Exam 6: Business Intelligence Implementation: Integration and Emerging Trends

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Many devices in use by consumers and business people are constantly sending out their ________.

(Multiple Choice)
4.8/5
(33)

Virtual worlds are defined as artificial worlds created by computer systems in which the user has the impression of being immersed.

(True/False)
4.9/5
(28)

To access a data warehouse, users who need to conduct an analysis, find information, or perform data visualization use software known as virtual ware.

(True/False)
4.9/5
(42)

What is privacy? Why is it difficult to enforce privacy regulations?

(Essay)
4.8/5
(32)

Define the components of RFID and how active and passive tags works.

(Essay)
4.8/5
(30)

Describe social network analysis (SNA) software.

(Essay)
4.8/5
(47)

A major highlight of Orkut is the individual power afforded to those who create their own groups and forums, which are called ________.

(Short Answer)
4.7/5
(36)

Without committed management support and sponsorship a business implementation has a high risk of failure.

(True/False)
4.9/5
(34)

The success of today's highly volatile perishables supply chains depends on:

(Multiple Choice)
4.8/5
(30)

By analyzing and learning from these large-scale patterns of movement, it is possible to identify distinct classes of behaviors in specific contexts, called ________.

(Short Answer)
4.9/5
(34)

RFID technology allows Coca-Cola to test and track new drink flavors and local preferences.

(True/False)
4.9/5
(26)

Wikia is an example of a new business model that has emerged from Web 2.0. It s the accumulation of the "power of the crowd," but the potential of such a business model remains limited because of competition.

(True/False)
4.7/5
(35)

By analyzing and learning from these large-scale patterns of movement, Sense Networks is now adapting this general technology to help consumers find people with similar interests. This application is called ________.

(Multiple Choice)
4.8/5
(29)

Just as RFID generates major data streams for further analysis through BI technologies that can assist in decision making, another massive data source and technologies to make sense of the data are emerging. This type of data mining is called reality mining.

(True/False)
4.9/5
(43)

In general, enterprises have not gained more value from BI by extending information to many types of employees, maximizing the use of existing data assets.

(True/False)
4.9/5
(34)

Active RFID tags have their own power source and can initiate the data transmission process on their own, but need a reader to energize them.

(True/False)
4.7/5
(34)

Although virtual worlds are becoming interesting tools for businesses and consumers, several factors have kept them from gaining widespread acceptance. Which of the following is one of those factors?

(Multiple Choice)
4.9/5
(40)

The most commonly used data representation for RFID technology is the:

(Multiple Choice)
4.9/5
(35)

Concepts such as virtual currencies often allow participants to buy or sell virtual goods or services, such as clothes or training.

(True/False)
4.8/5
(34)

Social network analysis (SNA) software is used to identify, represent, analyze, visualize, or simulate network nodes and edges from various types of input data.

(True/False)
4.8/5
(39)
Showing 21 - 40 of 70
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)