs to hire twenty accountants immediately to support its accounts
receivable process. The hiring and training of the accountants requires a significant investment of
funds and time, which the company cannot afford. Linela decides to hi

outsourcing

Outsourcing is done to ________.

cap an organization's financial exposure

Which of the following statements is true about outsourcing?

it saves both direct and indirect management time

KPL Inc. is an outsource vendor. It handles the recruiting process for Numero Uno
Computers. KPL recently changed its business strategy to a more profit-oriented one. This
modification would require the company to charge more for its services. This change

loss of control

Which of the following statements is true of outsourcing?

to achieve quality, it is easier to hire another vendor than to fire and rehire internal staff

Which of the following is a form of outsourcing?

ANP Infotecch aquiring licensed manufacturing software from a vendor

Which of the following is a form of outsourcing hardware infrastructure?

Infrastructure as a service (IaaS) cloud hosting

Which of the following is an outsourcing alternative in which hardware and both operating
system and application software are leased?

Software as a Service (SaaS)

Which of the following is an example of outsourcing an entire business function?

paying another organization to arrange employee for travel

In 2005, Marrion International chose a human resources consulting agency to handle its
human resource needs for the next 7 years. This is an example of ________ outsourcing.

business function

Atlanta Technologies outsourced its information technology (IT) support department to a
vendor in China. The vendor company, however, faced repeated instances of software failure and
now needs to make some changes to the information systems. Who among the

the vendor

Which of the following is a risk of outsourcing information systems (IS)/information
technology (IT) functions?

it involves the potential loss of intellectual capital

Every information systems (IS) user has the right to a secure computing environment. This
means that the ________.

organization should protect his/her computer and its files

Which of the following is a right of users of information systems?

right to receive effective training

Which of the following is generally a responsibility of users of information systems (IS)?

following security and backup procedures

Which of the following statements is true about users of information systems?

they should learn standard techniques and procedures for the application they use

SFA Inc. has a team of ten information systems (IS) personnel. The personnel are kept busy
throughout the day as they help employees solve even the most trivial issues. In which of the
following ways can the employees assist the IS personnel in this scena

by learning basic computer skills

Which of the following statements is true about the changes and developments foreseen by
the year 2026?

most organizations will move their internal hardware infrastructure into the cloud

Which of the following statements is true of information systems?

every information system has at least one application

Which of the following statements is true about the relationship between business processes
and information systems?

a business process need not relate to any information system, but an information system relates to at least one business process

Which of the following is true of scrum?

it is generic enough to be used for the development of business processes, information systems, and applications

A ________ is a person who is well versed in an organization's strategy and focuses on
ensuring that business processes and information systems meet the organization's competitive
strategies

business analyst

________ are information system (IS) professionals who understand both business and
information technology

system analysts

________ play a key role in moving development projects through the SDLC or scrum
development process.

systems analysts

A ________ is a network of activities, repositories, roles, resources, and flows that interact to
accomplish a business function.

business process

In a business process, ________ are defined as collections of related tasks that receive inputs
and produce outputs.

activities

Tranware Inc., an apparel manufacturer, receives cotton and other raw materials from its
suppliers at the beginning of every quarter. With reference to this information, Tranware receives
its ________ at the beginning of every quarter.

physical respository

In a business process, a role refers to ________.

a collection of activities

In a business process, resources are ________.

people or computer applications assigned to the role

In business process management (BPM), an as-is model ________.

documents the existing business process

In business process management (BPM), once the as-is model is created, the very next step
that a team must take is to ________.

look for improvement opportunities

Which of the following are the steps in the business process management (BPM) cycle?

model processes; create components; implement processes; assess results

Control Objectives for Information and related Technology (COBIT) is often used in the
________ stage of the business process management (BPM) cycle.

assessment

________ set the stage for the requirements for any information systems and applications
that need to be created or adapted.

business process made

Which of the following can be represented using the Business Process Modeling Notation
(BPMN)?

as-is models

________ is a standard set of terms and graphical notations for documenting business
processes.

business process modeling negotiation (BPMN)

Which of the following statements is true of the swim-lane layout used for modeling
business processes?

it draws attention to the interactions among components of the diagram

Ryan is creating a Business Process Modeling Notation (BPMN) diagram for the
manufacturing process of his organization. Which of the following should he use to represent the
check inventory activity?

a rectangle

Melissa is in charge of creating a Business Process Modeling Notation (BPMN) diagram for
the procurement department. The diagram will represent the separate paths to be followed for an
old supplier and a new supplier. Which of the following shapes should

diamonds

In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of
________ in the process.

