215

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a customer touch point?

Telephone contact Email Physical interactions with customers All of the above

What is the first step in the general framework for ethics?

Evaluating alternative actions Recognize an ethical issue Obtain the facts Make a decision

A(n) ___ agent constantly observes and reports on some item of interest.

Predictive User Personal Information

Which is not a fundamental tenets of ethics?

Responsibility Accountability Accessibility Liability C What techniques are provided by R? Linear and nonlinear modeling classification Clustering all of the above D

True or False: Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior

True FALSE

Using apps on your smart phones that broadcast your location to others is a harmless act.

Ture FALSE

Electronic Surveillance is conducted by

employers the government both A and B None of the Above C R Provides the Following: linear and non-linear modeling classical statistical tests time-series analysis All the Above D

What are the CRM system's application for an organization's marketing department?

enable marketers to identify and target their best customers to manage marketing departments to generate quality leads for the sales team All of the above

What are the CRM system's application for an organization's marketing department?

enable marketers to identify and target their best customers to manage marketing departments to generate quality leads for the sales team All of the above D Malicious software consists of programming Code Scripts Active content All of the above D

Which of the following is not a characteristic of data warehouses or subject?

integrated organized by business dimension or subject nonvolatile processed online as they occur

Which of the following is not a characteristic of data warehouses or subject?

integrated organized by business dimension or subject nonvolatile processed online as they occur D Data that is located at a single site is which type of database? operational database distributed database centralized database data warehouse C

What happens when various copies of the same data do not agree?

Data inconsistency Data isolation Data redundancy Data integrity A Which is NOT an advantage of the database management system? better data integration improved data security improved data access maximized data inconsistency D

It is very difficult to manage data for which of the following reasons?

Data security is easy to maintain. Data are scattered throughout organizations. The amount of data stays about the same over time. Data are stored in the same format throughout organizations.

It is very difficult to manage data for which of the following reasons?

Data security is easy to maintain. Data are scattered throughout organizations. The amount of data stays about the same over time. Data are stored in the same format throughout organizations. B The management of data across the entire organization is most accurately defined as: data integration data governance data control data administration B

The term "data rot" refers to:

Data that are irrelevant or contain errors. The deterioration of the medium on which the data are stored. Data that no longer serve a purpose. All of these

What to DBSM stand for?

Database Management System Database Managerial Sign Database Micromanagement System Database Mainframe System

What to DBSM stand for?

Database Management System Database Managerial Sign Database Micromanagement System Database Mainframe System A What is one of the major parts of a database system? Hardware Software People Procedures and Data all of the above D

What type of file does the (base) need to upload datasheet in RSTUDIO?

.java .jpeg .png .csv

What type of file does the (base) need to upload datasheet in RSTUDIO?

.java .jpeg .png .csv D which is NOT a type of threat? malware trojan spyware byte D

Which of the following is not a type of report?

Drill-down Comparative Advanced Key-indicator

Which of the following is not a type of report?

Drill-down Comparative Advanced Key-indicator C When creating powerpoint presentations, one should avoid ____________? Appropriate pictures/visual aids Long text Simplicity uniform font style/size B

Which one is a software

Drive mouse word monitor

Which one is a software

Drive mouse word monitor C What segment of the supply chain involves packaging, assembly, or manufacturing? Upstream Internal lowstream all above B

What does CRM stand for?

Central Relationship Managing Customer Real Management Customer Relationship Management Consumer Relationship Management

What does CRM stand for?

Central Relationship Managing Customer Real Management Customer Relationship Management Consumer Relationship Management C What does OLAP stand for? Online Learning Application Program Online Linguistic Analytical Processing Online Analytical Program Online Analytical Processing D

Which of the following is NOT a common type of database?

Centralized Database Distributed Database Information Base Data Warehouse

Which of the following is NOT a common type of database?

Centralized Database Distributed Database Information Base Data Warehouse C Which of the following statements is/are true regarding Data and Information? Information is unprocessed raw facts Data is the result of processing raw information to give meaning and add context Both A and B None of the above D

Which one is not an essencial stage of the data warehousing?

Cleansing extracted data Transforming data into the database model Loading the data into de data warehouse database Modeling data for the data warehouse

Corporate databases are an example of a(n) _________ source of data.

Clickstream External Internal Personal C __________________________ is an approach to managing information across an entire organization. Big Data Data governance Master data Master data management B

Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?

Cookies Spamware Adware Spyware

Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?

Cookies Spamware Adware Spyware B R Studio is A programming language that is used for statistical modeling and computing Used widely in research and very valued in business Case sensitive All of the above D

Two Main ERP Applications

Core applications Business analysis applications Both A & B Non of these above.

Two Main ERP Applications

Core applications Business analysis applications Both A & B Non of these above. C What is CRM? Customer Relationship Management Cost Relationship Management Cost Relationship Manner None of these above A

What are the two main ERP applications?

Core applications Business analysis applications online applications online applications

What are the two main ERP applications?

Core applications Business analysis applications online applications online applications D What are the two main ERP applications? Core applications Business analysis applications online applications Both a and b D

The component of an operational CRM system that automatically records all of the components in a sales transaction process.

Customer-facing CRM applications Electronic CRM Salesforce automation Interorganizational information system

What happens when various copies of the same data do not agree?

Data inconsistency Data isolation Data redundancy Data integrity

The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives needed to achieve the organization's goals.

IT strategic plan ITea strategic plan IT status poll LR IT

What are the basic roles that all managers must perform?

Interpersonal Roles Informational Roles Decisional Roles All of the Above

What are the basic roles that all managers must perform?

Interpersonal Roles Informational Roles Decisional Roles All of the Above D Generally speaking, how many bits are in one byte usually? 2 4 8 12 C

Which of the manager's roles do modern information systems support?

Interpersonal Roles Informational Roles Decisional Roles All of these

Which of the manager's roles do modern information systems support?

Interpersonal Roles Informational Roles Decisional Roles All of these D Which of the following are included as basic programming concepts? Variables and Assignments Functions Loops All of these D

Which of the following is FALSE regarding Big Data?

It can come from untrusted sources It can be dirty (inaccurate, incomplete, incorrect, etc.) It can change rapidly It doesn't assist in understanding the market and the data driven marketing potential

Which of the following is FALSE regarding Big Data?

It can come from untrusted sources It can be dirty (inaccurate, incomplete, incorrect, etc.) It can change rapidly It doesn't assist in understanding the market and the data driven marketing potential D Which of the following statements is FALSE? Good decisions require good information derived from raw facts Data is managed most efficiently when it is stored anywhere BUT a database Databases evolved from computer file systems Understanding file system characteristcs is important B

Which of the following is not true about the three objectives that the IT strategic plan must meet?

It must be aligned with the organization's strategic plan. It must analyze the need for applications and then justify each purchase in regard to costs and benefits. It must provide for an IT architecture that seamlessly networks users, applications, and databases. It must efficiently allocate IS development resources among competing projects so that the projects can be completed on time and within budget and still have the required functionality.

Which of the following is not true about the three objectives that the IT strategic plan must meet?

It must be aligned with the organization's strategic plan. It must analyze the need for applications and then justify each purchase in regard to costs and benefits. It must provide for an IT architecture that seamlessly networks users, applications, and databases. It must efficiently allocate IS development resources among competing projects so that the projects can be completed on time and within budget and still have the required functionality. B ______ is the value of a network grows roughly in line with the square of the number of its users? Pilkington Moore's Law Truserv Metcalfe's Law D

How does IT impact health and safety?

Job stress Repetitive strain injuries Carpal tunnel syndrome All of the above

How does IT impact health and safety?

Job stress Repetitive strain injuries Carpal tunnel syndrome All of the above D What does Plant Science not cover? Genetics Data Modeling Computer Science Crop Related Technologies C

________ reports contain special information not found in routine reports?

Key-indicator Ad Hoc Summary All of the above

________ reports contain special information not found in routine reports?

Key-indicator Ad Hoc Summary All of the above B Out of the 6s in Powerpoint which one is false? Speed Story Schedule Successful D

The reasons why so many IS software development projects do not deliver their potential value include all of the following except:

Lack of sufficient planning Management's failure to provide the necessary resources Poorly defined project scope Poor definition of user requirements

The reasons why so many IS software development projects do not deliver their potential value include all of the following except:

Lack of sufficient planning Management's failure to provide the necessary resources Poorly defined project scope Poor definition of user requirements D Which is NOT an old type of photography? SLR DSLR Film Dark Room B

Which of the following are advantages of the buy option for acquiring IS applications?

Many different types of off-the-shelf software are available Software can be tried out It saves time All of the above

Which of the following are advantages of the buy option for acquiring IS applications?

Many different types of off-the-shelf software are available Software can be tried out It saves time All of the above D The internet is designed to aid with the following: Discovery Communication Collaboration All of the above D

which on is not the Advantages of the buy options

Many different types of off-the-shelf software are available. The company can try out the software before purchasing it. The company can save much time by buying rather than building. The company can refund what it is getting after it fails to invests in the product.

which on is not the Advantages of the buy options

Many different types of off-the-shelf software are available. The company can try out the software before purchasing it. The company can save much time by buying rather than building. The company can refund what it is getting after it fails to invests in the product. D What did Moore's law predict Predicted in 1965 that the processing power of silicon chips would double every 18 months Predicted in 1965 that the processing power of silicon chips would triple every 18 months Predicted in 1955 that the power of silicon chips would double every year Predicted in 1965 that the processing power of silicon chips would double every 3 months A

What is an application service provider?

an agent or a vendor who assembles the software needed by enterprises and then packages it with services such as development, operations, and maintenance a software seller a hardware seller an app service

The two major components of operational CRM systems are

customer-facing operations; customer-reading operations customer-touching operations; customer-reading operations customer-facing operations; customer-touching operations customer-service operations; customer-touching operations

The two major components of operational CRM systems are

customer-facing operations; customer-reading operations customer-touching operations; customer-reading operations customer-facing operations; customer-touching operations customer-service operations; customer-touching operations C The console in R is where you can type commands and see outputs where all the active objects are shown where all the graphs are shown where you go if you need additional information A

The management of data across the entire organization is most accurately defined as:

data governance data integration data administration data control

What type of sources is data generated from?

internal personal external all the above

What type of sources is data generated from?

internal personal external all the above D What are advantages of DBMS Improved data sharing poor data security maximized data inconsistency none of these A

Which of the following is an advantage of of prototyping?

helps clarify user requirements promotes genuine user participation may produce final part of the final system all of the above

Which of the following is an advantage of of prototyping?

helps clarify user requirements promotes genuine user participation may produce final part of the final system all of the above D Which of the following is not an old technology adaptation for photography? SLR film photoshop dark room C

What is big data composed of?

high-volume high-velocity high-variety all of the above

What is big data composed of?

high-volume high-velocity high-variety all of the above D what is/are the advantage(s) of DBMS? improved data sharing better data integration increase end-user productivity all of the above D

As systems age, maintenance costs _____.

increase decrease stay constant cannot be controlled

As systems age, maintenance costs _____.

increase decrease stay constant cannot be controlled A _____ is a software development methodology that delivers functionality in rapid iterations, usually measured in weeks. Joint application design Agile development Service-level agreements End-user development B

Which of these is not a step in the decision making process?

intelligence design choice testing

Which of these is not a step in the decision making process?

intelligence design choice testing D Which of these are not in the R environment? console workspace history cell arrangement D

Which of the following is not a part of the three step process a decision maker goes through?

intelligence design programming choice

Which of the following is not a part of the three step process a decision maker goes through?

intelligence design programming choice C Which of the following is not part of programming work flow? write code in an editor program compile the code run the program find the code D

Which statement about malware is correct?

malicious software consists of programming designed to disrupt or deny operation all of the above

Which is NOT one of the four most common approaches to cost-benefit analysis?

