Deck 10: The Future of Business Intelligence

Full screen (f)
exit full mode
Question
Possible vulnerabilities in the data chain include which three?

A) Company front doors, data lines between the store and the bank, and credit card readers
B) Credit Card readers, credit card signatures, and corporate servers
C) Credit card readers, data lines between the store and the bank, and corporate computer servers
D) Cash registers, company front door, and remote computers
E) None of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is a principle outlined by the PCI Securities Council?

A) Appoint a high ranking corporate official
B) Protect cardholder data
C) Develop a comprehensive strategy for risk management
D) All of the above
E) None of the above
Question
Web 2.0 has led to the development of what services?

A) Text mining
B) Web mining
C) Wikis
D) Democratic
E) None of the above
Question
_______ are programs that allow access from a user's desktop to Web-based content.

A) Widgets
B) Web Services
C) RSS feeds
D) Both b and c
E) All of the above
Question
Predictive BI technologies require which of the following to work effectively?

A) Substantial amount of time
B) Substantial amount of data
C) Both a and b
D) None of the above
Question
Which BI predictive technology is used to predict the creditworthiness of an individual?

A) Decision trees
B) Prediction or opinion markets
C) Textual analytics
D) None of the above
E) All of the above
Question
Which predictive technology spurred a viral marketing frenzy for a t-shirt?

A) Social networking based recommendations
B) Collaborative filtering
C) Neural networks
D) Content-based filtering
E) All of the above
Question
_____________ are being discovered, created and applied on the move by knowledge workers.

A) Knowledge and business analytics
B) Business intelligence and nomadic computing
C) Mobile financial services
D) Multi-party interactive games
E) None of the above
Question
Which of the following is a personal bias?

A) Filtering
B) Distorted inference
C) Bolstering
D) All of the above
E) None of the above
Question
What are some of the challenges faced when launching successful BI initiatives?

A) Personal and organizational biases
B) People within the BI processes
C) The integration of data and information
D) Both b and c
E) None of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: The Future of Business Intelligence
1
Possible vulnerabilities in the data chain include which three?

A) Company front doors, data lines between the store and the bank, and credit card readers
B) Credit Card readers, credit card signatures, and corporate servers
C) Credit card readers, data lines between the store and the bank, and corporate computer servers
D) Cash registers, company front door, and remote computers
E) None of the above
Credit card readers, data lines between the store and the bank, and corporate computer servers
2
Which of the following is a principle outlined by the PCI Securities Council?

A) Appoint a high ranking corporate official
B) Protect cardholder data
C) Develop a comprehensive strategy for risk management
D) All of the above
E) None of the above
Protect cardholder data
3
Web 2.0 has led to the development of what services?

A) Text mining
B) Web mining
C) Wikis
D) Democratic
E) None of the above
Wikis
4
_______ are programs that allow access from a user's desktop to Web-based content.

A) Widgets
B) Web Services
C) RSS feeds
D) Both b and c
E) All of the above
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
Predictive BI technologies require which of the following to work effectively?

A) Substantial amount of time
B) Substantial amount of data
C) Both a and b
D) None of the above
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
Which BI predictive technology is used to predict the creditworthiness of an individual?

A) Decision trees
B) Prediction or opinion markets
C) Textual analytics
D) None of the above
E) All of the above
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
Which predictive technology spurred a viral marketing frenzy for a t-shirt?

A) Social networking based recommendations
B) Collaborative filtering
C) Neural networks
D) Content-based filtering
E) All of the above
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
_____________ are being discovered, created and applied on the move by knowledge workers.

A) Knowledge and business analytics
B) Business intelligence and nomadic computing
C) Mobile financial services
D) Multi-party interactive games
E) None of the above
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is a personal bias?

A) Filtering
B) Distorted inference
C) Bolstering
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
What are some of the challenges faced when launching successful BI initiatives?

A) Personal and organizational biases
B) People within the BI processes
C) The integration of data and information
D) Both b and c
E) None of the above
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.