messages and data

In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or
sequence of activities in a process.

solid arrows

In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means
that ________.

an activity is considered to be a subprocess of a process

The traditional process for developing information systems is ________.

the systems development life cycle

The first phase of the systems development life cycle (SDLC) is ________.

defining the system

The final phase of the systems development life cycle (SDLC) is ________.

maintaining the system

The project plan which results from defining the system is the input to ________, which is
the second phase of the SDLC.

requirement analysis

The first step in the system definition phase of the systems development life cycle (SDLC) is
to ________.

define the goals and scope

Once the project's goals and scope have been defined, the next step in the system definition
phase of the systems development life cycle (SDLC) is to ________.

assess feasibility

Which of the following are the dimensions of feasibility?

cost, schedule, technical, and organizational feasibility

Organizational feasibility concerns ________.

whether the new system fits within the organizations customs or legal requirements

If a defined project is determined to be feasible in the systems development life cycle
(SDLC), the next step is to ________.

from the project team

During the requirements definition stage of developing an information system, the project
team will consist mostly of ________.

business and systems analysts

Dentoin Pharmaceuticals requires an information system to support its new assembly line.
The management has assigned a team of ten members to plan this project. Which of the
following will be the first major task for this team?

defining the system goals and scope

ACES is a quality auditing firm. It has dedicated a team of managers, business analysts, and
system analysts to develop an information system that receives data and produces quarterly
reports that grade companies on their quality rating. The team is using

requirements analysis

The ________ phase of the systems development life cycle (SDLC) involves determining
hardware and program specifications, designing the database and procedures, and creating job
definitions.

component design

Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and
test system components, and to convert users to the new system.

system implementation

A(n) ________ is a formal description of a system's response to use and misuse scenarios.

test plan

During the system implementation phase of the systems development life cycle (SDLC),
once a system has passed testing, the organization installs the new system. Which of the
following terms is used to refer to this activity?

system conversion

In the system implementation phase of the systems development life cycle (SDLC), with
________ installation, the organization implements the entire new system/business processes on
a limited portion of the business.

pilot

In the system implementation phase of the systems development life cycle (SDLC), with
________ installation, the new system runs alongside the old one until it has been tested and is
fully operational.

parallel

In the context of system implementation phase of the systems development life cycle
(SDLC), a ________ installation is the riskiest because the old system is shut down and the new
system is introduced.

plunge

In the system implementation phase of the systems development life cycle (SDLC), with the
________ installation, the organization installs the next piece of the system only after the
previous piece works

phased

The work done during ________ phase is either to fix the system so that it works correctly or
to adapt it to changes in requirements.

maintenance

In systems development, documents, designs, prototypes, data models, database designs, and
working data entry screens are examples of _______.

deliverables

Which of the following is the key to successful systems development life cycle (SDLC)
projects?

work breakdown structure

A ________ shows the tasks, dates, and dependencies for the tasks of a project.

Gantt chart

The ________ is a sequence of activities that determine the earliest date by which a project
can be completed.

critical path

A ________ involves balancing three critical factors: requirements, cost, and time.

trade-off

According to Brooks' Law, adding more people to a late project will ________.

create diseconomics of scale

The situation that occurs when the addition of resources creates inefficiencies is known as
________.

diseconomics of scale

The final work breakdown structure (WBS) plan shows planned tasks, dependencies,
durations, and resource assignments. It is denoted as ________ WBS.

baseline

The term ________ refers to a set of management policies, practices, and tools that
developers use to maintain control over the systems development life cycle (SDLC) project's
resources.

configuration control

Crispies is a breakfast cereal manufacturing company. It is shifting its manufacturing process
from batch processing to assembly line production. The information system for the assembly line
is ready to be installed. Crispies decides to completely shut do

plunge installation

The systems development life cycle (SDLC) process follows a linear sequence from
requirements to design to implementation. Therefore, the systems development life cycle
(SDLC) process is also known as the ________.

waterfall method

Rapid application development, the unified process, extreme programming, and scrum have
led to ________.

agile development

Which of the following is true of paired programming?

two programmers share the same computer to write a computer program together

According to the scrum process, once the tasks are known for a given set of requirements,
the next step is to assign each task a difficulty score, called ________.

points

The total number of points of work a team can accomplish in each scrum period is called
________.

velocity

In an Append query, what happens to any records that violate the Primary key (or any other) rule?

the record is rejected