Net present value method Return on Investment Cumulative dollar method Business Case Approach

Which is NOT one of the four most common approaches to cost-benefit analysis?

Net present value method Return on Investment Cumulative dollar method Business Case Approach C Which of the following helps users stay connected with similar professionals within their organization? Management Systems Collaborative workgroups Online reference Training B

A standardized language used to manipulate data is _________.

None of these MS-Access Query-by-example language Oracle

Which of the following is a BA tool in prescriptive analytics?

Optimization Simulation Decision Trees all of the above

Which of the following is a BA tool in prescriptive analytics?

Optimization Simulation Decision Trees all of the above D Which of the following is a basic programming concept? Functions Algorithms Loops all of the above D

What is the major benefit of ERP systems?

Organizational flexibility and agility Decision support Quality and efficiency All above

What is a capability performed relatively better by AI than human intelligence?

Reasoning Total cost of knowledge Creativity Use of sensory experiences

What is a capability performed relatively better by AI than human intelligence?

Reasoning Total cost of knowledge Creativity Use of sensory experiences B What various statistical and graphical techniques does R provide? Linear and nonlinear modelling Classical statistical tests Time-series analysis All of the above D

What are the general framework for ethics?

Recognize an ethical issue Get the facts all the above none of the above

What are the general framework for ethics?

Recognize an ethical issue Get the facts all the above none of the above C R studio is a language and environment for statistical computing and graphics? TRUE FALSE A

Which of these tasks for business partners are enabled interorganizational information systems?

Reduce the costs of routine business transactions Improve the quality of the information flow by reducing or eliminating errors Compress the cycle time involved in fulfilling business transactions All the above

Which ethical framework provides the most good or does the least harm?

Rights approach Fairness approach Common good approach Utilitarian approach

Which ethical framework provides the most good or does the least harm?

Rights approach Fairness approach Common good approach Utilitarian approach D What statistical and graphical techniques does R provide? linear and nonlinear modeling time-series analysis clustering all of the above D

What is included in a spreadsheet?

Rows Columns Cells All of the above

What is included in a spreadsheet?

Rows Columns Cells All of the above D Which of the following uses data management? Businesses Research Administration All of the above D

What is (are) the key feature of ERP?

Smooth and seamless flow of information across organizational boundaries Standardized environment with shared database independent of applications and integrated applications Neither of them is correct Both of them are correct

What is (are) the key feature of ERP?

Smooth and seamless flow of information across organizational boundaries Standardized environment with shared database independent of applications and integrated applications Neither of them is correct Both of them are correct D What ERP stands for? Enterprise Resource Planning Systems Enterprise Resource Production Systems Entertain Random Projection System Neither of these is correct A

Which of the following is a customer touch point?

Telephone contact Email Physical interactions with customers All of the above D What US Government agency is dedicated to cyber security? US-CERT US-CABN US-CISC US-CAMT A

Which is not a characteristic of Big Data?

Variety Structure Volume Velocity B Which type of database supports a company's day-to-day operations? Operational database Multiuser database Centralized database Data warehouse A

Which of the follow is not a type of software attack?

Virus Worm Bug Spear phishing

Which of the follow is not a type of software attack?

Virus Worm Bug Spear phishing C How many windows does the usual Rstudio screen have? 1 2 3 4 D

What are the distinct characteristics of Big Data?

Volume Velocity Variety all of the above

What are the distinct characteristics of Big Data?

Volume Velocity Variety all of the above D Which of the following is not an example of an OS? Mac Windows 7 Windows XP imovie D

Which of the following is not true about business analysis applications?

a.k.a. Online Transaction Processing (OLTP) decision support tool for management-critical tasks through analytical investigation of complex data associations supplies management with "real-time" information and permits timely decisions to improve performance and achieve competitive advantage includes decision support, modeling, information retrieval, ad-hoc reporting/analysis, and what-if analysis

Which of the following is not true about business analysis applications?

a.k.a. Online Transaction Processing (OLTP) decision support tool for management-critical tasks through analytical investigation of complex data associations supplies management with "real-time" information and permits timely decisions to improve performance and achieve competitive advantage includes decision support, modeling, information retrieval, ad-hoc reporting/analysis, and what-if analysis A What are the characteristics of a closed database architecture? Similar in concept to flat-file approach Existence of numerous distinct and independent databases "Paper-based " All of the above D

Which report summarizes the performance of critical activities?

ad hoc (on demand) reports drill-down reports key-indicator reports comparative reports

Which report summarizes the performance of critical activities?

ad hoc (on demand) reports drill-down reports key-indicator reports comparative reports C Why is using pictures in powerpoints complex? Its difficult to find the 'right' picture. Presentations with pictures take a lot of time. Pictures are only useful if you want to make a 'show'. All of the above. D

Fundamental tenets of ethics include:

responsibility accountability liability all of the above D _____ is a language and environment for statistical computing and graphics R excel IT Microsoft word A

Which of the following is NOT a risk-mitigation strategy?

risk acceptance risk warranty risk limitation risk transference

Which of the following is NOT a risk-mitigation strategy?

risk acceptance risk warranty risk limitation risk transference B The correct short-cut key to create a new R-script is: Shift+Crtl+R Crtl+Shift+S Crtl+Shift+N None of the above C

A ________ is any business event that generates data worthy of being captured and stored in the organization's database

transaction function process calculation

What does VMI stand for?

vendor‐managed inventory Very Modern Interaction Vertical Management IT Vex Major IT A Can Trojans be easily downloaded? Yes No Maybe I Don't Know A

Which is these is at the highest point on the data hierarchy?

Byte File Bit Record

Which one is not an essencial stage of the data warehousing?

Cleansing extracted data Transforming data into the database model Loading the data into de data warehouse database Modeling data for the data warehouse B Audits could provide assurance covering the areas of all of these EXCEPT Process integrity Application security Infraestructure security Implementation integrity C

Which of the following is an essential stage of the data warehousing process?

Cleansing extracted data Transforming data into the warehouse model Modeling data for the data warehouse All of the above

Which of the following is an essential stage of the data warehousing process?

Cleansing extracted data Transforming data into the warehouse model Modeling data for the data warehouse All of the above D Which of the following is a risk associated with ERP implementation? Choosing the wrong ERP Choosing the wrong consultant Opposition to changes to the businesses culture All of the above D

Corporate databases are an example of a(n) _________ source of data.

Clickstream External Internal Personal

The term "data rot" refers to:

Data that are irrelevant or contain errors. The deterioration of the medium on which the data are stored. Data that no longer serve a purpose. All of these B Data bases can not be classified according to Number of users Database location(s) Expected type and extent of use Workgroup and enterprise databases D

Which of the following is true of prescriptive analytics?

The statistical procedures involved in prescriptive analytics include linear and multiple regression. Prescriptive analytics do not require any prior analytics or analysis. Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision. All of the statements are true.

How many stages does Data Warehouse Process have?

2 5 7 3

How many data points are necessary in order to use linear regression in predictive analytics?

10 20 30 You can use any number of data points.

How many data points are necessary in order to use linear regression in predictive analytics?

10 20 30 You can use any number of data points. C is the study of the impact of a change in the assumptions (input data) on the proposed solution. What-if analysis Statistical analysis Sensitivity analysis Goal-seeking analysis A

How many stages does Data Warehouse Process have?

2 5 7 3 B Which increase risk of successful Implications for Internal Control and Auditing ERP systems impact organizational structure and internal controls New control policies must precede migration to an ERP system ERP projects may be concurrent with BPR, CRM, Data Warehousing, SCM All of these increase risk of successful implementation D

When is CRM used most frequently in financial services, high tech corporations and the telecommunications industry

2010s 1990s 2000s 1980s

When is CRM used most frequently in financial services, high tech corporations and the telecommunications industry

2010s 1990s 2000s 1980s C What is stage 1 of data warehouse process Extracting data from operational databases Modeling data for the data warehouse Cleansing extracted data Transforming data into the warehouse model B

How many stages does Data Warehouse Process have?

3 6 5 4

How many stages does Data Warehouse Process have?

3 6 5 4 C Feature of ER: Smooth and seamless flow of information across organizational boundaries Standardized environment with shared database independent of applications and integrated applications environment with information across boundaries Both A and B D

What are benefits of CRM systems

360 view of each customer efficent personalized marketing sales ability of services and sales all of the above

What are benefits of CRM systems

360 view of each customer efficent personalized marketing sales ability of services and sales all of the above D Which one is NOT a symptom of a Computer Infection computer freezes frequently a lot of ads popping up can't close browsing tabs random programs start up B

What is the best definition for descriptive analytics?

A form of analytics that examines recent and historical data to detect patterns and predict future outcomes and trends. A form of analytics that attempts to calculate the value of the inputs necessary to achieve a desired level of output. A form of analytics that examines how sensitive an output is to any change in an input while keeping other inputs constant. A form of analytics that summarizes what has happened in the past and allow decision makers to learn from past behaviors.

What is the best definition for descriptive analytics?

A form of analytics that examines recent and historical data to detect patterns and predict future outcomes and trends. A form of analytics that attempts to calculate the value of the inputs necessary to achieve a desired level of output. A form of analytics that examines how sensitive an output is to any change in an input while keeping other inputs constant. A form of analytics that summarizes what has happened in the past and allow decision makers to learn from past behaviors. D Which of the following is true about algorithms? They can go on forever They must be clearly defined An algorithm is a set of rules to be followed in performing some operation or task B and C are correct D

What is ERP?

Activities supported by multi module application software helps a company manage the important parts of its business in an integrated fashion. Enterprise Resource Planning Smooth and seamless flow of information across organizational boundaries All of the above

What is ERP?

Activities supported by multi module application software helps a company manage the important parts of its business in an integrated fashion. Enterprise Resource Planning Smooth and seamless flow of information across organizational boundaries All of the above D What are the main ERP applications? Core applications Powerpoint applications Business analysis applications Both A and C D

What is the definition of systems analysis?

Adding functions to an information system after the project has begun The examination of the business problem that an organization plans to solve with an information system All people who are affected by changes in information systems A method of making sure the hardware on your spaceship is optimal.

What is the definition of systems analysis?

Adding functions to an information system after the project has begun The examination of the business problem that an organization plans to solve with an information system All people who are affected by changes in information systems A method of making sure the hardware on your spaceship is optimal. B Which of these is not a new form of photography technology? SD Card DSLR Dark Room Photoshop C

How

Are You Doing Dog

The process for justifying IT investment involves assessing costs, assessing benefits and which third step?

Align benefits with the organizations strategic plan Complete IT market research Conduct cost-benefit analysis Modify IT strategic plan with daily goals

The process for justifying IT investment involves assessing costs, assessing benefits and which third step?

Align benefits with the organizations strategic plan Complete IT market research Conduct cost-benefit analysis Modify IT strategic plan with daily goals C When updating IT infrastructure, it is critical to spec the resources to meet the following needs of a company, <bold>EXEPT<bold>: Organization's Mission CIO's Salary User Needs Budget B

How

Are You Doing Dog D 1 2 3 4 5 D

What is data governance

An approach to managing information across an entire organization A process that spans all organizational business processes and applications A set of core data that span the enterprise information systems A collection of logically related records

What is data governance

An approach to managing information across an entire organization A process that spans all organizational business processes and applications A set of core data that span the enterprise information systems A collection of logically related records A What is a false fact about multi-tasking? After a set of cycles, the operating system makes copies of all the registers, stacks, and queues used by the process Information is loaded into a process control block Process loads all stacks and queues and starts or continues execution of a thread for a certain number of CPU cycles Controls and schedules processes for execution by the CPU D

Which best describes the utilitarian approach

An ethical approach the provides the most good or does the least harm Ethical actions are those that treats human beings equally, and if not equally then fairly An ethical approach is one that maintains and respects the rights of all those involved None of the above

Which best describes the utilitarian approach

An ethical approach the provides the most good or does the least harm Ethical actions are those that treats human beings equally, and if not equally then fairly An ethical approach is one that maintains and respects the rights of all those involved None of the above A Which of these in not a window in R R Script Workspace and history Common functions Console C

What are functional area information systems (FAIS) ?

An information system that integrates various automated factory systems; also called digital manufacturing. Systems that provide information to managers (usually mid-level) in the functional areas to better support managerial tasks of planning, organizing, and controlling operations. Transaction processing system that processes data after transactions occur, frequently in real time. Reports that show a greater level of details than is included in routine reports.

What are functional area information systems (FAIS) ?

An information system that integrates various automated factory systems; also called digital manufacturing. Systems that provide information to managers (usually mid-level) in the functional areas to better support managerial tasks of planning, organizing, and controlling operations. Transaction processing system that processes data after transactions occur, frequently in real time. Reports that show a greater level of details than is included in routine reports. B Which one is part of the 6Ss in PowerPoint? Speed Safety Standard Sound A

What is Customer Relationship Management (CRM)?

An integrated approach to identifying, acquiring and maintaining customers Activites supported by multi-module application software that help a company manage the important parts of its business in an integrated fashion. a software that allows a user to run other applications on a computing device A machine that can be programmed to manipulate symbols.

What is Customer Relationship Management (CRM)?

An integrated approach to identifying, acquiring and maintaining customers Activites supported by multi-module application software that help a company manage the important parts of its business in an integrated fashion. a software that allows a user to run other applications on a computing device A machine that can be programmed to manipulate symbols. A What is/are the key features of Enterprise Resource Planning (ERP) systems? Smooth and seamless flow of information across organizational boundaries Standardized environment with shared database independent of applications and integrated applications Both A and B None of the above C

Reading Question #1

Answer A Answer B Answer C Answer D

Reading Question #1

Answer A Answer B Answer C Answer D Correct Answer (Reading Question) Lecture Question #1 Answer A Answer B Answer C Answer D Correct Answer (Lecture Question)

What is a data file?

Applications stored as records A collection of logically related records A set of programs for creating and managing a database Another name for a database

What is a data file?

Applications stored as records A collection of logically related records A set of programs for creating and managing a database Another name for a database B Which of the following is true about data? Data is produced by processing information Data requires context to reveal meaning Data is extremely helpful in information management Data is the building block of information D

_________ comprises the vast majority of e-commerce by volume.

B2C B2B B2E C2B

_________ comprises the vast majority of e-commerce by volume.

B2C B2B B2E C2B B In ________, manufacturers or retailers sell directly to customers. viral marketing electronic tendering affiliate marketing online direct marketing D

What is Big Data?

Big Data is a collection of data so large and complex that it is difficult to manage using traditional database management systems. A large amount of data that is easy to store using traditional database management systems. A small amount of data that can not be stored using traditional database management systems. None of the above

What is Big Data?

Big Data is a collection of data so large and complex that it is difficult to manage using traditional database management systems. A large amount of data that is easy to store using traditional database management systems. A small amount of data that can not be stored using traditional database management systems. None of the above A Which of the following is data? A Phone Number A Customer Name Raw Facts All of the above D

Which is NOT an issue with big data?

Big data can come from untrusted sources Big data is dirty Big data changes, especially in data streams Big data is hard to manage

Which is NOT an issue with big data?

Big data can come from untrusted sources Big data is dirty Big data changes, especially in data streams Big data is hard to manage D Which of the following is NOT a software? Operating system software All the system's physical devices DBMS software Application programs and utility software B

Which is not an example of short-range wireless networks?

Bluetooth Ultra-wideband Near-field Communication Super Wifi

Which is not an example of short-range wireless networks?

Bluetooth Ultra-wideband Near-field Communication Super Wifi D What does the OS do? The OS keeps track of what I/O hardware is attached The OS prioritizes I/O activity The OS communicates with the I/O devices via small programs called device drivers All of the above D

Which type of these organizations do most of their sales in the physical world but also conduct e-commerce activities?

Brick-and-mortar Virtual Clicks-and-mortar E-government

Which type of these organizations do most of their sales in the physical world but also conduct e-commerce activities?

Brick-and-mortar Virtual Clicks-and-mortar E-government C What is the most commonly used network topology? Star Point to Point Ring Bus A

What is not a core elements of On Line Transaction Processing

Business Planning Logistics Data running Shop Floor Control

What is not a core elements of On Line Transaction Processing

Business Planning Logistics Data running Shop Floor Control C Which of the following is Part of Third Tier Data warehouse use service Operations database Data warehouse All the above D

Which is these is at the highest point on the data hierarchy?

Byte File Bit Record B Which one of these are not true about data? It is raw facts It must be formatted for storage, processing, and presentation Is the building blocks of information Requires context to reveal true meaning D

Which of the following statements concerning CRM is not true?

CRM builds sustainable long-term relationships with customers CRM is designed for companies to interact with their customers as a group. CRM helps companies acquire new customers. CRMs help keep repeat customers

Which of the following statements concerning CRM is not true?

CRM builds sustainable long-term relationships with customers CRM is designed for companies to interact with their customers as a group. CRM helps companies acquire new customers. CRMs help keep repeat customers B R provides a wide variety of statistical and graphical techniques including: linear and nonlinear modelling classical statistical tests time-series analysis all of the above D

Which of the following statements concerning CRM is not true?

CRM is designed for companies to interact with their customers as a group. CRM builds sustainable long-term relationships with customers CRMs help keep repeat customers RM helps companies acquire new customers.

Which of the following statements concerning CRM is not true?

CRM is designed for companies to interact with their customers as a group. CRM builds sustainable long-term relationships with customers CRMs help keep repeat customers RM helps companies acquire new customers. A What is the most important type of object in R? Vectors Matrices Lists Functions A

What are the support managements of OLAP?

Consolidation Slicing and Dicing Drill-down All of the above

What are the support managements of OLAP?

Consolidation Slicing and Dicing Drill-down All of the above D What does OLAP stand for? Online Analytical Processing Online Access Point Online Assist Port Online Agent Processor A

What is not a Customer Touching Applications capability?

Contacting a company representative before interacting with online technologies Search and comparison capabilities Customized products and services Loyalty programs

What is not a Customer Touching Applications capability?

Contacting a company representative before interacting with online technologies Search and comparison capabilities Customized products and services Loyalty programs A What are threats of network security? Malware Worms Trojan All of the above D

The component of an operational CRM system that automatically records all of the components in a sales transaction process.

Customer-facing CRM applications Electronic CRM Salesforce automation Interorganizational information system C Common server handles both application and database duties, and common server handles both application and database duties First-tier Two-tier Second-tier Third-tier B

What are the major components of operational CRM systems?

Customer-facing applications Customer-touching applications None of the above Both A and B

What are the major components of operational CRM systems?

Customer-facing applications Customer-touching applications None of the above Both A and B D What can you do to minimize the risk of security threats? Use a firewall Only visit trusted sites Never give someone your password All of the above D

What are the two major components of operational CRM systems ?

Customer-facing applications and customer-touching applications Customer service and support None of these Products and services

What are the two major components of operational CRM systems ?

Customer-facing applications and customer-touching applications Customer service and support None of these Products and services A In the past, what were PC's mainly under threat by? Poor use Water damage Viruses and worms Hackers C

Data mining is typically used in which part of the business analytics process?

Data Management Predictive Analytics Descriptive Analytics Prescriptive Analytics

Data mining is typically used in which part of the business analytics process?

Data Management Predictive Analytics Descriptive Analytics Prescriptive Analytics B How Does a Computer Represent Data? 0's and 1's 1's and 10's all of them 1's and 2's A

Why is it difficult to manage data?

