Question
Hi. 11.Legacy systems are a. old manual systems that are still in place. b. flat file mainframe systems developed before client-server computing became standard. c.
Hi.
11.Legacy systems are
a.
old manual systems that are still in place.
b.
flat file mainframe systems developed before client-server computing became standard.
c.
stable database systems after debugging.
d.
advanced systems without a data warehouse.
12. A data mart is
a.
another name for a data warehouse.
b.
a database that provides data to an organization's customers.
c.
an enterprise resource planning system.
d.
a data warehouse created for a single function or department.
13.Most ERPs are based on which network model?
a.
peer to peer
b.
client-server
c.
ring topology
d.
bus topology
14.On-line transaction processing programs
a.
are bolt-on programs used with commercially available ERSs.
b.
are available in two models-two-tier and three-tier.
c.
handle large numbers of relatively simple transactions.
d.
allow users to analyze complex data relationships.
15.Supply chain management software
a.
is typically under the control of external partners in the chain.
b.
links all of the partners in the chain, including vendors, carriers, third-party firms, and information systems providers.
c.
cannot be integrated into an overall ERP.
d.
none of the above
16.The setup of a data warehouse includes
a.
modeling the data
b.
extracting data from operational databases
c.
cleansing the data
d.
all of the above
17.Extracting data for a data warehouse
a.
cannot be done from flat files.
b.
should only involve active files.
c.
requires that the files be out of service.
d.
follows the cleansing of data.
18.Data cleansing involves all of the following except
a.
filtering out or repairing invalid data
b.
summarizing data for ease of extraction
c.
transforming data into standard business terms
d.
formatting data from legacy systems
19.Separating the data warehouse from the operations databases occurs for all of the following reasons except
a.
to make the management of the databases more economical
b.
to increase the efficiency of data mining processes
c.
to integrate legacy system data into a form that permits entity-wide analysis
d.
to permit the integration of data from diverse sources
-it
20.Closed database architecture is
a.
a control technique intended to prevent unauthorized access from trading partners.
b.
a limitation inherent in traditional information systems that prevents data sharing.
c.
a data warehouse control that prevents unclean data from entering the warehouse.
d.
a technique used to restrict access to data marts.
e.
a database structure that many of the leading ERPs use to support OLTP applications.
-it
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started