test 3 Flashcards

1
Q

Competitive strategy determines all of the following except
________.
A) structure of the information system
B) goals and objectives
C) features
D) functions
E) the company’s PE ratio

A

E. the company’s PE ratio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Porter’s five forces model is used to assess ________.
A) industry structure
B) market share
C) internal competition
D) life cycles of products
E) future product demand

A

A. industry structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A mining company develops a new processing technique using only light, 3-D
printed drills and patents the process. This situation is characterized by ________.
A) low threat of substitutions
B) high bargaining power of customers
C) high threat of new entrants
D) low bargaining power of suppliers
E) low threat of new entrants

A

A. low threat of substitutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Focused cost leadership is observed when a product has the lowest cost
________.
A) within an industry segment
B) across the product mix offered by a company
C) across the entire industry
D) among a group of competitors
E) across multiple product categories

A

A. within an industry segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A retail company sells agricultural produce and consumer products. The
company procures materials from farmers and local producers. This process is an
example of ________.
A) outbound logistics
B) inbound logistics
C) operational management
D) internal marketing
E) customer service

A

B. inbound logistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ________ is a network of activities that generate worth by transforming
inputs into outputs.
A) business process
B) competitive strategy
C) value chain
D) information system
E) linked investment

A

A. business proess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The cost of the business process is the sum of the cost of the inputs and the
________.
A) cost of the activities
B) cost of the outputs
C) value of the outputs
D) value of the products
E) cost of the products

A

A. cost of the activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAC Associates is a car rental company that rents cars to tourists in the
United States. The company uses tracking devices and magnetic locks to prevent car theft.
These procedures are examples of ________.
A) primary business processes
B) core activities
C) strategic activities
D) supporting business processes
E) premeditated activities

A

E. Premeditated activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Streamtech, a manufacturer of automobiles, recently received a patent for an
unmanned search boat. By doing this, Streamtech has ________.
A) created an entry barrier
B) introduced product differentiation
C) locked in its suppliers
D) reduced the cost of operations
E) established an alliance

A

B. introduced product differentiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ is a concept that computer systems will become sophisticated enough that
they can adapt and create their own software and hence adapt their behavior without
human assistance.
A) Expert systems
B) Artificial Intelligence
C) Knowledge management
D) Business intelligence systems
E) Moore’s Law

A

B. artifical inteligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________ is the extraction of knowledge from data based on algorithms created from
training data.
A) Machine learning
B) Historical analysis
C) Simulation
D) Computer analysis
E) Processing data

A

A. Machine Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do machines learn?
A) By humans teaching them things
B) Through experience
C) By listening to the surroundings
D) With repetition of the same facts
E) By listening for a wake word

A

B. Through Experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Machine learning is focused on predicting accurate outcomes based on ________ data.
A) previously known training
B) current
C) future
D) questionable
E) a complete set of

A

A. perviously known training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A sales report that is current at the time the user accessed it on a Web server is an example of
a(n) ________.
A) static report
B) dynamic or exception report
C) expert system
D) hybrid market report
E) temporal report

A

B. dynamic or exeption report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Differentiate between unsupervised and supervised data mining.

A

Data mining techniques fall into two broad categories: unsupervised and supervised.
With unsupervised data mining, analysts do not create a model or hypothesis before running
the analysis. Instead, they apply a data mining application to the data and observe the results.
With this method, analysts create hypotheses after the analysis, in order to explain the patterns
found. With supervised data mining, data miners develop a model prior to the analysis and
apply statistical techniques to data to estimate parameters of the model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an example of a supervised data mining technique?
A) cluster analysis
B) market-basket analysis
C) regression analysis
D) click streaming
E) metadata matching

A

C. regression analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Samuel, a researcher, deduces that single women between the ages of 25 and 30, who
usually live in the suburbs and make thrifty purchases, prefer a particular brand of washing
machines. In this case, Samuel uses ________ to understand customer behavior.
A) supervised data mining
B) cluster analysis
C) neural networks
D) market-basket analysis
E) unsupervised learning

A

D. market-basket analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the difference between cluster analysis and classification?

A

Cluster analysis groups data according to their similarities (that we don’t know
beforehand), and classification predicts output categories based given input data (we
know the data is labeled).
 Classification is supervised learning and cluster analysis is unsupervised learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An OLAP report has measures and dimensions. Which of the following is an example of a
dimension?
A) total sales
B) average sales
C) sales region
D) average cost
E) average net sales

A

C. Sales Region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define descriptive analysis, predictive analysis, and prescriptive analysis.