Data are scattered throughout organizations Data that are irrelevant or contain errors. Data security is easy to maintain. Data are stored in the same format throughout organizations.

Why is it difficult to manage data?

Data are scattered throughout organizations Data that are irrelevant or contain errors. Data security is easy to maintain. Data are stored in the same format throughout organizations. A What does HTML stand for? HyperText Mark up language HyperText Make up language HyperText Marked language HyperTool Mark up language A

What are the three common challenges of managing data?

Data are scattered throughout organizations. Data come from multiple sources. Information systems that support particular business processes impose unique requirements on data. All of the above

What are the three common challenges of managing data?

Data are scattered throughout organizations. Data come from multiple sources. Information systems that support particular business processes impose unique requirements on data. All of the above D Where are databases used in? Business Research Administration All of the above D

Which is the first step in data reduction

Descriptive Analytics Management Predictive analytics None of the above

Which is the first step in data reduction

Descriptive Analytics Management Predictive analytics None of the above A How do computers represent data? Roman numerals Letters Numbers None of the above C

Which analytics model requires a feedback mechanism?

Descriptive Analytics Predictive Analytics Prescriptive Analytics Attentive Analytics

Which analytics model requires a feedback mechanism?

Descriptive Analytics Predictive Analytics Prescriptive Analytics Attentive Analytics C Which of the following characterizes database management systems (DBMS)? Collection of Programs Interface between user and database Enables data to be shared all of the above D

____ are the first step in data reduction and summarizes what has happened in the past

Descriptive analytics Predictive analytics Prescriptive analytics Structured Decisions

____ are the first step in data reduction and summarizes what has happened in the past

Descriptive analytics Predictive analytics Prescriptive analytics Structured Decisions A How many bits in a byte? 32 4 8 16 C

Computer-aided software engineering tools provide which of the following disadvantages?

Difficult to customize Difficult to use with existing systems Require more extensive and accurate definition of user requirements All of the Above

Computer-aided software engineering tools provide which of the following disadvantages?

Difficult to customize Difficult to use with existing systems Require more extensive and accurate definition of user requirements All of the Above D The Internet is designed to aid with which of the following? Communication Discovery Collaboration All of the Above D

What is an electronic profile of an individual's habits called?

Digital Blackbook Digital Dossier User Historical Data None of the above

What is an electronic profile of an individual's habits called?

Digital Blackbook Digital Dossier User Historical Data None of the above B R is an integrated suite of software facilities for: Data Manipulation Calculation Graphical Display All of the above D

Which one of these is not a conversion strategy?

Direct conversion Indirect conversion Pilot conversion Phased conversion

Which one of these is not a conversion strategy?

Direct conversion Indirect conversion Pilot conversion Phased conversion B What does Moore's law say? The value of a network grows roughly in line with the square of the number of its users The processing power of sillicon chips will double every 18 months The number of computers in the world triples every year For every action, there is an equal and opposite reaction. B

The university wants to upgrade the ten year-old technology in Social Sciences 1100. They used their upgrade budget to purchase the new equipment, but the department in charge of installing the new equipment is understaffed. What part of the feasibility study did the university neglect to account for?

Economic feasibility Behavioral feasibility Technical feasibility None of the above

The university wants to upgrade the ten year-old technology in Social Sciences 1100. They used their upgrade budget to purchase the new equipment, but the department in charge of installing the new equipment is understaffed. What part of the feasibility study did the university neglect to account for?

Economic feasibility Behavioral feasibility Technical feasibility None of the above B Recall the Pilkington outsourcing example. They saw substantial success (1.85 million saved) when they decided to outsource their IT to a single vendor and retain a few internal IT people to maintain in-house competency. Two years ago, the university attempted to outsource the technology upgrades in classrooms across campus while also maintaining a fully functional internal IT service department. The result was an incompatibility between the new systems and the internal service department, which caused campus-wide issues that persist today. The next year, they mainly utilized the internal department for the upgrades and saw substantial success. What outsourcing aspects did the school take into account the first time? The vendor's core competencies. The critical knowledge held within the internal service department. The cost of failure from outsourcing. None of the above. D

The feasibility study addresses which of the following issues?

Economic feasibility Technical feasibility Behavioral feasibility All of these

The feasibility study addresses which of the following issues?

Economic feasibility Technical feasibility Behavioral feasibility All of these D The internet is designed to aid with the following: Discovery Communication Collaboration All of these D

Which of the following are threats to your privacy?

Electronic Surveillance Personal Information in Databases Digital Dossiers All Of The Above

Which of the following are threats to your privacy?

Electronic Surveillance Personal Information in Databases Digital Dossiers All Of The Above D What is the correct order of programming languages going from least to most flexible? HTML, Python, Java, assembly language assembly language, Java, Python, HTML Java, Python, HTML, assembly language None Of The Above A

What does ERP stand for?

Enterprise Resource Planning Enterprise Rebate Plotting Evaluation Resource Process Enterprise Return Program

What does ERP stand for?

Enterprise Resource Planning Enterprise Rebate Plotting Evaluation Resource Process Enterprise Return Program A What could be a problem when implementing a ERP? A negative effect to the business culture Integrates the business better Encourages employees to learn the new software Creates a more streamline process of operations A

What is ERP

Entertainment Recycle Planning Systems Enterprise Resource Planning Systems Entertainment Resource Planning Systems Enterprise Recycle Planning Systems

What is ERP

Entertainment Recycle Planning Systems Enterprise Resource Planning Systems Entertainment Resource Planning Systems Enterprise Recycle Planning Systems B CRM May Help marketing departments identify and target their best customers, manage campaigns as well as discover qualified leads Improve sales and streamline existing processes Form individualized relationships with customers. All of the Above D

What is the first step in the general framework for ethics?

Evaluating alternative actions Recognize an ethical issue Obtain the facts Make a decision B What is the primary purpose of R Studio? to lean the basics of java and python use opensource and professional software for the r statistical computing environment an information management tool that helps you store information for reference, reporting, and analysis to connect various databases to form relationships and queries B

Which one is Core ERP Modules?

Financial Management Operations Management Human Resource Management All of above

Which one is Core ERP Modules?

Financial Management Operations Management Human Resource Management All of above D A(n) ___________ is software that helps companies acquire and retain customers. enterprise resource planning system customer relationship management system supply chain management system transaction processing system B

Correct basic security methods on Software

Firewall Antivirus Automatic updates All of the above

Correct basic security methods on Software

Firewall Antivirus Automatic updates All of the above D What type of Threats is correct? Worm Virus Trojan All of the above D

what is the advantage of the Traditional Systems Development (SDLC)?

Forces staff to systematically go through every step in a structured process. May produce excessive documentation. Users may be unwilling or unable to study the approved specifications. Takes too long to progress from the original ideas to a working system.

what is the advantage of the Traditional Systems Development (SDLC)?

Forces staff to systematically go through every step in a structured process. May produce excessive documentation. Users may be unwilling or unable to study the approved specifications. Takes too long to progress from the original ideas to a working system. A what choice describe the direct conversion? Old system turned off, and new system turned on at a point in time. Introduce one system in one part of an organization. Introduce components of new system. None of the above A

This information system uses data visualization technologies to analyze and display data in the form of digital maps for planning and decision making purposes?

Geographical information system Transaction processing system Dashboard Decision support system

This information system uses data visualization technologies to analyze and display data in the form of digital maps for planning and decision making purposes?

Geographical information system Transaction processing system Dashboard Decision support system A you should avoid animations TRUE FALSE A

What is an underlying computer system on which application programs can run.

Google Drive Microsoft Word Data Base Platform

What is an underlying computer system on which application programs can run.

Google Drive Microsoft Word Data Base Platform D What does the coding language R provide? linear and nonlinear modelling classical statistical tests time-series analysis All of the above D

What GIS stands for?

Graphic Interface Source Graphic Information System Geographic Interface Source Geographic Information System

What GIS stands for?

Graphic Interface Source Graphic Information System Geographic Interface Source Geographic Information System D What is a 4-bytes size of data type? Character Double Integer Float C

Customer relationship management (CRM), as an application that must be included in a true enterprise resource planning (ERP) product, includes ________.

HR management Capacity planning Cash management Sales prospecting

Customer relationship management (CRM), as an application that must be included in a true enterprise resource planning (ERP) product, includes ________.

HR management Capacity planning Cash management Sales prospecting D ________ is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent computing platform. Enterprise resource planning Supply chain management Warehouse management system Customer relationship management A

major parts of a database system

Hardware Procedures People ALL

major parts of a database system

Hardware Procedures People ALL D Disadvantages of database systems Increased costs Management complexity Maintaining currency All D

Which is / are major part(s) of a database system?

Hardware Software People All above

Which is / are major part(s) of a database system?

Hardware Software People All above D Place the following members of the data hierarchy in the correct order: bit - byte - field - record - file - database bit - byte - field - record - database - file bit - record - field - byte - file - database byte - bit - record - field - database A

Which of the following is NOT an advantage of prototyping?

Helps clarify user requirements Promotes close working relationship between systems developers and users Is practical with a very large number of users Helps verify the feasibility of the design

Which of the following is NOT an advantage of prototyping?

Helps clarify user requirements Promotes close working relationship between systems developers and users Is practical with a very large number of users Helps verify the feasibility of the design C Which of the following is the internet NOT designed to aid with: Discovery Communication Collaboration Customization D

Which of these is an advantage of radio transmission system?

High bandwidth Signals pass through walls Inexpensive and easy to install All of the above

Which of these is an advantage of radio transmission system?

High bandwidth Signals pass through walls Inexpensive and easy to install All of the above D Which of these is a type of OS (operating system)? Mac Linux Windows 7 All of the above D

What are problems with non-ERP systems

High long-term maintenance costs limits ability to engage in process reengineering limits connectivity outside the company all of the above

What are problems with non-ERP systems

High long-term maintenance costs limits ability to engage in process reengineering limits connectivity outside the company all of the above D What does ERP stand for? expository reading program enterprise resource programing enterprise resource planners enterprise resource purpose B

Which of these is NOT one of the three characteristics separate Big Data from traditional data?

High-volume High-variety High-visibility High-velocity

Which of these is NOT one of the three characteristics separate Big Data from traditional data?

High-volume High-variety High-visibility High-velocity C What is a database management system (DBMS)? The intermediary between the user and the database A handle selected group of people who perform maintenance on the hardware that supports a database A single software that is used to input data into a database A program that analyzes data A

Which of the following is an example of a video editing system?

