100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MBA 6207 – MIDTERM || Already Passed. $13.49   Add to cart

Exam (elaborations)

MBA 6207 – MIDTERM || Already Passed.

 6 views  0 purchase
  • Course
  • MBA 6207
  • Institution
  • MBA 6207

The article refers to a study that found that less than __________ of an organization's structured data is actively used in making decisions 50% 35% 19% 1% correct answers 50% What is the average tenure of Chief Data Officers according to Gartner? 25 years 11.9 years 2.4 years 6.4 ye...

[Show more]

Preview 3 out of 26  pages

  • August 20, 2024
  • 26
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MBA 6207
  • MBA 6207
avatar-seller
FullyFocus
MBA 6207 – MIDTERM || Already Passed.
The article refers to a study that found that less than __________ of an organization's structured
data is actively used in making decisions

50%
35%
19%
1% correct answers 50%

What is the average tenure of Chief Data Officers according to Gartner?

25 years
11.9 years
2.4 years
6.4 years correct answers 2.4 YEARS

Data defense is about __________.

Increasing internet self-service
Supporting business objectives such as increasing profitability
Minimizing downside risk
Using middleware to translate data from one system to another correct answers Minimizing
downside risk

__________ governs the processes and rules that convert data into useful information.

Information assurance
Information architecture
Information governance
Master data management correct answers Information architecture

What is a logical repository that contains one authoritative copy of all crucial data, such as
customer, supplier, and product details called in the article?

Automated data tiering
Centralized, control-oriented approach
Primary key
Single source of truth correct answers Single source of truth

Optimizing data analytics, modeling, visualization, transformation, and enrichment are the core
activities in the __________.

Offensive approach to data strategy
Defensive approach to data strategy
Array-based replication approach to data backup

,Solution development and integration correct answers Offensive approach to data strategy

What does business-specific transformation of data into information, that is data permeated with
relevance and purpose produce?

Single source of truth
Business case development
Multiple versions of truth
Decoupling of business processes from the underlying IT applications correct answers Multiple
versions of truth

When companies adopt a SSOT-MVOT data architecture, teams across the organization store the
data they use in siloed repositories.
True
False correct answers False

What is the primary challenge highlighted by the authors that will lead to a company's overall
data strategy?

To assess the current business processes, data sources, data assets, capabilities, and policies

To establish the trade-offs between defense and offense to ensure the best balance.

To segment objects such as users into groups based on similar properties

To apply social analytics to measure the vast amount of non-transactional data correct answers
To establish the trade-offs between defense and offense to ensure the best balance.

What is a key issue addressed by the framework for building a powerful data strategy by the
authors?

Identify the potential added value of IT service suppliers.

Link experimentation and innovation to customer value.

Separate data from internet to create greater flexibility.

Guide companies in strategic data management. correct answers Guide companies in strategic
data management.

What are web cookies?

Part of the computer that speeds processing by executing specific types of instructions
Method for transferring large media files over the internet
Small pieces of information websites store on computer when the computer visits the website

, Web data that combines two or more tables correct answers Small pieces of information websites
store on computer when the computer visits the website

Which of the following is a technique of web marketers that consumers dislike?

Establishing information stewardship and building information standards
Using information obtained on a third-party website rather than the site on which the ad appears
Using information that the consumer provided to the website
Piling up consumer information at the cost of human capital and financial capital correct answers
Using information obtained on a third-party website rather than the site on which the ad appears

What incident backfired on Target stores when the retail chain started sending promotions to
consumers based on individual shoppers' consumption data?

Target sent coupons for maternity-related products to a teenager whose father was outraged.
Target stores were overrun by shoppers wanting to use a coupon that offered lifetime supply of
maternity-related products.
Target was in Russian face news that Donald Trump had purchased the chain.
Target's online coupons were infected with malware that destroyed data on online shoppers'
devices. correct answers Target sent coupons for maternity-related products to a teenager whose
father was outraged.

What did a study related to the enforcement of the Dutch law requiring websites to inform
visitors of covert tracking reveal?

Rise in app maintenance costs reversed.
Consumers clicked on more advertisements than the year before
Click-through rates soared for display campaigns while dropping for Google shopping
campaigns.
Advertisement click-through rates dropped. correct answers Advertisement click-through rates
dropped.

Which is true regarding consumers' personal information changing hands?

Most consumers dislike sharing any personal information, whether in first-0person or in second-
person.
While people may be comfortable with their information being shared behind their back, they
feel uneasy sharing that information directly.
While people may be at ease with third-party sharing of their personal information, they may
object to directly disclosing the same information.
While people may be comfortable disclosing personal information directly, they may get upset
when that information is shared without their knowledge. correct answers While people may be
comfortable disclosing personal information directly, they may get upset when that information
is shared without their knowledge.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart