Search
Info
Warning
Danger

Study Resources (Accounting)

Multiple Choice Questions 1) ________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Process mining B) Business process management C) Business intelligence D) Spatial intelligence 2) Which of the following is true of source data for a BI system? A) It refers to the organization's metadata. B) It refers to.
0 Views
View Answer
21) In McAfee's SLATES Enterprise 2.0 model, "L" is for ________. A) LAN B) links C) language D) leader 22) In McAfee's SLATES Enterprise 2.0 model, "A" is for ________. A) avatar B) Ajax C) authoring D) affiliation 23) A ________ is content structure that has emerged from the processing of many user tags. A) mashup B) taxonomy C) folksonomy D) microblog 24) According to.
0 Views
View Answer
31) Cluster analysis is used to identify groups of entities that have similar characteristics. 32) In supervised data mining, a model is developed after the analysis. 33) Regression analysis measures the effect of a set of variables on another variable. 34) Neural networks are a popular unsupervised data mining technique used to predict.
0 Views
View Answer
Essay Questions 1) Define structured processes and list their characteristics. 2) Define dynamic processes and list their characteristics. 3) Define workgroup processes, enterprise processes, and inter-enterprise processes. 4) Define enterprise information systems and describe its characteristics. 5) Describe inter-enterprise information systems. .
0 Views
View Answer
31) Which of the following observations about RFM and OLAP reports is true? A) RFM is more generic than OLAP. B) OLAP reports are more dynamic than RFM reports. C) RFM reports have measures and dimensions. D) RFM reports can drill down into the data. 32) ________ is the application of statistical techniques to find.
0 Views
View Answer
11) Content data differentiates SMIS from Web site applications. 12) Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data. 13) Social networking procedures are more informal for SM sponsors than they are for social networking users. 14) Before initiating a.
1 Views
View Answer
31) Social capital does not depreciate. 32) The multiplicative nature of social capital means that a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources. 33) A hyper-social organization is an organization that uses social media to.
0 Views
View Answer
Essay Questions 1) Define business intelligence and BI systems. 2) Name and describe the three primary activities in the BI process. 3) Describe the functions of data warehouses. 4) What are the common problems with using operational data? 5) Describe the features of a data mart. .
0 Views
View Answer
11) A workgroup information system is an organizational structure where a separate department is established by the organization to support and manage its information system. 12) The procedures for using workgroup information systems need to be understood only by the IT department of an organization. 13) Workgroup information systems typically support 10.
0 Views
View Answer
9) Summarize Intel's guiding principles for SM policies. 10) List the major risks for businesses that indulge in commercial applications of social networking. Discuss any one of them briefly. 11) How should organizations respond to social networking problems? Which one of them is a dangerous approach and why? 12) Explain the meaning of.
0 Views
View Answer
Essay Questions 1) Define social media and social media information systems. Name the three SMIS organizational roles. 2) Describe social media sponsors and social media application providers. 3) Explain the terms "defenders of belief" and "seekers of the truth." How do the goals of each type of community differ? 4) Explain each element in.
0 Views
View Answer
11) A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community. A) defenders-of-belief B) seekers-of-the-truth C) heterogeneous D).
0 Views
View Answer
11) Which of the following information systems minimizes data duplication among departments? A) departmental information systems B) workgroup information systems C) personal information systems D) enterprise information systems 12) Which of the following statements is true regarding workgroup information systems? A) They are easy to change. B) They minimize data duplication among departments. C) They can be operated.
0 Views
View Answer
True/False Questions 1) Both structured processes and dynamic processes are formally defined processes. 2) Structured processes are standardized processes that involve day-to-day operations. 3) Placing an order is an example of a structured process. 4) Structured processes are adaptive processes that change structure rapidly and readily. 5) Dynamic processes are more specific. 6) Using social networking.
2 Views
View Answer
31) CRM systems incorporate accounting, manufacturing, inventory, and human resources applications. 32) The primary purpose of an ERP system is integration. 33) Enterprise application integration is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. 34) Converting to an ERP.
0 Views
View Answer
31) ________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. A) Enterprise resource planning B) Customer relationship management C) Enterprise application integration D) Business process reengineering 32) The primary purpose of an ERP system is ________. A) customization B) duplication C).
0 Views
View Answer
21) RFM analysis considers how recently (R) a customer ordered, how frequently (F) they ordered, and how much margin (M) the company made on the orders. 22) OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. 23) The remarkable characteristic of OLAP reports.
0 Views
View Answer
21) Adding process resources increases process effectiveness, but it adds costs. 22) Changing the structure of a process always involves a change in resources as well, even if it is only a simple reordering of tasks. 23) Information systems improve process quality by augmenting the actions of the human who performs that.
0 Views
View Answer
Multiple Choice Questions 1) ________ are formally defined, standardized processes that involve day-to-day operations. A) Dynamic processes B) Unstructured processes C) Structured processes D) Kinetic processes 2) Which of the following is an example of a structured process? A) deciding on the location of a new store B) solving the problem of excessive product returns C) purchasing raw materials D).
