Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment: Business Intelligence

Question 1
Identify a drawback of a NoSQL database.
1) It lacks strong data consistency.
2) It deteriorates the system uptime.
3) It is less scalable.
4) It is not efficient in dealing with extremely large databases.

Question 2
Which of the following data mining techniques uses a specialized set of algorithms that sorts through data and forms statistical rules about relationships among the items?
1) Neural computing
2) Association analysis
3) Case-based reasoning
4) Drill-down analysis

Question 3
Which of the following represents an entity in a relational database model?
1) A column
2) A row
3) An attribute
4) A degree

Question 4
Which of the following best describes the relational database model?
1) It helps organize unstructured data into collections of three-dimensional tables.
2) It helps organize unstructured data into collections of two-dimensional tables.
3) It helps organize structured data into collections of three-dimensional tables.
4) It helps organize structured data into collections of two-dimensional tables.

Question 5
Which of the following is a method to analyze multidimensional data from different perspectives?
1) Spreadsheet reporting
2) Data mining
3) Online analytical processing (OLAP)
4) Drill-down analysis

Question 6
The columns in a relational database model such as customer name and address represent _____.
1) attributes
2) entities
3) keys
4) tuples

Question 7
_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analysis, interpretation, and presentation of data to support improved decision making.
1) Business intelligence
2) Artificial intelligence
3) Prescriptive analytics
4) Artificial analytics

Question 8
Which of the following is a minor version of a data warehouse that is scaled down to meet the specific needs of a business unit?
1) Data cart
2) Data mart
3) Data wallet
4) Data set

Question 9
Metrics that consist of a direction, measure, target, and time frame are known as _____.
1) online analytical processors
2) key association indicators
3) drill-down analysis indicators
4) key performance indicators

Question 10
Which of the following is a term used to describe data collections that are so enormous and complex that traditional data management software and analysis processes are incapable of dealing with them?
1) Big data
2) Data mart
3) Data warehouse
4) Big cell

Question 11
Identify the industry that implements data governance.
1) Insurance industry
2) Agricultural industry
3) Construction industry
4) Automobile industry

Question 12
Which of the following databases should be used by a company that has over 50,000 employees in several locations to efficiently manage its database even when a couple of servers are down?
1) Hadoop
2) SQL
3) COBOL
4) NoSQL

Question 13
In-memory databases (IMDBs) have become feasible because of the decrease in _____ capacities.
1) random access memory (RAM)
2) read-only memory (ROM)
3) random access memory (RAM)
4) read-only memory (ROM)

Question 14
Which of the following is true of dashboards?
1) They provide rapid access to information in an easy-to-interpret manner.
2) They provide rapid access to information in a verbose manner.
3) They match a user's query to many sources of information in an attempt to identify the most important content and the most reliable and relevant source.
4) They index documents from a variety of sources such as corporate databases, departmental files, email, corporate wikis, and document repositories.

Question 15
Identify a true statement about drill-down analysis.
1) It involves the interactive examination of high-level summary data in increasing detail to gain insight into certain elements.
2) It involves pre-aggregation of detailed data into useful data summaries in anticipation of questions that might be raised.
3) It performs operation on data based on user-defined formulas.
4) It is used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making.

Question 16
Which of the following represents the attribute of an entity in a relational database model?
1) A column
2) A row
3) A Cardinality
4) A tuple

Question 17
Which layer of Hadoop is responsible for data storage?
1) The application layer
2) The Hadoop Distributed File system layer (HDFS)
3) The workload management layer
4) The Hadoop resource layer (HRL)

Question 18
PindCart, a garment retailer, is not sure of the demand for its products during the festive seasons and ends up with very little profit. Which of the following business intelligence tools can help PindCart to predict the demand and maximize its sales?
1) Drill-down analysis
2) Online analytical processing
3) Spreadsheets
4) Dashboards

Question 19
Which of the following is true of the neural computing technique in data mining?
1) Historical data is examined for patterns that are then used to make predictions.
2) A set of algorithms sorts through data and forms statistical rules about relationships among the items.
3) Historical if-then-else cases are used to recognize patterns.
4) Operations are performed on given data based on formulas created by the end user.

Question 20
A NoSQL database stores data as highly optimized key-value pairs with the data stored in a _____ table.
1) simple two-column
2) contemporary four-column
3) simple three-column
4) contemporary nine-column.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92282248
  • Price:- $15

Guranteed 24 Hours Delivery, In Price:- $15

Have any Question?


Related Questions in Management Information System

Threats vulnerabilities security controls and

Threats, Vulnerabilities, Security Controls, and Countermeasures Description: The objective of this project is to create a comprehensive threat model on a software application of your choosing. This assignment will requi ...

Choose your roadmap to certification part 2 federal

Choose Your Roadmap to Certification Part 2: Federal Information Security Modernization Act (FISMA) Compliance In this assignment, students will review the federal work sector requirements and executives/organizations pr ...

Legal aspects of healthcare 3-4 sentences for each

Legal Aspects of Healthcare / 3-4 sentences for each question 1. Explain the differences between express and implied consent. Which type is more legally sound? Are express consents given by patients? If so, give an examp ...

Respectfully please see the structure for the program im

Respectfully, Please see the structure for the program I'm trying to write using Python. Below is how the program should be structured. 1. Program general structure: Function definitions should be at the top of the progr ...

Assignmentwrite on any topic related to technology security

Assignment Write on any topic related to technology security. (Choose one among these topics: Importance of Information security, Different types of Social Engineering attacks and how to overcome, IT Governance Planning ...

Ethics and information managementusing campbellsville

Ethics and Information Management Using Campbellsville University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please ...

Question 1 explain about the scenario planning challenges

Question : 1. Explain about the scenario planning challenges in disruptive Technologies? 2. What are the key traps to avoid when scenario planinng?

Part 1 200-250 words with referencesprovide an example of a

Part 1: 200-250 words with references Provide an example of a data warehouse model defining the grain, dimensions and facts of the data warehouse. Part 2: 200-250 words with references Identify the importance of selectin ...

Assignmentpart 1 create a question for a discussion

Assignment Part 1: Create a question for a discussion forum. Create a discussion question based on data warehouse. Part 2: 200-250 words with references Describe one unique and specific example where you would use Nonlin ...

Suppose host a wants to send a file of size f 1500 bytes

Suppose Host A wants to send a file of size F = 1500 bytes to Host B. The path from Host A to Host B has three links having rates R 1 = 500 kbps, R 2 = 1 kbps, and R 3 = 2 Mbps, respectively. Assume there is no other tra ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As