x
Info
x
Warning
x
Danger
 / 
 / 
 / 
31.Baseball management discovered that its sales increased by almost 100

Question : 31.Baseball management discovered that its sales increased by almost 100 : 1418654

 

31.Baseball management discovered that its sales increased by almost 100 percent in those seasons when it held an open house prior to the opening game and allowed people to see the box seats and examine the view of the stadium from those seats. In terms of data mining, the management discovered a(n) ____ pattern.

a.affinity

b.sequence

c.association

d.adjacency

e.collaborative

32.Which of the following statements about data mining is true?

a.Data mining is the specific process used to match buyers and sellers.

b.Data mining is too expensive for most companies to use at this time.

c.The two forms of data mining are centralized and decentralized.

d.Data mining typically uses data from a data warehouse.

e.All of these statements about data mining are true.

33.____ is the process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users, but no one else.

a.Decryption

b.Roadblocking

c.Data insulation

d.Protecting information

e.Cookie manipulation

34.For the purposes of data mining, ____ patterns are just the opposite of association patterns.

a.sequence

b.adjacency

c.predictive

d.affinity

e.asymmetrical

35.Data clusters ____.

a.result from the use of internal data mining

b.are a statistical technique used for trend analysis

c.are used to create samples for statistical analyses

d.occur when three or more database elements occur together in a significant way

e.are accurately described by all of these

36.To properly secure data and data networks, a manager should use all of the following EXCEPT ____.

a.roadblocks

b.firewalls

c.data encryption

d.antivirus software

e.virtual private networks

37.Which of the following is NOT an example of a security problem that may threaten data and data networks?

a.email snooping

b.phishing

c.keystroke monitoring

d.mob flashing

e.password cracking

38.Two critical steps are required to make sure that data can be accessed by authorized users and no one else. They are ____.

a.authentication and authorization

b.authorization and empowerment

c.delegation and empowerment

d.encryption and empowerment

e.authentication and encryption

39.Which of the following statements about firewalls is true?

a.Firewalls are a way to protect data.

b.Firewalls can be in the form of hardware or software.

c.Firewalls prevent unauthorized use of data.

d.Firewalls sit between the computers in an internal organizational network and outside networks.

e.All of these statements about firewalls are true.

40.A system that requires employees to scan their thumbprints as they start work is called a(n)___________.

a.intangible cookies

b.biometrics

c.personal RFID tags

d.individual bar codes

e.optical scanners

 

 

Solution
5 (1 Ratings )

Solved
Management 1 Year Ago 29 Views
This Question has Been Answered!

Related Answers
Unlimited Access Free
Explore More than 2 Million+
  • Textbook Solutions
  • Flashcards
  • Homework Answers
  • Documents
Signup for Instant Access!
Ask an Expert
Our Experts can answer your tough homework and study questions
86430 Management Questions Answered!
Post a Question