IMovie Windows Movie Maker Final Cut Pro All of the above

Which of the following is an example of a video editing system?

IMovie Windows Movie Maker Final Cut Pro All of the above D Why is video editing an important skill to learn? Useful as a training tool Helps to understand how to organize and plan for a video conference It's fun! Both A and B D

The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives needed to achieve the goals of the organization.

IT mission IT operational plan Application portfolio IT strategic plan

The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives needed to achieve the goals of the organization.

IT mission IT operational plan Application portfolio IT strategic plan D The goals of the _________ are to link corporate strategy and IT strategy, approve the allocation of resources for the MIS function, and establish performance measures for the MIS function and see that they are met. IT steering committee Board of Directors IT operational committee CIO A

The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives needed to achieve the organization's goals.

IT strategic plan ITea strategic plan IT status poll LR IT A The internet is designed to aid with which of the following Discovery Communications Collaboration All of the Above D

If your employer states in the employee handbook that work email addresses should be used for official business only and then reads your emails, he is guilty of a crime under which circumstances?

If he reads them out loud If he forwards them to other, personal people He isn't guilty of any crime If he reads them 7 days after they've been sent

If your employer states in the employee handbook that work email addresses should be used for official business only and then reads your emails, he is guilty of a crime under which circumstances?

If he reads them out loud If he forwards them to other, personal people He isn't guilty of any crime If he reads them 7 days after they've been sent C What is the correct way to assign a variable in RStudio? X is 1 X = 1 X should be 1 assign(X) to 1 B

What is cybercrime?

Illegal activities conducted over computer networks, particularly the Internet Bullying other people on the Internet A company that specializes in providing security information to governments None of the above

What is cybercrime?

Illegal activities conducted over computer networks, particularly the Internet Bullying other people on the Internet A company that specializes in providing security information to governments None of the above A Where do you type and see outputs of commands entered in R studio? Console tab Workspace tab Files tab None of the above A

What are the advantages of a DBMS

Improve data sharing Improve data access Minimize data accessing All the above

What are the advantages of a DBMS

Improve data sharing Improve data access Minimize data accessing All the above D What are major parts of a database system? Hardware Software Data All the above D

How does a computer represent data?

In the form of 0's and 1's. Exactly as the the data is written. As a series of numbers ranging from 0-9. In the form of -1's and 0's.

How does a computer represent data?

In the form of 0's and 1's. Exactly as the the data is written. As a series of numbers ranging from 0-9. In the form of -1's and 0's. A What is the R script's purpose in R Studio? Shows the tabs, files, plots, packages, and help. Shows the output from the code written when computed. Where the code is written and stored. Shows the workspace and history tabs. C

The followings are problems without ERP systems except

In-house design limits connectivity outside the company Lack of integration limits communication within the company Long-term maintenance costs high These are all problems with Non-ERP Systems

The followings are problems without ERP systems except

In-house design limits connectivity outside the company Lack of integration limits communication within the company Long-term maintenance costs high These are all problems with Non-ERP Systems D What does ERP stand for? Enterprise reports planing Enterprise resource planning Event-related potential Enterprise rewards planing B

Which is NOT a problem of Non-ERP systems?

In-house design limits connectivity outside the company Strategic decision-making not supported Data warehouses must be created and maintained separately from the operational databases Limits ability to engage in process reengineering

Which is NOT a problem of Non-ERP systems?

In-house design limits connectivity outside the company Strategic decision-making not supported Data warehouses must be created and maintained separately from the operational databases Limits ability to engage in process reengineering C What is ERP? An integrated approach to identifying, acquiring and maintaining customers. A relational or multi-dimensional database that may consume hundreds of gigabytes or even terabytes of disk storage Supports management-critical tasks through analytical investigation of complex data associations captured in data warehouses client links to the application server which then initiates a second connection to the database server A

_________ is the tenet of ethics that refers to determining who is responsible for actions that were taken.

Liability Responsibility Accountability The code of ethics

_________ is the tenet of ethics that refers to determining who is responsible for actions that were taken.

Liability Responsibility Accountability The code of ethics C R provides a wide variety of statistical and graphical techniques: linear and nonlinear modelling classical statistical tests time-series analysis All of the above D

What is an application portfolio?

List of existing and potential IT applications Bunch of apps in a folder Apps you develop for a company All of the above

What is an application portfolio?

List of existing and potential IT applications Bunch of apps in a folder Apps you develop for a company All of the above A Which of the following industries grew at more than double the rate of the economy in the early 2000s? Informational Technologies Agriculture Media (movies, news, etc) All of These A

What must TPS have?

Manage high volumes of data and variation in those volumes Avoid Errors and downtime Manage reversals of transactions All of the above

What must TPS have?

Manage high volumes of data and variation in those volumes Avoid Errors and downtime Manage reversals of transactions All of the above D Which of the following shortcuts is the wrong command? Ctr + A Copy Ctr + V Paste Ctr + Z Undo Ctr + S Save A

A typical IS operational plan contains which of the following elements?

Mission of the IS function IS function's estimate of its goals Application portfolio All of these

A typical IS operational plan contains which of the following elements?

Mission of the IS function IS function's estimate of its goals Application portfolio All of these D The internet is designed to aid with the following: Discovery Communication Collaboration All of above D

A typical IS operational plan contains which of the following elements?

Mission of the IS function Summary of the information needs of the functional areas and of the entire organization IS function's estimate of its goals All of these

A typical IS operational plan contains which of the following elements?

Mission of the IS function Summary of the information needs of the functional areas and of the entire organization IS function's estimate of its goals All of these D What are the types of Businesses & IT presence? Ebay store Web Presence Smart phone connected All of these D

A typical IS operational plan contains which of the following elements?

Mission of the IS function Summary of the information needs of the functional areas and of the entire organization IS function's estimate of its goals All of these D Which is NOT one of the six keys in getting the most of your connectivity? Management Systems Online Reference Business Support Collaborative Workgroups C

What is not as essential stage of data warehousing process?

Modeling data for the data warehouse Extracting data from operational databases Cleansing extracted data Backing up data to an offline server.

What is not as essential stage of data warehousing process?

Modeling data for the data warehouse Extracting data from operational databases Cleansing extracted data Backing up data to an offline server. D What are two main ERP applications? Core Applications Business Analysis Applications Marketing Both answers A and B D

which is the essential stages of the data warehousing process?

Modeling data for the data warehouse Transforming data into the warehouse model Cleansing extracted data all of the above

which is the essential stages of the data warehousing process?

Modeling data for the data warehouse Transforming data into the warehouse model Cleansing extracted data all of the above D which one is the largest ERP vendor? SAP J.D. Edwards Oracle Baan A

A standardized language used to manipulate data is _________.

None of these MS-Access Query-by-example language Oracle C What are an advantage or advantages of the DBMS? Improved data security Improved decision making Improved data access All of these. D

What is the major benefit of ERP systems?

Organizational flexibility and agility Decision support Quality and efficiency All above D What is the key feature of ERP? Smooth and seamless flow of information across organizational boundaries Standardized environment with shared database independent of applications and integrated applications Help customers to manage their money more efficiently Both A and B D

Which of the following are not a basic characteristic of data warehouses and data marts?

Organized by business subject Users cannot change or update the data They are multidimensional none of the above

Which of the following are not a basic characteristic of data warehouses and data marts?

Organized by business subject Users cannot change or update the data They are multidimensional none of the above D Which of the following are true about problems with File System Data Processing? Simple file system retrieval task requires extensive programming Security features are difficult to program System administration is complex and difficult all of the above D

What type of implementation introduces components of the new system, such as individual modules, in stages?

Pilot conversion Direct conversion Phased conversion Systems conversion

What type of implementation introduces components of the new system, such as individual modules, in stages?

Pilot conversion Direct conversion Phased conversion Systems conversion C Which of the following is the internet designed to aid? Discovery Collaboration Communication All of the above D

Which of the followwing is not apart of explicit knowledge?

Policies People Reports Goals

Which of the followwing is not apart of explicit knowledge?

Policies People Reports Goals B What does redundancy do? reduces data inconsitency stores singles and logical structure sources enables data sharing improves security A

A(n) ___ agent constantly observes and reports on some item of interest.

Predictive User Personal Information A Which of the following is not a screen in Rstudio R script Workspace and history TV screen Console C

Which of the following is true of prescriptive analytics?

Prescriptive analytics do not require any prior analytics or analysis. Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision. The statistical procedures involved in prescriptive analytics include linear and multiple regression. All of the statements are true.

Which of the following is true of prescriptive analytics?

Prescriptive analytics do not require any prior analytics or analysis. Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision. The statistical procedures involved in prescriptive analytics include linear and multiple regression. All of the statements are true. B DSS characteristics include which of the following? support managers at all organizational levels usually utilize quantitative models adaptable to changing conditions all of the above D

"Who is responsible for the authenticity, fidelity, and accuracy of the information collected?" What kind of Ethical Issue is this?

Privacy Accuracy Property Accessibility

"Who is responsible for the authenticity, fidelity, and accuracy of the information collected?" What kind of Ethical Issue is this?

Privacy Accuracy Property Accessibility B In RStudio, plots are shown on which window? Top Left Top Right Bottom Left Bottom Right D

Which of the following is not an ethical issue involving IT application?

Privacy issue Accuracy issue Property issue Technology issue

Which of the following is not an ethical issue involving IT application?

Privacy issue Accuracy issue Property issue Technology issue D Where do you keep a record of your work in RStudio? The console window The R script and data view window The workspace and history window The files, plots, packages and help window B

What does batch processing do?

Processes data in batches Collects data from transactions as they occur and places them into batches Processes data as it comes Processes data at the end of the day in batches

What does batch processing do?

Processes data in batches Collects data from transactions as they occur and places them into batches Processes data as it comes Processes data at the end of the day in batches B What should you avoid when making a powerpoint? Very long bodies of text in your presentation Ugly clip art Animations A, B, and C D

Which of the following are examples of Transactions?

Product Manufactured service sold person hired All of the Above

Which of the following are examples of Transactions?

Product Manufactured service sold person hired All of the Above D What are the 6S'? Software, Structure, Scale, Speed, Schedule, Story Speed, Simplicity, Standard, Scope, Structure, Story Speed, Simplicity, Scope, Schedule, Structure, Story None of the Above C

Which of the following is not a major business functional area?

Production/operations management Accounting/finance Human resources management None of the above

Which of the following is not a major business functional area?

Production/operations management Accounting/finance Human resources management None of the above D Which of the following short-keys is used to "copy"? ctrl + S ctrl + C ctrl + V ctrl + A B

Which is an advantage of prototyping?

Promotes genuine user participation. System is built too quickly and results in low quality. May encourage inadequate problem analysis May generate confusion about the system.

Which is an advantage of prototyping?

Promotes genuine user participation. System is built too quickly and results in low quality. May encourage inadequate problem analysis May generate confusion about the system. A Which firm was the #1 PC vendor in 2000? Acer HP Huawei Dell D

Which of these tasks for business partners are enabled interorganizational information systems?

Reduce the costs of routine business transactions Improve the quality of the information flow by reducing or eliminating errors Compress the cycle time involved in fulfilling business transactions All the above D Which of these is NOT a security threat source? Cloud Storage Social Media Location Information Phone Call D

Which is not a fundamental tenets of ethics?

Responsibility Accountability Accessibility Liability

Refers to who was responsible for actions that were taken?

Responsibility Accountability Ethics none of the above

Refers to who was responsible for actions that were taken?

Responsibility Accountability Ethics none of the above B The tab to type commands in r studio is ? Plot tab Console Workspace none of the above B

What are the fundamental tenets of ethics?

Responsibility Accountability Liability All of the Above

What are the fundamental tenets of ethics?

Responsibility Accountability Liability All of the Above D What is R? A language for statistical computing and graphics A function in Excel A part of a computer monitor A major topic of privacy concern A

What are the fundamental tenets of ethics?

Responsibility Accountability Liability All of the above

What is a fundamental tenet of ethics?

Responsibility Accountability Liability All of the above

What is a fundamental tenet of ethics?

Responsibility Accountability Liability All of the above D What is an example of a statistical and/or graphing technique provided by R? Linear and nonlinear modeling Time-series analysis Clustering All of the above D

What are the fundamental tenets of ethics?

Responsibility Accountability Liability All of the above D Which of these are basic programming concepts? Variable and Assignments Arithmetic Logic ('if' statements) All of the Above D

What does fundamental tenets of ethics include?

Responsibility, Accountability, and Liability Responsibility and Accountability Liability and Organization Responsibility and Trust

What does fundamental tenets of ethics include?

Responsibility, Accountability, and Liability Responsibility and Accountability Liability and Organization Responsibility and Trust A What do factors provide on R studio? ways to include more than one valuable to a single variable another way to plot a set of data compact ways to handle categorical data return a value and break out of an infinite loop C

What is NOT a key feature of ERP?

Smooth and seamless flow of information across organizational boundaries tandardized environment with shared database independent of applications and integrated applications supported by multi-module application software that help a company manage the important parts of its business in an integrated fashion. enables the user to examine data from different viewpoints often performed along a time axis to depict trends and patterns.

What is NOT a key feature of ERP?

Smooth and seamless flow of information across organizational boundaries tandardized environment with shared database independent of applications and integrated applications supported by multi-module application software that help a company manage the important parts of its business in an integrated fashion. enables the user to examine data from different viewpoints often performed along a time axis to depict trends and patterns. D Which one of these is a data warehouse process? Cleansing extracted data Involves filtering out or repairing invalid data prior to being stored in the warehouse Operational data are "dirty" for many reasons: clerical, data entry, computer program errors, misspelled names, and blank fields. common server handles both application and database duties client links to the application server which then initiates a second connection to the database server Builds a database that describes the customers and the relationship they hold with the company A

What is ethics?

Society's accepted moral code Culture's accepted moral code Principles of right and wrong used to make choices that guide behavior Both A and B

What is ethics?

Society's accepted moral code Culture's accepted moral code Principles of right and wrong used to make choices that guide behavior Both A and B C What is the function of a computer programming compiler? Exports completed code sequences Translates computer readable code to human readable code Translates human readable code to computer readable code Imports unreadable code from the cloud C

Identify the answer that is a deliberate threat to information system.

Software attacks Identity theft Sabatoge or Vandalism All of the above

Identify the answer that is a deliberate threat to information system.

Software attacks Identity theft Sabatoge or Vandalism All of the above D Which short-key is for Re-do? Ctrl+Y Ctrl+C Ctrl+V Ctrl+A A

What is freeware?

Software that comes installed with your computer. Software given away for free, but you can't turn around and sell it for profit. Less complex software. Free used hardware found in many tech stores.

What is freeware?

Software that comes installed with your computer. Software given away for free, but you can't turn around and sell it for profit. Less complex software. Free used hardware found in many tech stores. B Which of the following is not a font that you should use on PowerPoint? Times New Roman Arial Calibri Georgia A

Which one is NOT included in the five basic components of SCM(supply chain management)?

Source Deliver Return Design

Which one is NOT included in the five basic components of SCM(supply chain management)?

Source Deliver Return Design D Which one is NOT a Antivirus Manufacturers website? Norton Antivirus Macaffe Trend Micro Weebly D

What is NOT a technique for illegally obtaining personal information?

Stealing mail or dumpster diving Stealing personal information in computer databases Returning your someone's drivers license after they've dropped it Impersonating a trusted organization in an electronic communication

What is NOT a technique for illegally obtaining personal information?

Stealing mail or dumpster diving Stealing personal information in computer databases Returning your someone's drivers license after they've dropped it Impersonating a trusted organization in an electronic communication C What statistical and graphical techniques can R NOT provide? Clustering Classification Linear and nonlinear modelling None of the above D

Which are examples of identity thefts?

Stealing mail or dumpster driving Stealing personal information in computer databases Impersonating a trusted organization in an electronic communication All of the above

Which are examples of identity thefts?

Stealing mail or dumpster driving Stealing personal information in computer databases Impersonating a trusted organization in an electronic communication All of the above D Which window do you keep a record of you work in Rstudio? Console Workspace and History R script Files, plots, packages, and help C

Which of the following is considered identity theft?

Stealing personal information in computer databases Impersonating a trusted organization in an electronic communication Stealing mail or dumpster diving All of the above

Which of the following is considered identity theft?

Stealing personal information in computer databases Impersonating a trusted organization in an electronic communication Stealing mail or dumpster diving All of the above D What can you do with R Studio? classical statistical tests time-series analysis Clustering All of the above D

The type of decision that can be made by following a definite procedure is called a(n) ______ decision.

Structured unstructured undocumented procedural

The type of decision that can be made by following a definite procedure is called a(n) ______ decision.

Structured unstructured undocumented procedural A Why should you learn about computer programming? Coding develops structured and creative thinking Developing simple computer programs can help automate tedious or mundane tasks Most of you will not become computer programmers, but will likely interact with them. All of the above D

A typical IS operational plan contains which of the following elements?

Summary of the information needs of the functional areas and of the entire organization IS function's estimate of its goals Application portfolio All of these

A typical IS operational plan contains which of the following elements?

Summary of the information needs of the functional areas and of the entire organization IS function's estimate of its goals Application portfolio All of these D The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives needed to achieve the goals of the organization. IT mission IT operational plan IT strategic plan User information requirements C

Which one of the options below are NOT part of the six process related to Traditional System Development?

System Investigation System Analysis Implementation Recruitment

Which one of the options below are NOT part of the six process related to Traditional System Development?

System Investigation System Analysis Implementation Recruitment D A(n) impact of IT on Organizations is: A wealth support IT can be a major part of our existence IT is a critical resource All of the above D

What is NO part of the Traditional Systems Development Life Cycle?

Systems analysis Systems design Implementation Systems selling

What is NO part of the Traditional Systems Development Life Cycle?

Systems analysis Systems design Implementation Systems selling D According to Moore's Law, in which timespan would the processing power of silicon chips double? Every 6 months Every 12 months Every 18 months Every 24 months C

Appropriate management of financial assets is a major task in financial planning and budgeting.

TRUE FALSE

Outsourcing is the use of outside contractors or external organizations to acquire IT services

TRUE FALSE

Outsourcing is the use of outside contractors or external organizations to acquire IT services.

TRUE FALSE

TRUE OR FALSE: Prescriptive analytics require predictive analytics.

TRUE FALSE

The IT planning process begins with an analysis of the organization's IT infrastructure

TRUE FALSE

The amount of data is increasing exponentially over time.

TRUE FALSE

The amount of data is increasing exponentially over time.

TRUE FALSE A Advantages of a DBMS: mproved data sharing Improved data security Better data integration All of the above D

Outsourcing is the use of outside contractors or external organizations to acquire IT services.

TRUE FALSE A The internet is designed to aid with which of the following? discovery communication collaboration all of the above D

TRUE OR FALSE: Prescriptive analytics require predictive analytics.

TRUE FALSE A What is a "bug"? Something that translates human-readable code to computer-readable instructions for a certain computer architecture A common name for a coding error that causes a program to fail One of the basic elements of a computer program Another name for insects B

Outsourcing is the use of outside contractors or external organizations to acquire IT services

TRUE FALSE A Which of the following are the windows seen in RStudio? console workspace history files, plots, packages, and help All the above D

Appropriate management of financial assets is a major task in financial planning and budgeting.

TRUE FALSE A Which of the following is not a short-cut key? ctrl+c ctrl+z ctrl+v ctrl+w D

The IT planning process begins with an analysis of the organization's IT infrastructure

TRUE FALSE B Metcalfe's Law means the value of a network grows roughly in line with the square of the number of its users TRUE FALSE A

Leasing can be attractive to small and medium size organizations that cannot afford major investments in software.

TRUE false na na

Leasing can be attractive to small and medium size organizations that cannot afford major investments in software.

TRUE false na na A computer aided software engineering tools provide which of the following advantages can speed up the development process can produce systems with longer effective operational lives both A & B none of the above C

Which of the following is NOT a primary role of Scrum Approach in Agile Development?

The Scrum Master The Consumer The Team The Product Owner

Which of the following is NOT a primary role of Scrum Approach in Agile Development?

The Scrum Master The Consumer The Team The Product Owner B Which of the following is the internet NOT designed to aid with? Communication Collaboration Discovery Attention span D

What are privacy codes?

The guidelines that individual must take to protect themselves An organization's guidelines for protecting the privacy of its customers, clients, and employees A code that workers must follow in a company A computer's policy in protecting a users information

What are privacy codes?

