Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

lOMoARcPSD|9394499

CH 8 TB - TEST BANK for Business intelligence

Advanced Man. Info.System ‫( مدقتملا ةيرادالا تامولعملا مظن‬King Abdulaziz


University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)
lOMoARcPSD|9394499

Business Intelligence, 4e (Sharda/Delen/Turban)


Chapter 8 Future Trends, Privacy and Managerial Considerations in Analytics

1) Siemens utilizes data sensors to track failure rates in household appliances.


Answer: FALSE
Diff: 2 Page Ref: 418

2) In the classification of location-based analytic applications, examining geographic site


locations falls in the consumer-oriented category.
Answer: FALSE
Diff: 2 Page Ref: 445

3) In the Great Clips case study, the company uses geospatial data to analyze, among other
things, the types of haircuts most popular in different geographic locations.
Answer: FALSE
Diff: 2 Page Ref: 443

4) From massive amounts of high-dimensional location data, algorithms that reduce the
dimensionality of the data can be used to uncover trends, meaning, and relationships to
eventually produce human-understandable representations.
Answer: TRUE
Diff: 2 Page Ref: 445

5) In the Quiznos case, the company employed location-based behavioral targeting to narrow the
characteristics of users who were most likely to eat at a quick-service restaurant.
Answer: TRUE
Diff: 2 Page Ref: 446

6) Internet of Things (IoT) is the phenomenon of connecting the physical world to the Internet.
Answer: TRUE
Diff: 2 Page Ref: 419

7) For cloud computing to be successful, users must have knowledge and experience in the
control of the technology infrastructures.
Answer: FALSE
Diff: 2 Page Ref: 430

8) Social networking Web sites like Facebook, Twitter, and LinkedIn, are also examples of cloud
computing.
Answer: TRUE
Diff: 1 Page Ref: 430

9) Web-based e-mail such as Google's Gmail are not examples of cloud computing.
Answer: FALSE
Diff: 2 Page Ref: 430

1
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

10) Service-oriented DSS solutions generally offer individual or bundled services to the user as a
service.
Answer: TRUE
Diff: 2 Page Ref: 431

11) Users definitely own their biometric data.


Answer: FALSE
Diff: 2 Page Ref: 452

12) Data as a service began with the notion that data quality could happen in a centralized place,
cleansing and enriching data and offering it to different systems, applications, or users,
irrespective of where they were in the organization, computers, or on the network.
Answer: TRUE
Diff: 2 Page Ref: 431

13) IaaS helps provide faster information, but provides information only to managers in an
organization.
Answer: FALSE
Diff: 2 Page Ref: 432

14) Server virtualization is the pooling of physical storage from multiple network storage devices
into a single storage device.
Answer: FALSE
Diff: 2 Page Ref: 433

15) While cloud services are useful for small and midsize analytic applications, they are still
limited in their ability to handle Big Data applications.
Answer: FALSE
Diff: 2 Page Ref: 435

16) SaaS combines aspects of cloud computing with Big Data analytics and empowers data
scientists and analysts by allowing them to access centrally managed information data sets.
Answer: FALSE
Diff: 2 Page Ref: 435

17) One reason the IoT is growing exponentially is because hardware is smaller and more
affordable.
Answer: TRUE
Diff: 2 Page Ref: 420

18) Connectivity is not a part of the IoT infrastructure.


Answer: FALSE
Diff: 2 Page Ref: 422

19) RFID can be used in supply chains to manage product quality.


Answer: TRUE
Diff: 1 Page Ref: 425

2
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

20) The term cloud computing originates from a reference to the Internet as a "cloud" and
represents an evolution of all of the previously shared/centralized computing trends.
Answer: TRUE
Diff: 2 Page Ref: 430

21) What kind of location-based analytics is a real-time marketing promotion?


A) organization-oriented geospatial static approach
B) organization-oriented location-based dynamic approach
C) consumer-oriented geospatial static approach
D) consumer-oriented location-based dynamic approach
Answer: B
Diff: 2 Page Ref: 441

22) GPS Navigation is an example of which kind of location-based analytics?