A

Use my example of a medical doctor going through your annual physical. Doctor
analyzes your current health conditions (descriptive), he tries to foresee what your health will
be in the future (predictive), and give you recommendations/solutions (e.g., consume less sugar)
as the outcome prescriptive analysis to improve your well-being.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is an example of a supervised data mining
technique?
a. cluster analysis
b. regression analysis
c. market-basket analysis
d. click streaming
e. metadata matching

A

c. market basket analysis

22
Q

What separates classification from cluster analysis?
a. Classification is done by BI, while cluster analysis is done by
human
b. Cluster analysis is more powerful than classification
c. Classification has an existing research question knowing what to
look for and cluster does not
d. Classification uses the Internet but cluster analysis does not

A

C. classification has an existing research question knowing what to look for and cluster does not

23
Q

Which of the following reports focuses on reporting anomolies?
a. Exception Report
b. Cluster Report
c. Classification Report
d. Regular Report

A

C. clssification report

24
Q

Samuel, a researcher, deduces that people between the ages of 25 and 30,
who usually live in downtown and make thrifty purchases, prefer a particular
brand of coffe. In this case, Samuel uses ________ to understand customer
behavior.
a. supervised data mining
b. cluster analysis
c. neural networks
d. market-basket analysis
e. unsupervised learning

A

D. market-basket analysis

25
Q

An OLAP report has measures and dimensions. Which of the following is an
example of a dimension?
a. total sales
b. average sales
c. sales region
d. average cost
e. average net sales

A

C. sales region

26
Q

Porter’s five forces model is used to assess ________.
a. market share
b. internal competition
c. product lifecycle
d. industry structure

A

A. market share

27
Q

The bargaining power of customers will likely be high when they purchase:
a. limited edition apparel
b. patented drugs
c. A bit that represents on
d. standardized products
e. rare antique arts

A

D. standardized products

28
Q

A company develops and patents a unique reusable rocket transportation
technology allowing man travel to the moon, and is totally safe. This
situation is characterized by ________.
a. low threat of substitutions
b. high bargining power of suppliers
c. low bargining power of customers
d. low threat of new entrants

A

A. low threat of substitutions

29
Q

One of the support activities in a value chain is:
a. Outbound logistics
b. Inbound logistics
c. Hiring employees
d. Manufacturing products

A

C. hiring employees

30
Q

An example of a primary value chain activity is:
a. Procurement
b. Customer Service
c. Human Resources
d. Information Systems

A

B. customer service

31
Q

Many companies create ________, which are false targets for computer
criminals to attack.
a. honeypots
b. operational procedures
c. backups of company data
d. security checkpoints
e. hacker centers

A

A. honeypots

32
Q

All of the following should be in an incident-response plan except
________.
a. how employees respond to security problems
b. the person who caused the incident
c. who should be contacted in case of an incident
d. the reports that should be created because of the incident
e. how to reduce further loss

A

B. the person who caused the incident

33
Q

The Gramm-Leach-Bliley (GLB) Act protects consumer data stored by many
financial insitutions EXCEPT for _____.
a. JP Morgan Chase
b. Wells Fargo
c. Department of Treasury
d. Citigroup

A

C. department of treasury

34
Q

Machine learning is an important tool for Artificial Intelligence to
_____.
a. increase data capacity
b. enhance data security
c. improve data quality
d. identify and reveal hidden patterns among data

A

D. identify and reveal hidden patterns amoung data

35
Q

Which unsupervised technique below identifies the patter without a prior
model or research question/hypothesis?
a. Classification
b. Regression Analysis
c. Cluster Analysis
d. Statistics

A

C. cluster Analysis

36
Q

What separates unsupervised data mining from supervised data mining?
a. The amount of memory needed
b. The speed of data processing
c. Unsupervised analysis does not create a model or hypothesis
beforehand
d. Supervised analysis does not create a model or hypothesis beforehand
e. Unsupervised analysis develop a model prior to the analysis

A

c. unsupervised analysis does not create model or hypothesis beforehand

37
Q

Sally has been working really hard lately and asks her manager for a
raise. Her manager tells her that she is already the highest paid employee on
the floor. Sally doesn’t believe her manager, and illegally accesses the
employee database to look at salary data. Sally’s act can be termed as
________.
a. phishing
b. pretexting
c. spamming
d. hacking