The guidelines that individual must take to protect themselves An organization's guidelines for protecting the privacy of its customers, clients, and employees A code that workers must follow in a company A computer's policy in protecting a users information B What is metadata? Data about data; provides description of data characteristics and relationships in data A system that controls data and access to data Data kept by an organization regarding its staff A collection of programs that organizes and sorts data A

Courts rule on privacy in the following ways:

The right of privacy is not absolute. Privacy must be balanced against the needs of society. The public's right to know supersedes the individual's right of privacy. A and B None

Courts rule on privacy in the following ways:

The right of privacy is not absolute. Privacy must be balanced against the needs of society. The public's right to know supersedes the individual's right of privacy. A and B None C R can be used for which of the following? linear and nonlinear modelling classical statistical tests time-series analysis all of the above D

Which of the following is NOT in the rules of court decisions in many countries?

The right of privacy is not absolute. Privacy must be balanced against the needs of society. The public's right to know supersedes the individual's right of privacy. The individual's right to know supersedes the public's right of privacy.

Which of the following is NOT in the rules of court decisions in many countries?

The right of privacy is not absolute. Privacy must be balanced against the needs of society. The public's right to know supersedes the individual's right of privacy. The individual's right to know supersedes the public's right of privacy. D Why should you learn about computer programming? Coding develops structured and creative thinking Developing simple computer programs can help automate tedious or mundane tasks Most of you will not become computer programmers, but will likely interact with them. All of them D

Which rule(s) regarding privacy have court decisions in many countries followed fairly closely?

The right of privacy is not absolute. The public's right to know supersedes the individual's right of privacy. A and B The government has the right to search through any individual's private information.

Which rule(s) regarding privacy have court decisions in many countries followed fairly closely?

The right of privacy is not absolute. The public's right to know supersedes the individual's right of privacy. A and B The government has the right to search through any individual's private information. C Which window of R Studio allows you to type commands and see outputs? a Console Workspace Files Data View A

Which of the following is true of prescriptive analytics?

The statistical procedures involved in prescriptive analytics include linear and multiple regression. Prescriptive analytics do not require any prior analytics or analysis. Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision. All of the statements are true. C Which following is Not true about Enterprise Resources Planning System? It would provide a smooth and seamless flow of information across organizational boundaries. It would create a series of tools which enable a company to keep the privacy of their resources. It's a multi-module application software that offers integrated style aid in managing important business parts. It makes an standardized environment that has a shared database independent from applications and integrated applications. B

Which are common areas with high costs?

Training Testing and Integration Database Conversion All of the Above

Which are common areas with high costs?

Training Testing and Integration Database Conversion All of the Above D What does CRM stand for? Customer Relationship Management Consumer Relationship Management Consumer Retail Management Customer Retail Management A

TPS stands for...

Transaction Processing Systems Transaction Progression System Tariff Processing System Transgression Project System

TPS stands for...

Transaction Processing Systems Transaction Progression System Tariff Processing System Transgression Project System A In PowerPoint, why should we avoid creating titles that are more than just 1 line? Because it distracts the audience Because it causes the slides to glitch Because it will be difficult to read and breaks the 'uniformity' Because it increases the chances of making the slides lag C

The sales, marketing, and service functions are part of

Transactional CRM Analytical CRM Operational CRM Collaborative CRM

The sales, marketing, and service functions are part of

Transactional CRM Analytical CRM Operational CRM Collaborative CRM C Which of the following is NOT considered a threat source? iCloud storage Social Media Loaction Information None of the above D

What does TPS stand for?

Transfer Processing System Transaction Processing System Transfer Protocol System None of the above

What does TPS stand for?

Transfer Processing System Transaction Processing System Transfer Protocol System None of the above B Where are databases used? Business Research Administration All of the above D

What is NOT a goal of Customer Relationship Management (CRM)?

Treat customers as individuals Treat all customers the same Retain high-value repeat customers Retain low-value repeat customers

What is NOT a goal of Customer Relationship Management (CRM)?

Treat customers as individuals Treat all customers the same Retain high-value repeat customers Retain low-value repeat customers B Which is NOT a type of computer & network security threat? Worms Rootkit Fireware Phishing C

Which of the following is not a capability of a dashboard?

Trend Analysis Status Access Exception Reporting Marketing Management

Which of the following is not a capability of a dashboard?

Trend Analysis Status Access Exception Reporting Marketing Management D Which of the following is not a data type? Character Variable Integer Float B

True or False: Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior

True FALSE A R provides a wide variety of statistical and graphical techniques including time-series analysis linear and nonlinear modeling classical statistical tests all the above D

Using apps on your smart phones that broadcast your location to others is a harmless act.

Ture FALSE B Which of the following techniques are provided by R? Linear and nonlinear modeling Classical statistical tests Time-series analysis All of the above D

What is one of the three segments of a supply chain?

Upstream Internal External Both A and B

What is one of the three segments of a supply chain?

Upstream Internal External Both A and B D What command in R studio creates a vector named x? c() x() x = c() x = () C

Which of the following is NOT a segment of a supply chain?

Upstream Internal Reverse Downstream

Which of the following is NOT a segment of a supply chain?

Upstream Internal Reverse Downstream C Which of the following is NOT a bluetooth risk? Phishing Bluebugging Bluespamming Bluejacking A

Which is not a characteristic of Big Data?

Variety Structure Volume Velocity

Which of the following typically connects multiple LANs?

WAN LAN Router SDN

Which of the following typically connects multiple LANs?

WAN LAN Router SDN A What is defined as an expansion card that generates a feed of output images to a display? Mainframe CPU RAM Video card D

What is social engineering?

When centralizing planning is used to attempt to manage social changes and to regulate the future development in technology. When employees are discussing with each other different steps to a problem. When people are manipulated and disclose personal information such as their address and credit card number. When a legitimate employee is manipulated by a perpetrator to disclose confidential company information.

What is social engineering?

When centralizing planning is used to attempt to manage social changes and to regulate the future development in technology. When employees are discussing with each other different steps to a problem. When people are manipulated and disclose personal information such as their address and credit card number. When a legitimate employee is manipulated by a perpetrator to disclose confidential company information. D What is the best way to describe Rstudio? A program that runs and compiles data A suite of software (data, calculations, and graphical display) that has an environment where statistical are implemented. A program that compiles programming language. A suite of software (data, calculations, and graphical display) that compiles data inputs B

Which wall in the management cockpit room projects the performance of internal processes and employees?

White Black Blue Red

Which wall in the management cockpit room projects the performance of internal processes and employees?

White Black Blue Red C What is a process of programming workflow? Write code in an editor program Compile the code, which produces an executable file Run the program All of above D

_________ harness collective intelligence.

Wikis Web servers Mashups Tags

_________ harness collective intelligence.

Wikis Web servers Mashups Tags A Eriteans that have access to the internet often use ________. DSL Fiber Cable Dial Up D

Which of these statements about worms is NOT true?

Worms are self-replicating Worms are always attached to another non-malware program Worms do not need to be attached to another program Worms can transmit themselves across networks

Which of these statements about worms is NOT true?

Worms are self-replicating Worms are always attached to another non-malware program Worms do not need to be attached to another program Worms can transmit themselves across networks B How to secure your wireless network? Set up unique password for your device Turn SSID off Enable encryption such as WPA All of the above D

You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter.

You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter. You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter. You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter. You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter.

You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter.

You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter. You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter. You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter. You said: "Reading: & Lecture 16: -->U-z" But you did not assign the reading chapter. A What is/are the main ERP Application(s)? Core Applications Business analysis Applications None of the above Both A & B D

If a Real Time CRM is organizations that are able to respond to customers 24/7, then which of the following is an example:

Your Professor Southwest Airlines Your friend The local high school

If a Real Time CRM is organizations that are able to respond to customers 24/7, then which of the following is an example:

Your Professor Southwest Airlines Your friend The local high school B How can Hardware and Software be a basic security method? By downloading them on your computer It keeps your computer safe and sound It contains firewall, limits router settings, antivirus, use group policies, and automatic updates Makes storage for your files C

There is not a chapter 16 reading

a b c d

There is not a chapter 16 reading

a b c d A Which of these are limitations to using non-ERP systems In-house design limits connectivity outside the company Strategic decision-making is not supported and long-term maintenance costs are high Limits ability to engage in process reengineering All of the above D

what is a primary key?

a field within a record that does not uniquely identify that record a record that uniquely identifies a field a record that does does uniquely identify a field a field within a record that uniquely identifies that record

what is a primary key?

a field within a record that does not uniquely identify that record a record that uniquely identifies a field a record that does does uniquely identify a field a field within a record that uniquely identifies that record D which of the following is true about data? data and information are the same thing data are raw facts data are made up of assumptions information provides the building blocks for data B

What is master data?

a process that spans all organizational business processes and applications. a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems. an approach to managing information across an entire organization. a collection of logically related records.

What is master data?

a process that spans all organizational business processes and applications. a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems. an approach to managing information across an entire organization. a collection of logically related records. B What are advantages of a DBMS? Improved data sharing Decreased data security lower data integration Improved market intergration A

The push pull model begins with what?

a theory the solution a forecast a well thought out plan of what the possible solution should consist of

The push pull model begins with what?

a theory the solution a forecast a well thought out plan of what the possible solution should consist of what is an action of basic threat security? Set your browser to discard passwords immediately (not remember them) Download known content from trusted sites Only open email attachments from trusted sources all of the above D

What is an application service provider?

an agent or a vendor who assembles the software needed by enterprises and then packages it with services such as development, operations, and maintenance a software seller a hardware seller an app service A Which is Moore's law? Predicted in 1965 that the processing power of silicon chips would double every 18 months The value of a network grows roughly in line with the square of the number of its users Geared for economics and business Is often used for software application services A

Descriptive analytics_____

are the first step in data reduction refers to the process of searching for valuable business information in a large database, data warehouse, or data mart. summarize what has happened in the past and allow decision makers to learn from past behaviors a and c

Descriptive analytics_____

are the first step in data reduction refers to the process of searching for valuable business information in a large database, data warehouse, or data mart. summarize what has happened in the past and allow decision makers to learn from past behaviors a and c D Which of these is an example of an arithmetic sequence in C? a=5 b=a+2 a=5; b=a+2: C

Computer technologies become obsolete _______other organizational technologies.

at the same time as less often than more quickly than irrelevantly different than

Computer technologies become obsolete _______other organizational technologies.

at the same time as less often than more quickly than irrelevantly different than D Decisions about hardware are NOT focused on Appropriateness for the task Cost Speed Strategic value D

Transaction Processing Systems (TPS) must...

avoid errors and downtime manage reversals of transactions preserve audit trails all answers are correct

Transaction Processing Systems (TPS) must...

avoid errors and downtime manage reversals of transactions preserve audit trails all answers are correct D Information is: raw facts data provided by database analysis the result of processing raw data building blocks of data C

What might cause ERP implementation to fail?

bad match between software and processes inadequate education and training automating existing redundant processes all of the above

What might cause ERP implementation to fail?

bad match between software and processes inadequate education and training automating existing redundant processes all of the above D Which of the following is correct about Data Warehouse? The recommended data architecture for an ERP implementation includes separate operational and data warehouse databases. An ERP system must exist with a data warehouse. Data Warehouse is a one-dimensional database. A data warehouse cannot consume large amount of disk storage. A

Place the following members of the data hierarchy in the correct order:

bit - field - byte - record - file - database bit - byte - field - record - database - file bit - byte - field - record - file - database bit - record - field - byte - file - database

Place the following members of the data hierarchy in the correct order:

bit - field - byte - record - file - database bit - byte - field - record - database - file bit - byte - field - record - file - database bit - record - field - byte - file - database C Banjo makes sense of social networking noise primarily by _________. ignoring useless posts identifying structured data geolocating posts using Facebook algorithms C

Place the following members of the data hierarchy in the correct order:

byte - bit - record - field - database bit - field - byte - record - file - database bit - byte - field - record - database - file bit - byte - field - record - file - database

Place the following members of the data hierarchy in the correct order:

byte - bit - record - field - database bit - field - byte - record - file - database bit - byte - field - record - database - file bit - byte - field - record - file - database D What is Structural Independence? change file structure without affecting data access access to a file is dependent on its own structure data access changes when data storage characteristics change data storage characteristics do not affect data access A

The management of data across the entire organization is most accurately defined as:

data governance data integration data administration data control A Which of the following is NOT a role of DBMS? DBMS is the intermediary between the user and the database DBMS enables data to be shared DBMS integrates many users' views of the data DBMS stores data in private D

The management of data across the entire organization is defined as

data integration data control data administration data governance

The management of data across the entire organization is defined as

data integration data control data administration data governance D What database system consists of People Procedures Data All the above D

Electronic Surveillance is conducted by

employers the government both A and B None of the Above

Organizations can have customer information stolen, leading to what?

financial losses erosion of customer confidence legal action All of the above

Organizations can have customer information stolen, leading to what?

financial losses erosion of customer confidence legal action All of the above D What is malware? Choose the best option. A malicious software A malicious software consisting of a program A friendly software A friendly software consisting of a program B

Which statement about malware is correct?

malicious software consists of programming designed to disrupt or deny operation all of the above D what are the things you can do to secure your network? Have a strong password Encryption turn SSID off] all of the above D

Which major business functional areas do information systems support?

marketing human resources management accounting/finance all of the above

Which major business functional areas do information systems support?

marketing human resources management accounting/finance all of the above D Which of the following is NOT a characteristic of using pictures in presentations? It's difficult to find the "right" picture. Pictures are only useful if you want to make your presentation a "show". Presentations with pictures don't take a lot of time. Using pictures is complex. C

Which of the following is not apart of explicit knowledge

policies people reports goals

Which of the following is not apart of explicit knowledge

policies people reports goals B What does redundancy do reduces data inconsistency stores single and logical structure sources enables data sharing improves security A

What is NOT an the ethical issue related to IT?

privacy accuracy property banking

What is NOT an the ethical issue related to IT?

privacy accuracy property banking D Which does not address a privacy policy issue? data collection data accuracy data confidentiality data science D

Fundamental tenets of ethics include:

responsibility accountability liability all of the above

The law supports the right of employers to...

read employees' email read employees' electronic documents monitor employees' Internet use all of the above

The law supports the right of employers to...

read employees' email read employees' electronic documents monitor employees' Internet use all of the above D T, F, and NA mean... True, False, and Not Available True, False, and No Answer True, False, and Nothing Appears Trust, Friend, and Never Annonomous A

Which are HR functions?

recruitment HR maintenance and development HR planning and management all of the above

Which are HR functions?

recruitment HR maintenance and development HR planning and management all of the above D What is a basic programming concept? arithmetic loops functions all of the above D

How do you secure your wireless network?

set up a unique password for your device turn SSID off enable encryption: WPA all of the above

How do you secure your wireless network?

set up a unique password for your device turn SSID off enable encryption: WPA all of the above D Which is NOT a threat source? Social Media Microsoft word Cyberwarefare Location Information (GPS) B

Public clouds are not..?

shared easily accessible multi-customer IT infrastructures secured by a firewall

Public clouds are not..?

shared easily accessible multi-customer IT infrastructures secured by a firewall D Rstudio screen has four windows, which answer is not considered a window? Workplace and history Project Rscripts and data view Console B

What allows the user to see data in selective increasing levels of detail?

slicing and dicing consolidation drill-down none of the above

What allows the user to see data in selective increasing levels of detail?

slicing and dicing consolidation drill-down none of the above C How many stages of the data warehousing process are there? 1 3 5 7 C

The type of decision that can be made by following a definite procedure is called a(n) ______ decision.

structured unstructured undocumented semistructured

The type of decision that can be made by following a definite procedure is called a(n) ______ decision.

structured unstructured undocumented semistructured A Excel here is the most popular and common BA tool. TRUE FALSE A

The type of decision that can be made by following a definite procedure is called a(n) ______ decision.

structured unstructured undocumented semistructured A Which of the following can computers actually do? Add Subtract Multiply Divide A

The type of decision that can be made by following a definite procedure is called a(n) ______ decision.

structured unstructured undocumented semistructured A Why should you learn about computer programming? Coding develops structured and creative thinking Developing simple computer programs can help automate tedious or mundane tasks Most of you will not become computer programmers, but will likely interact with them. All of the above D

Privacy is:

the right to be left alone and to be free of unreasonable personal intrusions the right to search up anything online the right for the government to constantly observe me the right for my family to avenge me if anyone does me wrong

What do transaction processing systems (TRS) support?

the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data many interorganizational operations, of which supply chain management is the best known a particular functional area within the organization the clerical staff, lower and middle managers, and knowledge workers, by enabling them to develop documents (word processing and desktop publishing software), schedule resources (electronic calendars), and communicate (e‐mail, voice mail, videoconferencing, and groupware).

What do transaction processing systems (TRS) support?

the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data many interorganizational operations, of which supply chain management is the best known a particular functional area within the organization the clerical staff, lower and middle managers, and knowledge workers, by enabling them to develop documents (word processing and desktop publishing software), schedule resources (electronic calendars), and communicate (e‐mail, voice mail, videoconferencing, and groupware). A What is information literacy? Technical knowledge and skill in the use of computers and information technology. The ability to use computers to gather data and/or information. A series of applications that work together to meet a need, or to increase core productivity. The applications and programs needed to start, run and perform tasks on your computer. B

Privacy is:

the right to be left alone and to be free of unreasonable personal intrusions the right to search up anything online the right for the government to constantly observe me the right for my family to avenge me if anyone does me wrong A In R Studio, how do you write comments? Use parenthesis around the comment Use periods around the comment Put quotation marks around the comment Bold the words you want to comment C

When customers access a Web site and make purchases, they generate

tracking cookies information clickstream data web data

When customers access a Web site and make purchases, they generate

tracking cookies information clickstream data web data C In which of the following modern settings are databases used? business research administration all of the above D

Dashboards are made to be all of these but?

user friendly supported by graphics enables managers to examine exception reports and drill down into detailed data communicate with employees D Which of these are not a basic programming concept? Loops Arithmetic variables and assigments derivatives D

A ________ is any business event that generates data worthy of being captured and stored in the organization's database

transaction function process calculation A Key features of transaction processing systems include: Dependability Reliability Processing capacity All of these D

What is the most prevalent form of communications wiring, consists of strands of copper wire twisted in pairs?

twisted‐pair wire Coaxial cable Fiber‐optic cables double wires

What is the most prevalent form of communications wiring, consists of strands of copper wire twisted in pairs?

twisted‐pair wire Coaxial cable Fiber‐optic cables double wires A What is a computers principal characteristic(s)? It responds to a specific set of instructions in a well-defined manner. It can execute a prerecorded list of instructions (a program). It can quickly store and retrieve large amounts of data. all of the above D

Which is not a segment of the supply chain?

upstream internal downstream external

Which is not a segment of the supply chain?

upstream internal downstream external D To reduce security threats, you can do all of the following except only download content from trusted sites avoid updating your computer use a firewall use an antivirus software B

Dashboards are made to be all of these but?

user friendly supported by graphics enables managers to examine exception reports and drill down into detailed data communicate with employees

Which of the following is not an approach for ethical framework?

utilitarian approach common good approach fairness approach none of the above

Which of the following is not an approach for ethical framework?

utilitarian approach common good approach fairness approach none of the above D Which window in RStudio keeps a record of your work? files, plots, packages, help console RScript and data view workspace and history C

Which ethical framework provides least harm?

utilitarian fairness approach rightd approach common good approach

Which ethical framework provides least harm?

utilitarian fairness approach rightd approach common good approach A Which of the following isn't a value for logical vector? TRUE TBD FALSE NA B

What does VMI stand for?

vendor‐managed inventory Very Modern Interaction Vertical Management IT Vex Major IT

Which of the following is NOT a characteristic that distinguishes Big Data from traditional data?

volume velocity variety optimization

Which of the following is NOT a characteristic that distinguishes Big Data from traditional data?

volume velocity variety optimization D What is a data warehouse? stores data used for tactical or strategic decisions data distributed across several different sites supports a company's day-to-day operations data located at a single site A

Where does the procurement process originate and end at

warehouse to accounting department accounting to warehouse department sales to accounting department warehouse to sales department

Where does the procurement process originate and end at

warehouse to accounting department accounting to warehouse department sales to accounting department warehouse to sales department A why should you avoid titles having more than one line? you can have more than one line difficult to read and break 'uniformity' there should be no titles will merge in with your sub-title B


Conjuntos de estudio relacionados

Chapter 6 Entrepreneurship and Starting a Small Business

View Set

Penny Chapter 19 The Menstrual Cycle

View Set

Ch 27: Assessment of the Respiratory System

View Set

Information Systems: Wireless Computing

View Set

ECO 2006 - Chapter 9 - Part 3 (tax multiplier and balanced budget multipler)

View Set

Chapter 12 Cardiovascular Disorders [Complete]

View Set

CCSD Health Education Final Exam Quizlet

View Set