A) organization-oriented geospatial static approach
B) organization-oriented location-based dynamic approach
C) consumer-oriented geospatial static approach
D) consumer-oriented location-based dynamic approach
Answer: C
Diff: 2 Page Ref: 441

23) What new geometric data type in Teradata's data warehouse captures geospatial features?
A) NAVTEQ
B) ST_GEOMETRY
C) GIS
D) SQL/MM
Answer: B
Diff: 2 Page Ref: 443

24) Which of these is NOT a part of the IoT technology infrastructure?


A) hardware
B) connectivity
C) electrical access
D) software
Answer: C
Diff: 2 Page Ref: 422

25) Today, most smartphones are equipped with various instruments to measure jerk, orientation,
and sense motion. One of these instruments is an accelerometer, and the other is a(n)
A) potentiometer.
B) gyroscope.
C) microscope.
D) oscilloscope.
Answer: B
Diff: 2 Page Ref: 464

3
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

26) Smartbin has developed trash containers that include sensors to detect
A) fill levels.
B) types of trash.
C) tip-over.
D) weather.
Answer: A
Diff: 2 Page Ref: 419-420

27) The portion of the IoT technology infrastructure that focuses on the sensors themselves is
A) hardware.
B) connectivity.
C) software backend.
D) applications.
Answer: A
Diff: 2 Page Ref: 422

28) The portion of the IoT technology infrastructure that focuses on how to manage incoming
data and analyze it is
A) hardware.
B) connectivity.
C) software backend.
D) applications.
Answer: C
Diff: 2 Page Ref: 422

29) The portion of the IoT technology infrastructure that focuses on controlling what and how
information is captured is
A) hardware.
B) connectivity.
C) software backend.
D) applications.
Answer: D
Diff: 2 Page Ref: 422

30) The portion of the IoT technology infrastructure that focuses on how to transmit data is
A) hardware.
B) connectivity.
C) software backend.
D) applications.
Answer: B
Diff: 2 Page Ref: 422

4
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

31) Using this model, companies can deploy their software and applications in the cloud so that
their customers can use them.
A) SaaS
B) PaaS
C) IaaS
D) DaaS
Answer: B
Diff: 2 Page Ref: 432

32) This model allows consumers to use applications and software that run on distant computers
in the cloud infrastructure.
A) SaaS
B) PaaS
C) IaaS
D) DaaS
Answer: A
Diff: 2 Page Ref: 432

33) Which of the following is true of data-as-a-Service (DaaS) platforms?


A) Knowing where the data resides is critical to the functioning of the platform.
B) There are standardized processes for accessing data wherever it is located.
C) Business processes can access local data only.
D) Data quality happens on each individual platform.
Answer: B
Diff: 2 Page Ref: 431-432

34) Which of the following allows companies to deploy their software and applications in the
cloud so that their customers can use them?
A) SaaS
B) IaaS
C) PaaS
D) AaaS
Answer: C
Diff: 2 Page Ref: 432

35) In this model, infrastructure resources like networks, storage, servers, and other computing
resources are provided to client companies.
A) SaaS
B) PaaS
C) IaaS
D) DaaS
Answer: C
Diff: 2 Page Ref: 432

5
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

36) This model began with the notion that data quality could happen in a centralized place,
cleansing and enriching data and offering it to different systems, applications, or users,
irrespective of where they were in the organization, computers, or on the network.
A) SaaS
B) PaaS
C) IaaS
D) DaaS
Answer: D
Diff: 2 Page Ref: 431

37) Why are companies like IBM shifting to provide more services and consulting?
A) Customers see that significant value can be created with the application of analytics, and need
help completing these tasks.
B) They can no longer compete in the software market.
C) New regulations forced them into this market.
D) None of these.
Answer: A
Diff: 3 Page Ref: 454

38) Services that let consumers permanently enter a profile of information along with a password
and use this information repeatedly to access services at multiple sites are called
A) consumer access applications.
B) information collection portals.
C) single-sign-on facilities.
D) consumer information sign on facilities.
Answer: C
Diff: 2 Page Ref: 450

39) Which of the following is true about the furtherance of homeland security?
A) There is a lessening of privacy issues.
B) There is a greater need for oversight.
C) The impetus was the need to harvest information related to financial fraud after 2001.
D) Most people regard analytic tools as mostly ineffective in increasing security.
Answer: B
Diff: 2 Page Ref: 450-451