A

D. hacking

38
Q

Which of the following characteristics is NOT important for an effective
collaborator to have?
a. target
b. threat
c. key escrow
d. cipher

A

B. threat

39
Q

Carlos owns a small business and is striving to keep his organization
running smoothly while remaining profitable in a highly competitive market.
He chooses to use process implementation to give his company a competitive
pricing edge over others. Which of the following principles is he most likely
to implement?
a. enhancing service
b. differentiate products
c. create a new product
d. reducing cost

A

D. reducing cost

40
Q

Make Time for You, Inc. provides therapeutic massage therapy services via
a mobile spa which enables them to provide those services at the time and
place most convenient to their clientele. Which of the following is most
likely the reason the owners of Make Time for You, Inc. chose this business
model?
a. reducing cost
b. locking in customers
c. raising barriers for new entrants
d. Software

A

B. locking in customers

41
Q

Focused cost leadership is observed when a product has the lowest cost
________.
a. across the product mix offered by a company
b. within an industry segment
c. across the entire industry
d. among a group of competitors
e. across multiple product category

A

B. within an industry segment

42
Q

A ________ is a person or an organization that seeks to obtain or alter data or other
IS assets illegally, without the owner’s permission and often without the owner’s
knowledge.
A) target
B) vulnerability
C) threat
D) key escrow
E) cipher

A

C. threat

43
Q

Which of the following is considered a threat caused by human error?
A) an employee inadvertently installing an old database on top of the current one
B) an employee intentionally destroying data and system components
C) a virus and worm writer infecting computer systems
D) a hacker breaking into a system to steal for financial gain
E) a tsunami floods a data center causing total data loss

A

A. an employee inadvertently installing an old database on top of the current one

44
Q

Which of the following is considered a computer crime?
A) accidental deletion of important records
B) poorly written programs resulting in information loss
C) loss of data as a result of flooding
D) hacking of information systems
E) failure to correctly back up customer data

A

D. hacking information systems

45
Q

A person claiming to be from central IT called Chris and asked him to participate in a
password reset audit. The person had Chris change his password to the word “123456”,
and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd
system behavior, and then the system crashed. Chris was a victim of ________.
A) hacking
B) usurping
C) sniffing
D) pretexting
E) appropriating

A

D. pretexting

46
Q

Sally has been working really hard lately and asks her manager for a raise. Her manager tells
her that she is already the highest paid employee on the floor. Sally doesn’t believe her
manager, and illegally accesses the employee database to look at salary data. Sally’s act can be
termed as ________.
A) pretexting
B) phishing
C) hacking
D) spoofing
E) skimming

A

C. hacking

47
Q

Which of the following statements is TRUE about biometric identification?
A) It involves the use of a personal identification number (PIN) for authentication.
B) It provides weak authentication.
C) It is a relatively inexpensive mode of authentication.
D) It often faces resistance from users for its invasive nature.
E) It will decline in usage in the future

A

D. It often faces resistance from users for its invasive nature.

48
Q

Which of the following statements is TRUE about the Secure Sockets Layer (SSL)?
A) It uses asymmetric encryption exclusively.
B) It is used to send sensitive data such as credit card numbers.
C) It uses one set of encryption keys for multiple sessions.
D) It is a stronger version of https.
E) It is used in wireless encryption suites.

A

B. It is used to send sensitive data such as credit card numbers.

49
Q

Layla is purchasing a new laptop from an online vendor. Which of the following will be
displayed in the address bar of his browser that will let her know that the online retailer is using
the Secure Sockets Layer (SSL) protocol?
A) ftp
B) www
C) https
D) .com
E) smtp

A

C. https

50
Q

Jason attempts to hack into a banking site to steal customer information. He finds the security
of the Web site lacking and is able to access the site with ease. Jason is arrested the next day
and charged with computer crime. The banking site was able to track Jason’s IP address because
he had unknowingly attacked a ________.
A) botnet
B) hot site
C) honeypot
D) Web beacon
E) Trojan horse

A

C. honeypot

51
Q

If an organization turns an employee’s access off to the building while they are at lunch as a
means of termination, this would be considered ________.
A) a hostile situation
B) mean
C) an unfriendly termination
D) enforcement of company rules
E) separation termination

A

C. an unfriendly termination