MIS Test #2

¡Supera tus tareas y exámenes ahora con Quizwiz!

A DBMS makes the A) physical database available for different logical views B) logical database available for different analytical views C) physical database available for different analytical views D) logical database available for different physical views

A

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? A) Kant's Categorical Imperative B) the Golden Rule C) the Risk Aversion Principle D) the "No free lunch" rule

A

A field identified in a record as holding the unique identifier for that record is called the A) primary key B) key field C) primary field D) unique ID

A

A field identified in a table as holding the unique identifier of the table's records is called the A) primary key B) key field C) primary field D) unique ID

A

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends with A) two short marks B) one short mark C) a crow's foot D) a crow's foot topped by a short mark

A

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as A) responsibility B) accountability C) liability D) due process

A

All of the following are technologies used to analyze and manage big data except A) cloud computing B) noSQL C) in-memory computing D) analytic platforms

A

An alternative to using application server software for interfacing between a Web server a back-end databases is A) CGI B) HTML C) Java D) SQL

A

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the A) data dictionary B) data definition diagram C) entity-relationship diagram D) relationship dictionary

A

An example of autonomic computing is A) spyware protection software that runs and updates itself automatically B) software programmed to run on any hardware platform C) cell phones taking on the functions of handheld computers D) programming languages that allow non-programmers to create custom application

A

As referred to in the text, legacy systems are A) traditional mainframe-based business information systems B) electronic spreadsheets used on a PC C) any pre-1990 Wintel systems D) systems found on older ASPs

A

Big data does not refer to A) datasets with fewer than a billion records B) datasets with unstructured data C) machine-generated data (i.e. from sensors) D) data created by social media (i.e. tweets, Facebook likes)

A

Duplicate data in multiple data files is called data __________ A) redundancy B) repetition C) independence D) partitions

A

Hardware and software acquisition costs account for about ___________ percent of TCO A) 20 B) 40 C) 60 D) 80

A

In a relational database, a record is referred to in technical terms as a(n) A) tuple B) row C) entity D) field

A

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of A) property rights and obligations B) system quality C) accountability and control D) information rights and obligations

A

Intellectual property can best be described as A) intangible property created by individuals or corporations B) unique creative work or ideas C) tangible or intangible property created from a unique idea D) the expression of an intangible idea

A

Interpretations of Moore's law assert that A) computing power doubles every 18 months B) transistors decrease in size 50% every two years C) data storage costs decrease by 50% every 18 months D) none of these

A

OLAP is a tool for enabling A) users to obtain online answers to ad-hoc questions in a rapid amount of time B) users to view both logical and physical views of data C) programmers to quickly diagram data relationships D) programmers to normalize data

A

Oracle Database Lite is a(n) A) DBMS for small handheld computing devices B) Internet DBMS C) mainframe relational DBMS D) DBMS for midrange computers

A

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer. A) 4, 5, 3, 2, 1 B) 5, 4, 2, 3, 1 C) 4, 5, 2, 3, 1 D) 5, 4, 2, 1, 3

A

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as A) software packages B) mashups C) outsourced software D) open-source software

A

Re-designing and automating business processes can be sen as a double-edged sword because A) increases in efficiency may be accompanied by job losses B) increases in efficiency may be accompanied by job losses C) support for middle-management decision making may be offset by poor data quality D) reliance on technology results in the loss of hands-on knowledge

A

Running a Java program on a computer requires A) a Java Virtual Machine to be installed on the computer B) a Java Virtual Machine to be installed on the server hosting the Java applet C) a miniature program to be downloaded to the user's computer D) no specialized software, as Java is platform-independent

A

Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as A) Web services B) EAI software C) SOA D) SOAP

A

Software that manages the resources of the computer is called A) operating system software B) application software C) data management software D) network software

A

The Online Privacy Alliance A) encourages self-regulation to develop a set of privacy guidelines for its members B) protects user privacy during interactions with Web sites C) has established technical guidelines for ensuring privacy D) is a government regulating the use of customer information

A

The join operation A) combines relational tables to provide the user with more information than is otherwise available B) identifies the table from which the columns will be selected C) creates a subset consisting of columns in a table D) organizes elements in segments

