Cumulative Exam 2 (Modules 4-6)
Which of the following forms of intellectual property protection requires that the property be the subject of a nondisclosure agreement?
Trade secret
A foreign key is a field that links to a separate table.
True
Data governance encompasses an organization's policies and procedures through which data can be managed as an organizational resource.
True
Most Internet businesses do very little to protect the privacy of their customers.
True
OLAP enables users to view data from different perspectives.
True
Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.
True
Linux is:
an example of open-source software.
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.
behavioral targeting
The use of multiple computers linked by a communications network for processing is called:
distributed processing.
CVS refers to:
eyestrain related to computer display screen use.
A field that uniquely identifies each record so that the record can be retrieved, updated, or sorted, is known as the:
key field.
Each table in a relational database has one field designated as its primary:
key.
In the context of data mining, the term associations refers to:
occurrences linked to a single event.
Relational databases organize data into two-dimensional tables called:
relations.
In a relational database, the three basic operations used to develop useful sets of data are:
select, project, and join.
All of the following are examples of wearable computing devices except:
smartphones.
Microsoft Excel is an example of:
spreadsheet software.
A website that uses cookies to monitor and track visitors to the website:
stores the cookie on the visitor's computer or mobile device.
According to ________, you should take the action that produces the least harm.
the risk aversion principle
All of the following are factors in U.S. federal sentencing guidelines with respect to business executives except:
the use of technology to commit the crime.
Which of the following types of software directs a computer to complete a specific task for an end user?
Application software
Which of the following is used to predict when a computer hardware system becomes saturated?
Capacity planning
Which of the following protects the authors of a book from having their work copied by others?
Copyright law
Which of the following types of software organizes and manages data, such as data concerned with inventory, customers, and vendors?
Data management software
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
Due process
Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support.
False
Client/server computing is the most widely used form of centralized processing.
False
Due process is a feature of political systems and allows individuals to recover damages done to them by others.
False
Software used to create an invoice is an example of systems software.
False
Text mining is the discovery of useful patterns on the web.
False
XML is limited to describing how data should be presented in the form of web pages, while HTML can perform presentation, communication, and storage of data.
False
Today, most system software is custom built by in-house programmers.
False
Which of the following best describes Immanuel Kant's categorical imperative?
If an action is not right for everyone to take, it is not right for anyone to take.
What type of device gathers data and converts them into digital form for use by the computer?
Input device
Which of the following best describes the importance of creating an accurate data model for your business's database?
It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.
Which of the following allows the EU to enforce GDPR requirements with non-EU countries?
Privacy shield agreements
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?
Quality of life
Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?
RSI
Which of the following is a type of logical database model that treats data as if they were stored in two-dimensional tables?
Relational database
A(n) ________ is a set of self-contained services that communicate with each other to create a working software application.
SOA
All of the following are tools or technologies that can be used to extract information from unstructured data sets except:
SQL queries.
Data storage in smartphones and tablets, as well as many PCs, is based on which of the following technologies?
SSDs
Which of the following software tools would you use to prepare a what-if analysis?
Spreadsheet
Which of the following can be used to analyze direct and indirect costs to help determine the actual cost of a specific technology implementation?
TCO model
Which of the following statements about client/server computing is not true?
The bulk of processing occurs on the client.