Browse Definitions :
Quiz

Business Intelligence Trends and Technologies (Quiz)

What's all the buzz in BI? This business intelligence quiz tests your knowledge of the new approaches to dealing with business data and new technologies that enable them.  

1. Although this term is often used interchangeably with Business Intelligence, Business _________ reflects a more complex and exploratory approach to dealing with business data. For example, BI might answer the question “What happened?” and B_ might answer the question "Why did it happen?"
Answer

2. ____ -____ analytics is the use of, or the capacity to use, all available enterprise data and resources when they are needed. It enables dynamic analysis and reporting, based on data entered into a system less than one minute before the actual time of use.
Answer

3. In-memory analytics enables much faster data access and query times because data to be analyzed is stored in ____ rather than on the hard disk.
Answer

4. In the ________-__-_-_______ (SaaS) BI model, applications are typically deployed outside of a company’s firewall at a hosted location and accessed by an end user with a secure Internet connection. (This model is also known as cloud BI or on-demand BI.)
Answer

5. A data warehouse ________ comes with its own operating system, storage, database management system (DBMS) and software, allowing the purchaser to deploy a high-performance data warehouse right out of the box.
Answer

6. _________ Analytics (PA) is the branch of data mining concerned with discovering patterns in data that can lead to reasonable assumptions about the future. Marketers might use it to design a campaign targeting teenagers; insurers might use it to assign risk factors to teenage drivers.
Answer

7. In-database analytics works by moving compute-intensive BI functions, such as reporting analysis and data mining, to an __________ ____ _________ (EDW) built on an analytic database platform.
Answer

8. Instead of selling traditional software licenses, ____ _____ Business Intelligence (OSBI) vendors charge for support, documentation and code that's been fine-tuned for specific implementations.
Answer

9. Many vendors are looking to Hadoop, an open source programming framework from the _______ Foundation, for applications involving analysis of very high volumes of data, social media analytics and text mining.
Answer

10. Processing in memory (PIM) enables dynamic querying of business data and immediate results because the device's ________ is integrated into the memory chip, reducing latency.
Answer

This was last updated in January 2011
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close