A

The marketplace for computer hardware A) has become increasingly concentrated in top firms B) has expanded to include a wide variety of start-up and mobile-computing firms C) has moved significantly to Asian firms D) has been decimated by mobile and cloud computing

A

The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is A) Unix B) Linux C) OS X D) COBOL

A

The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n) A) information policy B) data definition file C) data quality audit D) data governance policy

A

The practice of contracting custom software development to an outside firm is commonly referred to as A) outsourcing B) scaling C) service-oriented architecture D) application integration

A

The process of presenting a set of computing resources (such as computing power of data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called A) cloud computing B) autonomic computing C) virtualization D) multicore processing

A

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called A) normalization B) data scrubbing C) data cleansing D) data defining

A

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called A) profiling B) phishing C) spamming D) targeting

A

What is the foundation technology for Web services A) XML B) HTML C) SOAP D) UDDI

A

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information? A) Privacy Act of 1974 B) Gram-Leach-Bliley Act of 1999 C) Freedom of Information Act D) HIPAA of 1996

A

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? A) total cost of ownership B) return on investment C) breakeven point D) cost-benefit analysis

A

Which of the five moral dimensions of the information age does spamming raise? A) quality of life B) system quality C) accountability and control D) information rights and obligations

A

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A) HIPAA B) Gramm-Leach-Bliley Act C) Privacy Protection Act D) Freedom of Information Act

A

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act

A

Which of the following is not an IT infrastructure service component? A) operating system software B) computing platforms to provide a coherent digital environment C) physical facility management to manage the facilities housing physical components D) IT managerial services to plan and develop the infrastructure and provide project management

A

Which of the following is not one of the current software platform trends? A) grid computing B) open-source software C) HTML5 D) software outsourcing

A

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? A) Assign responsibility B) Identify the stakeholders C) Identify the options you can reasonably take D) Identify and clearly describe the facts

A

Which of the following non-digital data storage items is most similar to a database? A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet

A

Which type of computing refers to firms purchasing computing power they use? A) on-demand B) grid C) edge D) autonomic

A

__________ are not held liable for the messages they transmit A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials

A

"Look and feel" copyright infringement lawsuits are concerned with A) the distinction between tangible and intangible ideas B) the distinction between an idea and its expression C) using the graphical elements of another product D) using the creative elements of another product

B

A SAN is a ___________ network A) server area B) storage area C) scalable architecture D) service-oriented architecture

B

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is A) acceptable, because the grocer suffers the least harm B) acceptable, because the higher value is the survival of the family C) wrong, because the man would not want the grocer to steal from him D) wrong, because if everyone were to do this, the concept of personal property is defeated.

B

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n) A) SOA B) SLA C) TCO D) RFQ

B

A nationwide magazine publisher has hired you to help analyze their social media data sets to determine which of their new publications are seen as the most trustworthy. Which of the following tools would you use to analyze this data? A) text mining tools B) sentiment analysis software C) Web usage mining technologies D) data mining software for identifying associations

B

A(n) _________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected A) opt-in B) opt-out C) P3P D) PGP

B

According to the _____________, you should take the action that produces the least harm A) Categorical Imperative B) Risk Aversion Principle C) Utilitarian Principle D) Golden Rule

B

DBMSs typicall include report-generating tools in order to A) retrieve and display data B) display data in an easier-to-read format C) display data in graphs D) perform predictive analysis

B

Data mining is a tool for allowing users A) quickly compare transaction data gathered over many years B) find hidden relationships in data C) obtain online answers to ad-hoc questions in a rapid amount of time D) summarize massive amounts of data into much smaller, traditional reports

B

In a multi-tiered network A) the work of the entire network is centralized B) the work of the entire network is balanced over several levels of servers. C) processing is split between clients and servers D) processing is handled by multiple, geographically remote clients

B

In a table for customers, the information about a single customer would reside in a single A) field B) row C) column D) table

B

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be A) part of a machine B) similar to books C) services D) artistic expressions

B

It is not feasible for companies to produce error-free software because A) any programming code is susceptible to error B) it is too expensive to create perfect software C) errors can be introduced in the maintenance stage of development D) any software of any complexity will have errors

