Browse Definitions :
Quiz

Quiz: Business Intelligence

How to take the quiz:
- After reading the question, click on the answer that you think iscorrect to go to the whatis.com definition. If the answer you've chosenis correct, you will see the question text (or a paraphrase of it) somewhere in the definition.
OR
- After reading the question, write down the letter of your answerchoice on scrap paper. Check your answers by using the answer key at the end of the quiz, where you'll also find additional resources related to the correct answer.

1. This is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.
a. customer managed relationship
b. data mining
c. permission marketing
d. one-to-one marketing
e. batch processing

2. In an Internet context, this is the practice of tailoring Web pages to individual users' characteristics or preferences.
a. Web services
b. customer-facing
c. client/server
d. customer valuation
e. personalization

3. This is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
a. clickstream analysis
b. database marketing
c. customer relationship management
d. CRM analytics
e. B2C

4. This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions.
a. best practice
b. data mart
c. business information warehouse
d. business intelligence
e. business warehouse

5. This is a systematic approach to the gathering, consolidation, and processing of consumer data (both for customers and potential customers) that is maintained in a company's databases.
a. database marketing
b. marketing encyclopedia
c. application integration
d. service oriented integration
e. business technology management

6. This is an arrangement in which a company outsources some or all of its customer relationship management functions to an application service provider (ASP).
a. spend management
b. supplier relationship management
c. hosted CRM
d. Customer Information Control System
e. online transaction processing

7. This is an XML-based metalanguage developed by the Business Process Management Initiative (BPMI) as a means of modeling business processes, much as XML is, itself, a metalanguage with the ability to model enterprise data.
a. Biztalk
b. BPML
c. e-biz
d. ebXML
e. ECB

8. This is a central point in an enterprise from which all customer contacts are managed.
a. contact center
b. help system
c. multichannel marketing
d. call center
e. help desk

9. This is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests, spending habits, and so on.
a. customer service chat
b. customer managed relationship
c. customer life cycle
d. customer segmentation
e. change management

10. In data mining, this is a technique used to predict future behavior and anticipate the consequences of change.
a. predictive technology
b. disaster recovery
c. phase change
d. Digital Silhouettes
e. predictive modeling

SCROLL DOWN FOR ANSWER KEY

















See the rest of our quiz topics
Answer Key:

1.)

c. permission marketing
Jon Panker's article looks at how the "'Do not call' list changes game for marketers."

2.) e. personalization
SearchCRM offers a selection of Best Web Links for Personalization.

3.) d. CRM analytics
SearchCRM.com has more information in their Featured Topic, Crash Course: Analytics.

4.) d. business intelligence
Jacqueline Sweeney-Coolidge's article explains "Data warehousing and business intelligence" in greater detail.

5.) a. database marketing
According to Michael Lowenstein's article, "It's really (almost) all about the data: Optimizing loyalty initiatives."

6.) c. hosted CRM
Jen Hubley's article explores the question about "CRM: Should you implement or be hosted?"

7.) b. BPML
There's more information on the BPMI Web site.

8.) a. contact center
For more information, see SearchCRM.com's "Special report: Contact center strategies."

9.) d. customer segmentation
This article explains how "Customer segmentation contributes to the bottom line."

10.) e. predictive modeling
Michael Lowenstein's article describes "Modeling modelers in predictive churn."

This was last updated in August 2008
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close