ISDS351 QUIZ 8 & 9 & 12

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The _____ represent the international consensus regarding the collection and management of personal information.

1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines

Who is appointed by an organization to define, implement, and oversee a set of data privacy policies?

A Chief Privacy Officer (CPO)

Which of the following enables rapid consolidation of financial data across multiple organizational units and countries?

A well-implemented enterprise resource planning system

Which of the following key features of a customer relationship management (CRM) system has the ability to evaluate customer data to identify ways to increase revenue and decrease costs and identify the firm's "best customers?"

Analysis

Which of the following data mining techniques uses a specialized set of algorithms that sorts through data and forms statistical rules about relations among the items?

Association analysis

Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?

Automatic license plate reader

_____ tools frequently operate on data stores in a data warehouse or data mart

Business intelligence

How does an enterprise resource planning (ERP) system achieve its goal of enabling easy access to business data and creating efficient, streamlined work processes?

By building a single database that is accessed by multiple software modules

_______ is the use of software to assist in the creation, analysis, and modification of the design of a component or product

Computer-Aided Design

Which of the following can increase the productivity of a designer, improve the quality of design, and create a database that describes a product?

Computer-aided Design

Identify the technique through which an SQL database ensures that other transactions do not modify a database until the first transaction succeeds or fails

Concurrency control

______ is a key feature of a customer relationship management (CRM) system that provides the ability to track data on individual customers and sales leads and then access that data from any part of the organization

Contact Management

Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer.

Customer Relationship Management

_____, a key feature of a customer relationship management system, is the ability to aid customer service representatives so that they can quickly thoroughly, and appropriately address customer requests and resolve customer issues while collecting and storing data about those interactions

Customer Support

_____ present a set of key performance indicators about the state of a process at a specific point in time

Dashboards

________ involves the overall management of the availability, usability, integrity, and security of the data used in an organization

Data governance

______ is a business intelligence (BI) tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making

Data mining

Which of the following business intelligence tools will help an organization to make business predictions

Data mining tools

Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective _____ program.

Data privacy

A ____ is a database that stores larger amounts of historical data in a form that readily supports analysis and management decision making in an organization

Data warehouse

Which of the following is an advantage of the hosted software model?

Decreased total cost of ownership

Dove, a famous book publisher has to publish a new book in the international market. He needs determine the interest readers may have in his book, and he needs to determine the pricing and advertising strategies accordingly. Which process of supply chain management can help the publisher determine the number of books to print?

Demand Planning

Identify the term that is used to describe the gulf between those who do and those who don't have access to modern information and communications technology.

Digital Divide

Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.

Doxing

______ is a powerful took that enables decision makers to gain insight into the details of business data to better understand why something happened

Drill-down analysis

A(n) _______ operates via an integrated database, using one set of data to support all business functions

Enterprise Resource System

The _____ prohibits the transfer of personal data to non-European Union nations that do not meet the European adequacy standard for privacy protection.

European Union Data Protection Directive

The Supreme Court has ruled that American citizens are protected by the _____ when there is a "reasonable expectation of privacy."

Fourth Amendment

A(n) ______ is a database management system that stores and entire database in random access memory (RAM)

In-memory database (IMDB)

Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy.

Increased legal liabilities

Identify the industry that implements data governance.

Insurance industry

_____ is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices.

Internet of Things

Which of the following is true of a cookie?

It captures browsing history for Web site customization and personalization purposes.

Which of the following is true about an enterprise system?

It employs a database of key operational and planning data that can be shared with authorized users across the organization

Which of the following best describes the relational database model?

It helps organize structured data into collections of two-dimensional tables

Identify a true statement about drill-down analysis

It involves the interactive examination of high-level summary data in increasing detail to gain insight into certain elements

Which of the following defines law?

It is a system of rules enforced by a set of institutions that states what a person can and cannot do.

Which of the following is true of the First Amendment to the U.S. Constitution?

It was adopted to guarantee Americans' rights to freedom of religion, freedom of expression, and freedom to assemble.

Metrics that consist of a direction, measure, target, and time frame are known as _____. Select one: a. key association indicators b. key performance indicators c. online analytical processors d. drill-down analysis indicators

Key performance indicators

______, a supply chain process, establishes a network of warehouses for storing products, chooses carriers to deliver products to customers, and schedules carrier pickups so that products are delivered to the customers or warehouse on a timely basis

Logistics

_____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.

Net Neutrality

A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email, Internet, and phone usage were not private and that their use might be monitored.

Private

_______ is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information.

Product Life Cycle Management

How are small and medium-sized enterprises (SMEs) benefited by the hosted software model?

SMEs can experiment with powerful software capabilities without making a major financial investment

Identify the framework developed by the U.S. Department of Commerce and the European Commission to ensure that U.S. companies don't experience interruptions in their dealings with countries in the European Union.

Safe Harbor

Which of the following is a process of supply chain management that chooses suppliers and establishes contract terms to provide the raw material needed to create a product?

Sourcing

_______ includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversion of a raw materials to finished products, and the warehousing and delivery of finished products to customers

Supply Chain Management

Which of the following policies should be agreed by a user before joining a social networking page?

Terms of Use policy

A large multinational firm that facilities in the US and Mexico City has an annual revenue of #3 billion. This firm will be targeted by _____ enterprise resource planning (ERP) vendors

Tier 1

Which of the following enterprise resource planning system solutions is the most expensive to implement and support?

Tier 1

______ enterprise resource planning system solutions are highly complex

Tier 1

Which of the following is the goal of supply chain management?

To reduce the overall investment in inventory, decrease costs, and improve customer service

Mapua Corp., a multinational corporation based in Germany, has decided to relocate its business to Japan. It faces difficulties in transferring the personal data of its employees from Germany to Japan. Which of the following is causing this difficulty?

d. The European Union Data Protection Directive

Database built to support online analytic processing (OLAP) consist of _________.

data cubes

The ACID (Atomicity, Consistency, Isolation, Durability) properties of SQL databases ensure _________.

data integrity

A(n) ______ is used to pull data from disparate data sources to populate and maintain a data warehouse

extract-transform-load (ETL) process

Social networking users are prone to _____.

identify theft

In-memory databases (IMDB) have become feasible because of the decrease in _______ capacities

random access memory (RAM)

Which of the following business intelligence tools performs operations on data based on formulas created by the end user?

spreadsheet

data that does not fit into relational databased is known as ______

unstructured data


Kaugnay na mga set ng pag-aaral

Heteronormativity & Queer Engagements

View Set

Marketing Test Ch 20, 13, 9, & 16

View Set

A & P Lecture Exam #4 (Questions)

View Set