B

Legacy systems are still used because they A) can only be run on the older mainframe computers B) are too expensive to redesign C) integrate well using new Web service technologies D) contain valuable data that would be lost during redesign

B

The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics except A) mobile privacy B) phasing out of self-regulatory codes C) data brokers D) large platform providers

B

The Do-Not-Track Act of 2011 A) allows firms to track customers if default given is opt-in B) requires firms to notify customers that they are being tracked C) allows firms to track customers if they do not sell the information to third parties D) requires firms to get customer sign-off before tracking them

B

The Project operation A) combines relational tables to provide the user with more information than is otherwise available B) creates a subset consisting of columns in a table C) organizes elements into segments D) identifies the table from which the columns will be selected

B

The business case for using grid computing involves all of the following except A) cost savings B) increased accuracy C) speed of computation D) agility

B

The confusion created by ___________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources A) batch processing B) data redundancy C) data independence D) online processing

B

The data dictionary serves as an important data management tool by A) assigning attributes to the data B) creating an inventory of the data elements contained in the database C) presenting data as end users or business specialists would perceive them D) maintaining data in updated form

B

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called A) due process B) accountability C) the courts of appeal D) the judicial system

B

The introduction of new information technology has a A) dampening effect on the discourse B) ripple effect raising new ethical, social, and political issues C) beneficial effect for society as a whole, while raising dilemmas for consumers D) waterfall effect in raising ever more complex ethical issues

B

The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called A) liability B) due process C) the courts of appeal D) accountability

B

The special organizational function whose responsibilities include physical database design and maintenance is called A) data administration B) database administration C) information policy administration D) data auditing

B

The specialized language programmers use to add and change data in the database is called A) a data access language B) a data manipulation language C) structured query language D) a data definition language

B

When a cookie is created during a Web site visit, it is stored A) on the Web site computer B) on the visitor's computer C) on the ISP's computer D) in a Web directory

B

Which of the following best describes how new information systems result in legal gray areas? A) They work with networked, electronic data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws C) They are implemented by technicians rather than managers D) They are created from sets of logical and technological rules rather than social or organizational mores.

B

Which of the following best illustrates the relationship between entities and attributes? A) the entity CUSTOMER with the attribute PRODUCT B) the entity CUSTOMER with the attribute PURCHASE C) the entity PRODUCT with the attribute PURCHASE D) the entity PRODUCT with the attribute CUSTOMER

B

Which of the following is a leading networking hardware provider? A) Dell B) Cisco C) Seagate D) IBM

B

Which of the following is not one of the main problems with a traditional file environment? A) data inconsistency B) program-data independence C) lack of flexibility in creating ad-hoc reports D) poor security

B

Which of the following is the most popular mobile operating system? A) Linux B) Android C) Chrome OS D) iOS

B

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) modality B) scalability C) exandability D) disintermediation

B

Which of the following statements about trade secrets is not true? A) Trade secret protections vary from state to state B) Any intellectual product, regardless of its purpose, can be classified as a trade secret C) Software that contains unique elements can be claimed as a trade secret D) Trade secret law protects the actual ideas in a product

B

__________ unleash powerful economies of scale and result in declines in manufactured computer products A) Internet and Web technologies B) Technology standards C) Linux and open-source software D) Client/server technologies

B

___________ are created by combining and customizing components from different online software applications A) Apps B) Mashups C) SaaS D) Web services

B

____________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships A) OLAP B) Text mining C) In-memory D) Clustering

B

A schematic of the entire database that describes the relationships in a database is called a(n) A) data dictionary B) intersection relationship diagram C) entity relationship diagram D) data definition diagram

C

A set of self-contained services that communicate with each other to create a working software application is called A) Web services B) EAI software C) SOA D) SOAP

C

A software tool with a graphical user interface for displaying. Web pages and for accessing the Web and other Internet resources is called a Web A) service B) client C) browser D) app

C

A tiny software object embedded in a Web page and used by tracking programs to monitor online user behavior is called A) spyware B) a super cookie C) a Web beacon D) a cookie

