978-0134601533 Appendix J Part 1

subject Type Homework Help
subject Pages 9
subject Words 2593
subject Authors David Auer, David M. Kroenke, Scott L. Vandenberg

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Database Concepts, 8e (Kroenke)
Appendix J Business Intelligence Systems
1) Business Intelligence (BI) systems are information systems that help users analyze and use
data.
2) Business Intelligence (BI) systems support operational activities.
3) Business Intelligence (BI) reporting systems are used to filter data, sort data, group data and
make simple calculations based on the data.
4) Business Intelligence (BI) reporting systems can analyze data using standard SQL.
5) BI reporting systems summarize the current status of business activities and compare that
status with past events but not with predicted future activities.
page-pf2
6) Data Mining uses sophisticated statistical and mathematical techniques to perform what-if
analyses, to make predictions, and to facilitate decision making.
7) Report delivery is more important for data mining than it is for reporting systems.
8) Business Intelligence (BI) systems do which of the following?
A) Analyze current and past activities
B) Predict future events
C) Record and process transactions
D) Both A and B
E) Support operational activities
9) Business Intelligence (BI) systems fall into which of the following categories?
A) Processing
B) Reporting
C) Data mining
D) Both A and B
E) Both B and C
page-pf3
10) Data mining applications are used to accomplish all except which of the following tasks?
A) Creating reports
B) Perform what-if analysis
C) Make predictions
D) Facilitate decision making
E) Perform data analyses using complex mathematical processing
11) The metadata maintained by a reporting system database describes all of the following
except ________.
A) reports
B) users
C) database relations
D) roles
E) groups
12) A report generated by a reporting system is delivered to the appropriate users via a printed
report. This system uses which of the following report modes?
A) Push
B) Pull
C) Query
D) OLAP
E) None of the above
13) A(n) ________ is an information system that helps users analyze and use data.
page-pf4
14) Business Intelligence (BI) systems fall into two broad categories: ________ and ________.
15) An extract, transform, and load (ETL) system obtain data from ________, external data, and
other internal data.
16) What are Business Intelligence (BI) systems?
17) Data mining is the application of mathematical and statistical techniques to find patterns and
relationships that can be used to classify and predict.
18) Most data mining techniques are simple and easy to use.
page-pf5
19) In unsupervised data mining, explanations are created after patterns are found.
20) In unsupervised data mining, a model or hypothesis is created ahead of time.
21) In supervised data mining, statistical techniques are used to estimate the parameters of the
model.
22) Cluster analysis is a commonly used technique in supervised data mining.
23) Which of the following are true about data mining applications?
A) They use sophisticated mathematical techniques.
B) They use sophisticated statistical techniques.
C) Their report delivery is more difficult than report delivery for reporting systems.
D) Both A and B
E) The results are never incorporated into some other report.
page-pf6
24) A data warehouse database differs from an operational database because ________.
A) data warehouse data are not stored in tables
B) data warehouse databases do not have metadata
C) data warehouse data are often stored in a dimensional database
D) Both B and C
E) None of the above
25) Data mining techniques are used to find patterns and relationships that can be used to
________.
A) report
B) classify
C) predict
D) Both B and C
E) None of the above
26) Which of the following is a common unsupervised data mining technique?
A) Cluster analysis
B) Regression analysis
C) RFM analysis
D) Both A and B
E) Neural Networks
page-pf7
27) Which of the following is a common supervised data mining technique?
A) Cluster analysis
B) Regression analysis
C) RFM analysis
D) Both A and B
E) Market Basket Analysis
28) Which of the following popular data mining techniques require special software?
A) Decision tree analysis
B) Logistic regression analysis
C) Neural networks
D) Both A and B
E) A, B and C
29) Business Intelligence (BI) ________ uses sophisticated statistical and mathematical
techniques to perform what-if analyses, to make predictions, and to facilitate decision making.
30) What is data mining application?
page-pf8
31) A data warehouse is a database system that has data and programs for, as well as personnel
specialized in, BI processing.
32) Data warehouses are populated with data prepared by extract, transform, and load (ETL)
systems.
33) Problematic data include so-called "dirty data."
34) A data mart is a collection of data that addresses a particular component or functional area of
a business.
35) We have obtained access to the company's operational data. In one record, we find that a
customer's age has been recorded as "337." This is an example of ________.
A) dirty data
B) inconsistent data
C) non-integrated data
D) a "wrong format" problem
E) a "too much data" problem
page-pf9
36) We have obtained access to the company's operational data. We examine 50 records for
customers with phone numbers that should use the current area code of 345. Of these 50 records,
we find 10 that still use an older area code of 567. This is an example of ________.
A) dirty data
B) inconsistent data
C) non-integrated data
D) a "wrong format" problem
E) a "too much data" problem
37) We have obtained access to the company's operational data. We have been asked to produce
a report with an item by item analysis of sales, but the only sales figure available is the total sale
value for each order. This is an example of ________.
A) dirty data
B) inconsistent data
C) non-integrated data
D) an incorrect format problem
E) a "too much data" problem
38) The combination of a data mart structure with a data warehouse architecture is known as an
________ data warehouse.
A) enterprise
B) entrepreneurial
C) encompassing
D) eclectic
E) integrated
39) Problematic data are called ________.
page-pfa
40) Data warehouse data is often stored in a(n) ________.
41) Data warehouses are populated with data prepared by ________ programs.
42) A(n) ________ is a collection of data that addresses a particular component or functional
area of a business.
43) Why is operational data sometimes unusable for Business Intelligence purposes?
page-pfb
44) What is a data warehouse?
45) What is a star schema?
46) In a decision tree, there will be only one root in the tree.
47) Decision trees are widely used today, because the exact process used to build a decision tree
is simple and straightforward.
48) Market basket analysis is a data mining technique for determining which sets of products
customers tend to purchase at the same time.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.