0 Views
View Answer
True/False Questions 1) Business intelligence (BI) systems have only four of the five components of an information system: hardware, software, data, and people. 2) The software component of a BI system is called a BI application. 3) The three primary activities in the BI process are to acquire data, perform analysis, and publish.
3 Views
View Answer
21) Information systems improve process quality by ________. A) duplicating data B) entirely replacing human activity C) changing the work culture D) controlling process flow 22) Which of the following conditions exists when data are isolated in separated information systems? A) information overload B) encapsulation C) information silo D) data segregation 23) When an organization has inconsistent duplicated data, it.
0 Views
View Answer
21) Which of the following is true about cable modems? A) They provide high-speed data transmission using telephone cables. B) They offer consistent performance, irrespective of the number of users sending and receiving data. C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission. D) They provide.
0 Views
View Answer
5) Define the three types of capitals listed in business literature. According to Nan Lin, how does social capital add value? 6) Describe the hypersocial organization. Name the four pillars of a hypersocial organization. 7) Explain the nature of sensing in SEAMS activities. 8) Describe the difference between Web 2.0 processing and traditional.
0 Views
View Answer
41) Hadoop is an open-source program supported by the Apache Foundation4 that implements MapReduce on potentially thousands of computers. 42) Knowledge management was done only after the advent of social media. 43) KM fosters innovation by encouraging the free flow of ideas. 44) Expert systems are rule-based systems that use "If . ..
0 Views
View Answer
41) The ________ tier of three-tier architecture consists of computers, phones, and other devices that have browsers that request and process Web pages. A) user B) server C) database D) data link 42) ________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to.
0 Views
View Answer
True/False Questions 1) Social media is the use of information technology to support the sharing of content among networks of users. 2) SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries. 3) A viral hook is something that induces people to share a message with others. 4) Social.
4 Views
View Answer
6) What are the two dimensions of process quality? How can organizations improve process quality? How do information systems improve process quality? 7) List the problems associated with information silos. 8) What is the fundamental problem of information silos? How can this problem be remedied? 9) What are the four phases of the.
0 Views
View Answer
41) Which of the following is one of the main principles used by companies implementing Web 2.0 to attract viewers? A) controlled releases B) fixed product value C) free content D) fixed interface 42) The Web 2.0 business model relies on ________ for revenue. A) advertising B) software license fees C) venture capital D) controlled, fixed interface 43) ________.
0 Views
View Answer
31) A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol. A) router B) modem C) narrowband D) access point 32) A(n) ________ is a number that identifies a particular device. A) domain B) IP address C) hyperlink D) href 33) The organization responsible for assigning public IP addresses is called ________. A).
1 Views
View Answer
31) According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related. A) strength of a viral hook B) value of social capital C) curse of dimensionality D) social media policy 32) To an organization,.
0 Views
View Answer
Multiple Choice Questions 1) ________ is the use of information technology to support the sharing of content among networks of A) Social media B) Content publishing C) Networking D) Programming 2) A(n) ________ is an information system that supports the sharing of content among networks of users. A) DSS B) SMIS C) ERP D) TPS 3) SM communities differ from.
0 Views
View Answer
21) Seekers of the truth will seek the truth, even if that means recommending another vendor's product over yours. 22) Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems. 23) Outsourcing is the dynamic social media process of employing users to participate in product design or product redesign. 24).
0 Views
View Answer
41) ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category? A) obtaining top-level management support B) steps for using the applications to accomplish the activities in processes C) dealing with employee.
0 Views
View Answer
11) Problematic data are termed dirty data. 12) A value of 999–999–9999 for a U.S. phone number is an example of dirty data for BI purpose. 13) Granularity is a term that refers to the level of detail represented by the data. 14) It is possible to capture the customers' clicking behavior using.
0 Views
View Answer
41) In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. A) confidence B) support C) granularity D) lift 42) ________ is a hierarchical arrangement of criteria that predict a classification or a value. A) A value chain B) A cluster analysis C) A decision tree.
0 Views
View Answer
51) In cloud computing, resources are said to be "pooled" because ________. A) organizations use the public Internet to create the appearance of a private connection B) organizations use open source standards which enable users to modify a program's source code C) organizations offer their services to each other free of charge, in.
0 Views
View Answer
41) ERP vendors sometimes train an organization's employees to become in-house trainers in training sessions called train the trainer. 42) Industry-specific solutions contain program and database configuration files, but not the process blueprints that apply to ERP implementations in specific industries. 43) Epicor and Microsoft Dynamics are the highest ranked ERP vendors.
0 Views
View Answer
51) ________ measures the frequency that someone who clicks on an ad makes a purchase, Likes a site, or takes some other action desired by the advertiser. A) AdWords B) Conversion rate C) Ad entity D) Conversion protocol 52) The first step that any hypersocial organization should take is to develop and publicize a(n) ________.
1 Views
View Answer
11) Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch? A) access point B) packet C) server D) router 12) The IEEE 802.3 protocol standard is also known as ________. A) Bluetooth B) Ethernet C) Intranet D) Internet 13) Which of the following statements is true about IEEE.
0 Views
View Answer