C

All of the following are current key technology trends raising ethical issues except A) data storage improvements B) data analysis advancements C) increase in multimedia quality D) increase in use of mobile devices

C

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called A) co-location B) edge computing C) grid computing D) utility computing

C

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called A) data auditing B) defragmentation C) data scrubbing D) data optimization

C

FIP Principles are based on the notion of the A) accountability of the record holder B) responsibility of the record holder C) mutuality of the interest between the record holder and the individual D) privacy of the individual

C

Flash cookies are different from ordinary cookies in that they A) are installed only at the user's request B) are not stored on the user's computer C) cannot be easily detected or deleted D) monitor the user's behavior at a Web site

C

How would you determine the market demand for your firm's IT services? A) Perform a TCO analysis B) Benchmark your services C) Hold focus groups to assess your services D) Analyze sales returns on key investments

C

In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where B) select, join, and where C) select, project, and join D) select, from, and join

C

In terms of data relationships, associations refers to A) events linked over time B) patterns that describe a group to which an item belongs C) occurrences linked to a single event D) undiscovered groupings

C

Linux is A) primarily concerned with the tasks of end users B) designed for specific machines and specific microprocessors C) an example of open-source software D) especially useful for processing numeric data

C

NORA is a A) profiling technology used by the EU B) federal privacy law protecting networked data C) data analysis technology that finds hidden connections between data in disparate sources D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives

C

SaaS refers to A) supplying online access over networks to storage devices and storage area network technology B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the internet C) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis D) none of the above

C

Specifications that establish the compatibility of products and the ability to communicate in a network are called A) network standards B) telecommunications standards C) technology standards D) Internet standards

C

The development of TCP/IP occurred during the ______________ era A) cloud and mobile computing B) general-purpose C) enterprise computing D) personal computer

C

The most prominent data manipulations language today is A) Access B) DB2 C) SQL D) Crystal Reports

C

The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers A) TCP/IP B) COBOL C) Ethernet D) ASCII

C

The tool that enables users to view the same data in different ways using multiple dimensions is A) predictive analysis B) SQL C) OLAP D) data mining

C

The type of logical database model that treats data as if they were stored in two-dimensional tables is the A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS

C

Today's nanotechnology-produced computer transistors are roughly equivalent in size to A) the width of a fingernail B) a human hair C) a virus D) an atom

C

U.S. businesses are allowed to use personal data from EU countries if they A) have informed consent B) create a safe harbor C) develop equivalent privacy protection policies D) make their privacy protection policies publicly available

C

What legal mechanism protects the owners of intellectual property from having their work copied by others? A) patent protection B) intellectual property law C) copyright law D) Fair Use Doctrine

C

Which of the following does grid computing utilize to create enormous supercomputing power? A) massive unused data centers B) underutilized mainframe computers C) networked computers with idle resources D) networks with low usage

C

Which of the following is not a method for performing a data quality audit? A) surveying entire data files B) surveying samples from data files C) surveying data definition and query files D) surveying end users about their perceptions of data quality

C

Which of the following statements about Linux is not true? A) It plays a major role in the back office running local area networks B) It is available in free versions downloadable from the Internet C) It has garnered 80 percent of the server operating system market D) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices

C

You are creating a database to store temperature and wind data from national airport locations. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table A) address B) city C) airport code D) state

C

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use data mining software that is capable of A) identifying associations B) identifying clusters C) identifying sequences D) classification

C

___________ can be induced by tens of thousands of repetitions under low-impact loads. A) CTS B) CVS C) RSI D) Technostress

C

A DBMS reduces data redundancy and inconsistency by A) enforcing referential integrity B) uncoupling program and data C) utilizing a data dictionary D) minimizing isolated files with repeated data

D

A characteristic or quality describing an entity is called a(n) A) field B) tuple C) key field D) attribute

D

A client computer networked to a server computer, with processing split between the two types of machines, is called a A) service-oriented architecture B) on-demand architecture C) multi-tiered client/server architecture D) two-tiered client /server architecture

D

A data warehouse is composed of A) historical data from legacy systems B) current data C) internal and external data sources D) historic and current internal data

D

All of the following are current hardware platform trends except A) green computing B) virtualization C) cloud computing D) Unix

