Deck 10: The Future of Business Intelligence

ملء الشاشة (f)
exit full mode
سؤال
Possible vulnerabilities in the data chain include which three?

A) Company front doors, data lines between the store and the bank, and credit card readers
B) Credit Card readers, credit card signatures, and corporate servers
C) Credit card readers, data lines between the store and the bank, and corporate computer servers
D) Cash registers, company front door, and remote computers
E) None of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is a principle outlined by the PCI Securities Council?

A) Appoint a high ranking corporate official
B) Protect cardholder data
C) Develop a comprehensive strategy for risk management
D) All of the above
E) None of the above
سؤال
Web 2.0 has led to the development of what services?

A) Text mining
B) Web mining
C) Wikis
D) Democratic
E) None of the above
سؤال
_______ are programs that allow access from a user's desktop to Web-based content.

A) Widgets
B) Web Services
C) RSS feeds
D) Both b and c
E) All of the above
سؤال
Predictive BI technologies require which of the following to work effectively?

A) Substantial amount of time
B) Substantial amount of data
C) Both a and b
D) None of the above
سؤال
Which BI predictive technology is used to predict the creditworthiness of an individual?

A) Decision trees
B) Prediction or opinion markets
C) Textual analytics
D) None of the above
E) All of the above
سؤال
Which predictive technology spurred a viral marketing frenzy for a t-shirt?

A) Social networking based recommendations
B) Collaborative filtering
C) Neural networks
D) Content-based filtering
E) All of the above
سؤال
_____________ are being discovered, created and applied on the move by knowledge workers.

A) Knowledge and business analytics
B) Business intelligence and nomadic computing
C) Mobile financial services
D) Multi-party interactive games
E) None of the above
سؤال
Which of the following is a personal bias?

A) Filtering
B) Distorted inference
C) Bolstering
D) All of the above
E) None of the above
سؤال
What are some of the challenges faced when launching successful BI initiatives?

A) Personal and organizational biases
B) People within the BI processes
C) The integration of data and information
D) Both b and c
E) None of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: The Future of Business Intelligence
1
Possible vulnerabilities in the data chain include which three?

A) Company front doors, data lines between the store and the bank, and credit card readers
B) Credit Card readers, credit card signatures, and corporate servers
C) Credit card readers, data lines between the store and the bank, and corporate computer servers
D) Cash registers, company front door, and remote computers
E) None of the above
Credit card readers, data lines between the store and the bank, and corporate computer servers
2
Which of the following is a principle outlined by the PCI Securities Council?

A) Appoint a high ranking corporate official
B) Protect cardholder data
C) Develop a comprehensive strategy for risk management
D) All of the above
E) None of the above
Protect cardholder data
3
Web 2.0 has led to the development of what services?

A) Text mining
B) Web mining
C) Wikis
D) Democratic
E) None of the above
Wikis
4
_______ are programs that allow access from a user's desktop to Web-based content.

A) Widgets
B) Web Services
C) RSS feeds
D) Both b and c
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Predictive BI technologies require which of the following to work effectively?

A) Substantial amount of time
B) Substantial amount of data
C) Both a and b
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which BI predictive technology is used to predict the creditworthiness of an individual?

A) Decision trees
B) Prediction or opinion markets
C) Textual analytics
D) None of the above
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which predictive technology spurred a viral marketing frenzy for a t-shirt?

A) Social networking based recommendations
B) Collaborative filtering
C) Neural networks
D) Content-based filtering
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
_____________ are being discovered, created and applied on the move by knowledge workers.

A) Knowledge and business analytics
B) Business intelligence and nomadic computing
C) Mobile financial services
D) Multi-party interactive games
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is a personal bias?

A) Filtering
B) Distorted inference
C) Bolstering
D) All of the above
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
What are some of the challenges faced when launching successful BI initiatives?

A) Personal and organizational biases
B) People within the BI processes
C) The integration of data and information
D) Both b and c
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.