Exam 6: Data: Business Intelligence
Exam 1: Management Information Systems: Business Driven MIS313 Questions
Exam 2: Decisions Processes: Value Driven Business329 Questions
Exam 3: Ebusiness: Electronic Business Value383 Questions
Exam 4: Ethics Information Security: MIS Business Concerns342 Questions
Exam 5: Infrastructures: Sustainable Technologies250 Questions
Exam 6: Data: Business Intelligence284 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility289 Questions
Select questions type
If a manager identifies numerous information integrity issues he should consider the reports generated from that data as invalid and not use them when making decisions.
(True/False)
4.9/5
(34)
Which of the following illustrates the primary concepts of the relational database model?
(Multiple Choice)
4.9/5
(37)
Static information includes fixed data incapable of change in the event of a user action.
(True/False)
4.8/5
(35)
Relational _____________ constraints are rules that enforce basic and fundamental information-based constraints.
(Short Answer)
4.9/5
(31)
Which of the following occurs when a system produces incorrect,inconsistent,or duplicate data?
(Multiple Choice)
4.8/5
(33)
Relational databases offer many advantages over using a text document or a spreadsheet,which include decreased flexibility and decreased scalability and performance.
(True/False)
4.9/5
(40)
A data-driven website can help limit the amount of information displayed to customers based on unique search requirements.
(True/False)
4.8/5
(36)
Data mining occurs on structured data that are already in a database or a spreadsheet.
(True/False)
4.9/5
(37)
The data warehouse is a location for all of business information.
(True/False)
4.8/5
(32)
When does information cleansing occur in the data warehouse?
(Multiple Choice)
4.8/5
(33)
Which of the following creates,reads,updates,and deletes data in a database while controlling access and security?
(Multiple Choice)
4.9/5
(36)
Data _____________ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts,controls,instruments,maps,time-series graphs,and more.
(Short Answer)
4.8/5
(41)
Infographics can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.
(True/False)
4.7/5
(42)
Define a data warehouse,and provide a few reasons it can make a manager more effective.
(Essay)
5.0/5
(29)
MMSDB creates,reads,updates,and deletes data in a database while controlling access and security.
(True/False)
4.7/5
(35)
Unstructured data analyzes data to find trends and patterns in words and sentences.
(True/False)
4.8/5
(32)
Enter physical or logical in the space below:
The __________ view of information deals with the physical storage of information on a storage device.
(Short Answer)
4.8/5
(43)
Text mining analyzes structured data to find trends and patterns in words and sentences.
(True/False)
4.8/5
(32)
Informing dashboards track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis.
(True/False)
4.8/5
(34)
Relational integrity constraints enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints.
(True/False)
4.8/5
(36)
Showing 221 - 240 of 284
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)