100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

MGMT 107 Final Exam Questions with Correct Answers Latest Update 2025/2026

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
04-12-2025
Written in
2025/2026

MGMT 107 Final Exam Questions with Correct Answers Latest Update 2025/2026 What does RFM stand for? - Answers Recency, Frequency, Money In unsupervised data mining, which step occurs first? - Answers search for patterns in the data Which of the following unsupervised decision tree analyses is least likely to raise ethical concerns? - Answers manufacturing defects in a factory RFM analyses are generally used by the ________ department - Answers marketing & sales Expert systems are created by codifying the knowledge of human experts into a set of... - Answers rules ________ tools share employee knowledge w/ other employees and customers - Answers knowledge management Suppose that the part number for a product has changed, but the data warehouse has not yet been updated with tis change. The data warehouse data is said to be... - Answers inconsistent A product benefits from network effects when the product's value to a user depends on the number of - Answers other users of the same product What is the main characteristic of an information good? - Answers the original is expensive to produce but copies can be made at virtually no cost Which of the following is a typical market for software-as-a-service? - Answers large international business Which of the following techniques determine sales patterns? - Answers market-basket analysis ________ occurs when someone deceived by pretending to be someone else - Answers pretexting ________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks. - Answers sniffing Which of the following is most likely to be a result of hacking? - Answers an unauthorized transaction from a user's credit card Which of the following is a critical security function that should be addressed by the senior management of an organization? - Answers establishing the security policy Which of the following statements is true of information systems? - Answers every information system has at least one application ________ set the stage for the requirements for any information systems and applications that need to be created or adapted. - Answers business process models The traditional process for developing information systems is ________ - Answers the systems development life cycle The ________ is a sequence of activities that determine the earliest date by which a project can be completed - Answers critical path The total number of points of work a team can accomplish in each scrum period is called ________ - Answers velocity ________ is defined as information containing patterns, relationships, and trends of various forms of data. - Answers business intelligence

Show more Read less
Institution
MGMT 107
Course
MGMT 107









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MGMT 107
Course
MGMT 107

Document information

Uploaded on
December 4, 2025
Number of pages
13
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MGMT 107 Final Exam Questions with Correct Answers Latest Update 2025/2026

What does RFM stand for? - Answers Recency, Frequency, Money

In unsupervised data mining, which step occurs first? - Answers search for patterns in the data

Which of the following unsupervised decision tree analyses is least likely to raise ethical
concerns? - Answers manufacturing defects in a factory

RFM analyses are generally used by the ________ department - Answers marketing & sales

Expert systems are created by codifying the knowledge of human experts into a set of... -
Answers rules

________ tools share employee knowledge w/ other employees and customers - Answers
knowledge management

Suppose that the part number for a product has changed, but the data warehouse has not yet
been updated with tis change. The data warehouse data is said to be... - Answers inconsistent

A product benefits from network effects when the product's value to a user depends on the
number of - Answers other users of the same product

What is the main characteristic of an information good? - Answers the original is expensive to
produce but copies can be made at virtually no cost

Which of the following is a typical market for software-as-a-service? - Answers large
international business

Which of the following techniques determine sales patterns? - Answers market-basket analysis

________ occurs when someone deceived by pretending to be someone else - Answers
pretexting

________ is a technique for intercepting computer communications through a physical
connection to a network or without a physical connection in the case of wireless networks. -
Answers sniffing

Which of the following is most likely to be a result of hacking? - Answers an unauthorized
transaction from a user's credit card

Which of the following is a critical security function that should be addressed by the senior
management of an organization? - Answers establishing the security policy

Which of the following statements is true of information systems? - Answers every information
system has at least one application

________ set the stage for the requirements for any information systems and applications that

, need to be created or adapted. - Answers business process models

The traditional process for developing information systems is ________ - Answers the systems
development life cycle

The ________ is a sequence of activities that determine the earliest date by which a project can
be completed - Answers critical path

The total number of points of work a team can accomplish in each scrum period is called
________ - Answers velocity

________ is defined as information containing patterns, relationships, and trends of various
forms of data. - Answers business intelligence

Which of the following statements is true of source data for a business intelligence (BI) system?
- Answers It refers to data that the organization purchases from data vendors.

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. -
Answers data acquisition

Which of the following is a fundamental category of business intelligence (BI) analysis? -
Answers data mining

Push publishing delivers business intelligence ________. - Answers according to a schedule or

as a result of an event or particular data condition

________ requires the user to request business intelligence (BI) results. - Answers Pull Publishing

In large organizations, a group of people manage and run a(n) ________, which is a facility for
managing an organization's BI data. - Answers data warehouse

________ refers to the source, format, assumptions and constraints, and other facts about the
data. - Answers metadata

Problematic operational data is termed as ________. - Answers dirty data

________ is a term that refers to the level of detail represented by the data. - Answers Granularity

Which of the following statements is true about operational data? - Answers Purchased

operational data often contains missing elements.

Which of the following phenomena states that the more attributes there are, the easier it is to
build a model that fits the sample data? - Answers curse of dimensionality

A ________ takes data from the data manufacturers, cleans and processes the data, and locates
the data on the shelves. - Answers data warehouse

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
344
Member since
1 year
Number of followers
16
Documents
28821
Last sold
6 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

54 reviews

5
18
4
14
3
12
2
0
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions