IST EXAM 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

_____ percent of individuals contribute to ______ percent of content

20, 80

country that does not have a GPS system

Australia

social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of

CRM

hackers use a botnet to perform

DDoS

"right to be forgotten" court order occurred in

Europe

can process unstructured as well as structured data

NoSQL

most recent example of ethical misbehavior in organizations

Wells Fargo

the entire business analytics process starts with

a business problem

if you bring your own router to school to set up wifi but do not have permission from the university to do this, this is

a rogue access point

company decides to not implement security procedures because employees don't comply anyway. this is an example of risk

acceptance

you only study for two hours for your next test, you fail the test and tell the teacher that they obviously did a really terrible job in teaching the material this means you aren't accepting _____ for you actions

accountability

issues that involve authenticity, fidelity, and correctness of information that is collected and processed

accuracy

many experts believe ____ is the solution to the challenge of making money from social networking sites and social commerce sites.

advertising

refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious

alien software

data hierarchy in order

bit, byte, field, record, file, database

short range wireless network

bluetooth

social computing increases

buyer power

data that visitors and customers produce when they visit a website and click on the hyperlinks

clickstream data

ethical standard states that respect and compassion for all others is the basis for ethical actions

common good

Ashley's Madison's data was first released on the ______ by _______

dark web, impact team

when varies copies of the data agree

data consistency

Credit card companies would most likely use which of the following to check for fraudulent credit card use?

data mining

belief that killing someone is wrong even in self defense is an example of the ______ approach

deontology

in the ____ phase of the decision-making process, managers construct a model that simplifies the problem

design

Which of the following is not a basic role of managers?

entrepreneurial

when an unauthorized individual attempts to gain illegal access to organization information

espionage

process of moving data from various sources into the data warehouse is called

extracting, transforming, loading

Improvements in information technologies are leading to a decreasing number of ethical problems.

false

unstructured decisions require combination of standard solution procedures and individual judgement (t/f)

false

from the 1950's until the early 1970's, organizations manager their data in a _______ this created _______

file management environment, information silos

The Sarbanes Oxley Act require publicly held companies to implement ________ controls because of the ____ crisis

financial, enron

how does society keep owner of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult questions because it involved the conflict between ____ and _______

freedom of speech, privacy

the rapid increase in the number of new smartphones in developing countries _______ been accompanied by a corresponding increase in mobile marketing because

has not, wireless data are still too expensive

computer crimes typically average ______of dollars and cause business ______ dollars of damage

hundreds of thousands, billions

answering the question "did this option work as proposed" occurs in the _______ phase of IDC

implementation

the development of mobile commerce is driven by all of the following except

increasing prices

As an individual student in your university's student database, you are a(n) _____ of the STUDENT class.

instance

databases minimize _____, this means

isolation, applications cannot access data associated with other applications

transmit data through electromagnetic waves

microwave

The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________.

mobility, broad reach

many publishers view ____ advertising as risky because it has the potential to erode the public's trust

native

organizations are turning to data governance because

of federal regulations

how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization

onboarding

used to uniquely identify a record

primary key

intellectual property is not protected under ____ laws

privacy

The greatest problem with GEO satellites is which of the following?

propagation delay

first step in the general framework for ethics

recognize an ethical issue

generally describes an entity

record

means that you accept the consequences of your decisions and actions

responsibility

the pursuit of the American dream and our ability to choose our religious orientation is a reflection of the _____ approach

rights

A company's annual employee evaluation best fits which type of decision?

semi-structured

The monitoring, collection, and analysis of socially generated data is called

social intelligence

volkswagen used _____ to cheat during emissions testing

software

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, and providing order status reports this is a ____ task and a ____ decision

structure, operation control

Computer support is greatest for which of the following problems?

structured and operation control

standardized language used to manipulate data is

structured query language

data in data warehouses are organized by

subject

find my iPhone is an example of

telemetry

Compared to data warehouses, data marts have which one of the following characteristics?

they cost less

most important benefit of knowledge management system

they make best practices available to employees

any danger to which a system may be exposed

threat

amount of bandwidth actually available for you to use

throughput

Digital dashboards provide all of the following capabilities except:

transaction processing

social marketplaces are an example of c2c commerce (t/f)

true

does not promote it's use of filter bubbles

twitter

which of the following is the most appropriate wireless technology for real time location of caregivers and mobile equipment in healthcare environments

ultra wideband

who decides what data should be stored in the organization's data warehouse?

users

ethical standard that states that an ethical action is one that provides the most good or least harm

utilitarian

minimizing the organization's carbon footprint and otherwise striving for "green IT" is an example of a _____ approach

utilitarian

3 characteristics of big data

volume velocity variety

buying a hot dogs at a stand using your contactless credit card you are using a

wireless electronic payment system


Conjuntos de estudio relacionados

ITSS 4360 Network Security Midterm

View Set

Florida Statutes Rules and regulations pertinent to life insurance

View Set

Speech Communications Final ch. 5-7 15-18

View Set

Notes #3 Scarcity and Opportunity Cost Period 4

View Set

Chapter 53: Assessment of Kidney and Urinary Function

View Set

Primavera U.S Government A CHECKPOINTS/EXAMS (2019)

View Set

Chapter 38 Vascular Disorders (Lewis)

View Set

ASCP Practice Questions Microbiology

View Set