D

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called A) grid computing B) utility computing C) virtualization D) autonomic computing

D

DBMS for midrange computers include all of the following except A) DB2 B) Oracle C) Microsoft SQL Server D) Microsoft Access

D

Data cleansing not only corrects errors but also A) establishes logical relationships between data B) structures data C) normalizes data D) enforces consistency among different sets of data

D

European privacy protection is __________ than in the United States. A) less far-reaching B) less liable to laws C) much less stringent D) much more strict

D

Immanuel Kant's Categorical Imperative states taht A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost C) one can put values in rank order and understand the consequences of various courses of action. D) if action is not right for everyone to take, it is not right for anyone to take

D

In the United States, the claim to privacy is protected primarily by each of the following except A) Constitutional guarantees of freedom of speech and association B) Privacy Act of 1974 C) Fourth Amendment protections against unreasonable search and seizure D) COPPA

D

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of A) family and home B) property rights and obligations C) system quality D) quality of life

D

Microsoft SQL. Server is a(n) A) DBMS for small handheld computing devices B) Internet DBMS C) desktop relational DBMS D) DBMS for midrange computers

D

One of the difficulties of patent protection is A) that only the underlying ideas are protected B) digital media cannot be patented C) preventing the ideas from falling into public domain D) the years of waiting to receive it

D

The "do anything anywhere" computing environment can A) make work environments much more pleasant B) create economies of efficiency C) centralize power at corporate headquarters D) blur the traditional boundaries between work and family time

D

The Federal Trade Commission FIP principle of Notice/Awareness states that A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use C) there is a mechanism in place to enforce FIP principles D) Web sites must disclose their information practices before collecting data

D

The U.S. Department of Commerce developed a ____________ framework in order to enable U.S. businesses to legally use personal data from EU countries A) COPPA B) P3P C) PGP D) safe-harbor

D

The ethical "no free lunch" rule states that A) if an action cannot be taken repeatedly, then it is not right to be taken at any time B) one should take the action that produces the least harm or incurs the least cost C) one can put values in rank order and understand the consequences of various courses of action D) everything is owned by someone else, and that the creator wants compensation for this work

D

The introduction of the minicomputer A) allowed computers to be customized to the specific needs of departments or business units B) enabled decentralized computing C) offered new, powerful machines at lower prices than mainframes D) all of the above

D

The logical view A) shows how data are organized and structured on the storage media B) presents an entry screen to the user C) allows the creation of supplementary reports D) presents data as they would be perceived by end users

D

The most common source of business system failure is A) software bugs B) software errors C) hardware or facilities failures D) data quality

D

The practice of spamming has been growing because A) telephone solicitation is no longer legal B) it is good advertising practice and brings in many new customers C) it helps pay for the Internet D) it is so inexpensive and can reach so many people

D

The select operation A) combines relational tables to provide the user with more information than is otherwise available B) creates a subset consisting of columns in a table C) identifies the table from which the columns will be selected D) creates a subset consisting of all records in the file that meet stated criteria

D

The strength of patent protection is that it A) puts the strength of law behind copyright B) allows protection from Internet theft of ideas put forth publicly C) is easy to define D) grants a monopoly on underlying concepts and ideas

D

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) data normalization B) data accuracy C) data redundancy D) data inconsistency

D

Which of the five moral dimensions of the information age do the central business activities of Choice Point raise? A) property rights and obligations B) system quality C) accountability and control D) information rights and obligations

D

Which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades? A) network economics B) law of mass digital storage and Moore's law C) declining communications costs, universal standards, and the Internet D) all of the above

D

Which of the following is not an example of the emerging mobile computing platform? A) tablets B) the Kindle C) cell phones D) CRM

D

Which of the following is not one of the NIST defined characteristics of cloud computing? A) ubiquitous network access B) location-independent resource pooling C) rapid elasticity D) non-measured service

D

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure? A) your firm's business strategy B) the IT investments made by competitor firms C) market demand for your firm's services D) your firm's organizational culture

D

Which of the following is not one of the practices added in 2010 by the FTP to its framework for privacy? A) Firms should build products and services that protect privacy B) Firms should increase the transparency of their data collection C) Firms should require consumer consent and provide clear options to opt out of data collection D) Firms should limit the length of time that any personal data is stored to six months or less.

D

Which of the following is not one of the techniques used in Web mining? A) content mining B) structure mining C) server mining D) user mining

D

Which of the following technologies would you use to analyze the social edia data collected by a major online retailer? A) OLAP B) data warehouse C) data mart D) Hadoop

D

Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers? A) networking B) telephone C) VOIP D) telecommunications

D

Which type of software is created and updated by a worldwide community of programmers and available for free? A) software packages B) mashups C) outsourced D) open source

D

You work for a national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of A) identifying associations B) identifying clusters C) identifying sequences D) classification

D

A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database

False

A data warehouse is typically comprised of several smaller data marts

False

A grouping of characters into a work, a group of words, or a complete number is called a record

False

A primary example of a centralized processing is client/server computing

False

According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.

False

Advances in data storage have made routine violation of individual privacy more difficult

False

Any unsolicited e-mail is legally considered spam

False

Application server software is responsible for locating and managing stored Web pages

False

Autonomic computing is implemented primarily with enterprise or ISP servers

False

Because HTML was designed as a cross-platform language, it is the preferred method of communicating with back-end databases

False

Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site.

False

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

False

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

False

IT infrastructure consists of just those physical computing devices required to operate the enterprise

False

Most American and European privacy law is based on a set of five principles called COPPA.

False

OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases

False

TCO refers to the original cost of purchased technology: both hardware and software

False

The Copyright Office began registering software programs in the 1990s.

False

The decision to outsource software development is also referred to as the rent-versus-buy decision

False

The disadvantages of using a Web interface for a database is that it typically requires substantial changes to the internal database

False

The key concepts in patent law are originality, novelty, and value.

False

The last step in analyzing an ethical issue should be to identify the stakeholders- people who have a vested interest in the outcome of the decision.

False

The technology challenges facing the U.S. Army, as discussed in the chapter case, illustrates the current trend in software of outsourcing application development

False

Today most business firms have discontinued operating their legacy systems, replacing these with inexpensive Web services and hosted software

False

Whereas XML is limited to describing how data should be presented in the form o Web pages, HTML can perform presentation, communication, and data storage tasks

False

A DBMS separates the logical and physical views of the data

True

A data warehouse may be updated by a legacy system

True

An application server may reside on the same computer as a Web server or on its own dedicated computer

True

Common Gateway Interface is a specification for processing data on a Web server

True

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

True

Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource

True

Data cleansing is the same process as data scrubbing

True

Data governance deals with the policies and processes for managing the integrity and security of data in a firm

True

Each characteristic or quality describing a particular entity is called an attribute

True

Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business

True

Every record in a file should contain at least one key field

True

Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document

True

In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers

True

In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web server for delivery in the form of a Web page to the user.

True

In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships

True

In green computing, reducing computer power consumption is a top priority

True

In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.

True

Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses

True

Most Internet businesses do very little to protect the privacy of their customers

True

NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and relations

True

OLAP is used for multidimensional data analysis

True

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

True

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

True

Program-data dependence refers to the coupling of data stored in files and software programs that use this data sch that changes in programs require changes to the data

True

SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers

True

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down

True

Spyware is software that comes hidden in download applications and can track your online movements

True

Technostress is a computer-related malady whose symptoms include fatigue.

True

The European Parliament has passed a ban on unsolicited commercial messaging

True

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service oriented architecture

True

The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.

True

The most common type of computer-related RSI is CTS

True

The operating system is used to manage the computer's activities

True

Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based

True

With in-memory computing, a computer's primary memory (RAM) is used for processing

True


Conjuntos de estudio relacionados

Chapter 13: Aging and the Elderly

View Set

BIOL 1408, Smartbook Chapter 7: DNA Structure

View Set

Chapter 19 - The Identification of goods and the passage of title

View Set

BADM 403 - Practice Quizzes Week 1-3

View Set

Life and Health Insurance ExamFX

View Set

Business Ethics Test #2 Chapter 5

View Set

Chapter 1: Introduction to Environmental Science

View Set