PACK LIPS

Is this your test? Login to manage it. If not, you can develop a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Clustering is a method of Data Mining Analysis related to identifying a pattern of two events that commonly occur in pairs but at different times
2.
1 point
preventing sender from denying that he has sent a message
3.
1 point
_________ contains all three elements of the “Triple Constraint”
4.
1 point
All of the following are Innovation zones except
5.
1 point
_______ is a term that describes the method of doing business by which a company sustains itself
6.
1 point
Data Mining Methods: Identifying instances where one event is closely followed with another
7.
1 point
Data Mining Methods: Identifying instances where one event is closely associated with another (ex: website suggesting other purchases like yours)
8.
1 point
In the decision support process, formulating a module to be evaluated and setting criteria for making a choice would occur during the _________ phase
9.
1 point
____________- are physical properties of an object that allow someone to use an object correctly w/o need for labels or instructions
10.
1 point
Data Mining Methods: identifying data with geographic (physical) or temporal (time) proximity
11.
1 point
TIME, Resources, and scope are
12.
1 point
Personalization, Profiling, Custom behavior patterns, Assessing the needs of the customers are examples of
13.
1 point
examples: intranets and employee portals
14.
1 point
IPS and URLS: What an object is
15.
1 point
_________ is a financial reporting document providing a financial snapshot of a company at a given point in time with respect to assets, liabilities and shareholder equity
16.
1 point
Managerial decisions that focus on the execution of commonly occurring tasks are part of __________ category of decision
17.
1 point
Types of Knowledge:subjective and cognitive
18.
1 point
ON balance sheet Total assets - Total liabilities must equal
19.
1 point
protecting data from unauthorized users
20.
1 point
Data Mining Methods: use of demographic characteristics (ex: sex, age, race, income, education)
21.
1 point
forms the “mental model” of a design’s system user interface
22.
1 point
Removes time as a barrier to communication
Removes geography as a barrier to relationships
Removes intermediaries from relationships
Removes barriers to new competitors
--Are all traits of
23.
1 point
Routing depends on
24.
1 point
Tier 3 in internet structure represents
25.
1 point
Category Renewal can consist of
26.
1 point
_________ is the portion of a company’s profit allocated to each outstanding share of a common stock
27.
1 point
Product Leadership could consist of
28.
1 point
assuring that data is received as it is sent without modification
29.
1 point
this concept is connecting identity, metadata, and relationships being discussed as most closely associated with the emerging field of commerce
30.
1 point
examples: include tax filing, driver’s license renewal, permits, licenses, etc.
31.
1 point
Activities such as approving a loan application, contract negotiation, recruiting for a new position, & developing new technology can all be described as a type of
32.
1 point
Tier 2 in internet structure represents
33.
1 point
All of these are Design Phases except
34.
1 point
examples: include child support filing, criminal offender information; Homeland Security reporting,
35.
1 point
Customer service, call centers, sales force automation
36.
1 point
Type of innovation that focuses on the supply side looking for opportunities to remove non-value adding steps from the workflow
37.
1 point
Short range waves are
38.
1 point
______ is a feature of an object that limits possible (often incorrect) uses of a device
39.
1 point
Types of Knowledge: Objective and rational
40.
1 point
Data Mining Methods: Using historical information to predict future events based on statistical models (ex: estimating mortgage defaults based on projected interest rates)
41.
1 point
As discussed by Dr. Gillidand, the classic values conflict “Who Am I” represents
42.
1 point
assure that the source of received data is as claimed
43.
1 point
Which of the following is NOT one of the guiding principles of accessibility
44.
1 point
A hacked email is a part of the ______ category of a security exploit.
45.
1 point
examples: include UCC filing, tax filing, permits, professional
46.
1 point
Which is not a part of the Knowledge Management Cycle
47.
1 point
________ is also known as cause and effect diagram
48.
1 point
______ is the detection, characterization, and exploitation of actionable patterns
49.
1 point
________ is the market-oriented mechanism for advancing the value proposition of innovation
50.
1 point
IPS and URLS: Where and object is