40) Why is separating the impact of analytics from that of other computerized systems a difficult
task?
A) Businesses do not typically track the sources of successful projects.
B) The trend is toward integrating systems.
C) Software tools are not sophisticated enough.
D) It is not an organizational priority.
Answer: B
Diff: 2 Page Ref: 453

6
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

41) ________ is a generic technology that refers to the use of radio-frequency waves to identify
objects.
Answer: RFID
Diff: 2 Page Ref: 422

42) A critical emerging trend in analytics is the incorporation of location data. ________ data is
the static location data used by these location-based analytic applications.
Answer: Geospatial
Diff: 2 Page Ref: 441

43) With RFID tags, a(n) ________ tag has a battery on board to energize it.
Answer: active
Diff: 2 Page Ref: 423

44) With RFID tags, a(n) ________ tag receives energy from the electromagnetic field created
by the interrogator.
Answer: passive
Diff: 2 Page Ref: 423

45) Predictive analytics is beginning to enable development of software that is directly used by a
consumer. One key concern in employing these technologies is the loss of ________.
Answer: privacy
Diff: 2 Page Ref: 448

46) ________ is the splitting of available bandwidth into channels.


Answer: Network virtualization
Diff: 2 Page Ref: 433

47) ________ is the masking of physical servers from server users.


Answer: Server virtualization
Diff: 2 Page Ref: 433

48) ________ provides resources like networks, storage, servers, and other computing resources
to client companies.
Answer: IaaS
Diff: 3 Page Ref: 432

49) IaaS, AaaS and other ________-based offerings allow the rapid diffusion of advanced
analysis tools among users, without significant investment in technology acquisition.
Answer: cloud
Diff: 2 Page Ref: 440

50) A major structural change that can occur when analytics are introduced into an organization
is the creation of new organizational ________.
Answer: units
Diff: 2 Page Ref: 454

7
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

51) A(n) ________ is operated solely for a single organization having a mission critical
workload and security concerns.
Answer: private cloud
Diff: 2 Page Ref: 433

52) In a(n) ________ the subscriber uses the resources offered by service providers over the
Internet.
Answer: public cloud
Diff: 2 Page Ref: 434

53) Analytics can change the way in which many ________ are made by managers and can
consequently change their jobs.
Answer: decisions
Diff: 2 Page Ref: 455

54) AaaS in the cloud has economies of scale and scope by providing many ________ analytical
applications with better scalability and higher cost savings.
Answer: virtual
Diff: 2 Page Ref: 435

55) Location information from ________ phones can be used to create profiles of user behavior
and movement.
Answer: mobile
Diff: 2 Page Ref: 462

56) For individual decision makers, ________ values constitute a major factor in the issue of
ethical decision making.
Answer: personal
Diff: 2 Page Ref: 453

57) ________ is/are used to capture, store, analyze, and manage data linked to a location using
integrated sensor technologies, global positioning systems installed in smartphones, or through
RFID deployments in the retail and healthcare industries.
Answer: GIS
Diff: 2 Page Ref: 442

58) By using ________, businesses can collect and analyze data to discern large-scale patterns of
movement and identify distinct classes of behaviors in specific contexts.
Answer: location-enabled services
Diff: 3 Page Ref: 445

59) Pokémon GO is an example of a location-sensing ________ reality-based game.


Answer: augmented
Diff: 2 Page Ref: 446

8
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

60) In general, ________ is the right to be left alone and the right to be free from unreasonable
personal intrusion.
Answer: privacy
Diff: 2 Page Ref: 449

61) How does Siemens use sensor data to help monitor equipment on trains?
Answer: Siemens uses an IoT model and sensors attached to several key components of trains
and other railway equipment to help evaluate its current working condition, and predict the need
for future repair. By using a wide variety of different types of sensors, the company is able to
evaluate a multitude of conditions. This evaluation can be on the train itself, or within the
supporting infrastructure. By using analytics to monitor these sensors, the company is able to
predict the need for repair prior to component failure.
Diff: 2 Page Ref: 418

