The information systems used by customer relationship management (CRM) are often ________.
A) outdated
B) unified
C) fragmented
D) redundant
Q. 2Projects focused on explicit knowledge and structural capital, much of which is in electronic form and scattered across different formats and media types, are worsened by the ease of copying and editing electronic files because different versions
contain inconsistent information. This problem is referred to as ________.A) reliability
B) accessibility
C) exclusivity
D) redundancy
Q. 3Which of the following is a function of forecasting?
A) setting a target value and telling the program which variable to change to reach the goal
B) using semantic structures and linguistic relationships to extract meaningful business intelligence
C) calculating relationships between variables and allowing users to change some variables to see how others are impacted by it
D) analyzing seasonal trends, using statistical decision support tools, to predict the future
Q. 4Which of the following is an example of a disruptive innovation?
A) LCD monitors replaced CRT monitors in televisions.
B) Apple launched iPhone 4 replacing iPhone 3.
C) Ford introduced small cars for the middle class.
D) Land Rover markets most of its four-wheel drives in high-altitude regions.
Q. 5________ helps organizations classify user-generated content as pro, con, or neutral toward the company or product.
A) Predictive analytics
B) Affective computing
C) Polarity item-analysis
D) Sentiment analysis
Q. 6________ refers to analyzing historical and seasonal trends and then taking into account existing and predicted business conditions to estimate some variable of interest.
A) Optimization
B) What-if analysis
C) Forecasting
D) Goal-seeking analysis
Q. 7Which of the following statements is true about biometric authentication?
A) It uses personal physical characteristics for authentication.
B) It is less invasive than other methods of authentication.
C) It uses a microchip loaded with identifying data to authenticate users.
D) It provides weak authentication compared to other methods.