62) How do the traditional location-based analytic techniques using geocoding of organizational
locations and consumers hamper the organizations in understanding "true location-based"
impacts?
Answer: Locations based on postal codes offer an aggregate view of a large geographic area.
This poor granularity may not be able to pinpoint the growth opportunities within a region. The
location of the target customers can change rapidly. An organization's promotional campaigns
might not target the right customers.
Diff: 2 Page Ref: 441

63) In what ways can communications companies use geospatial analysis to harness their data
effectively?
Answer: Communication companies often generate massive amounts of data every day. The
ability to analyze the data quickly with a high level of location-specific granularity can better
identify the customer churn and help in formulating strategies specific to locations for increasing
operational efficiency, quality of service, and revenue.
Diff: 2 Page Ref: 444

64) What is Internet of Things (IoT) and how is it used?


Answer: IoT is the phenomenon of connecting the physical world to the Internet. In IoT,
physical devices are connected to sensors that collect data on the operation, location, and state of
a device. This data is processed using various analytics techniques for monitoring the device
remotely from a central office or for predicting any upcoming faults in the device.
Diff: 2 Page Ref: 419

9
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

65) What is cloud computing? What is Amazon's general approach to the cloud computing
services it provides?
Answer:
• Wikipedia defines cloud computing as "a style of computing in which dynamically scalable
and often virtualized resources are provided over the Internet. Users need not have knowledge of,
experience in, or control over the technology infrastructures in the cloud that supports them."
• Amazon.com has developed an impressive technology infrastructure for e- commerce as well
as for business intelligence, customer relationship management, and supply chain management.
It has built major data centers to manage its own operations. However, through Amazon.com's
cloud services, many other companies can employ these very same facilities to gain advantages
of these technologies without having to make a similar investment. Like other cloud-computing
services, a user can subscribe to any of the facilities on a pay-as-you-go basis. This model of
letting someone else own the hardware and software but making use of the facilities on a pay-
per-use basis is the cornerstone of cloud computing.
Diff: 2 Page Ref: 430

66) Data and text mining is a promising application of AaaS. What additional capabilities can
AaaS bring to the analytic world?
Answer: It can also be used for large-scale optimization, highly-complex multi-criteria decision
problems, and distributed simulation models. These prescriptive analytics require highly capable
systems that can only be realized using service-based collaborative systems that can utilize large-
scale computational resources.
Diff: 3 Page Ref: 435

67) Describe your understanding of the emerging term people analytics. Are there any privacy
issues associated with the application?
Answer:
• Applications such as using sensor-embedded badges that employees wear to track their
movement and predict behavior has resulted in the term people analytics. This application area
combines organizational IT impact, Big Data, sensors, and has privacy concerns. One company,
Sociometric Solutions, has reported several such applications of their sensor-embedded badges.
• People analytics creates major privacy issues. Should the companies be able to monitor their
employees this intrusively? Sociometric has reported that its analytics are only reported on an
aggregate basis to their clients. No individual user data is shared. They have noted that some
employers want to get individual employee data, but their contract explicitly prohibits this type
of sharing. In any case, sensors are leading to another level of surveillance and analytics, which
poses interesting privacy, legal, and ethical questions.
Diff: 2 Page Ref: 455

10
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)


lOMoARcPSD|9394499

68) What is a data scientist and what does the job involve?
Answer: A data scientist is a role or a job frequently associated with Big Data or data science. In
a very short time it has become one of the most sought-out roles in the marketplace. Currently,
data scientists' most basic, current skill is the ability to write code (in the latest Big Data
languages and platforms). A more enduring skill will be the need for data scientists to
communicate in a language that all their stakeholders understand—and to demonstrate the
special skills involved in storytelling with data, whether verbally, visually, or—ideally—both.
Data scientists use a combination of their business and technical skills to investigate Big Data
looking for ways to improve current business analytics practices (from descriptive to predictive
and prescriptive) and hence to improve decisions for new business opportunities.
Diff: 2 Page Ref: 459

11
Copyright © 2018 Pearson Education, Inc.

Downloaded by Ibn Rushd (ibnrushd.edu.sa@gmail.com)

You might also like