IS 2000
i <- regexpr(some.text, pattern = "^[A-Z]*.ml")[1] if (i == ___) { print("pattern not found") }
-1
Complete the XML document below to make it well-formed
/language>
Enter the line number below where the XML document has a mistake. There are two mistakes
15 and 17
Enter the line number below where the XML document has a mistake. There are two mistakes
15 and 20
Enter the line number below where the XML document has a mistake.
16
Why is collection management not a separate context for information management
Collection management is a type of information management that is important in all 'memory institutions'
T or F? Every XML file must have a DTD
False
True or False? XML is a programming language similar to JavaScript.
False
Which of the following statements about XSLT are true? Check all that apply.
XSLT can produce any text file as output. An XSLT stylesheet is an XML document.
Write a regular expression pattern that would successfully match all strings in the first vector v but none in the second vector r in the R code below.
^[0-9]+[.][0-9][0-9]$
An XML document is well-formed if it __________. • has only one child element under the root element • is valid • a valid nesting of XML tags • contains a DTD
a valid nesting of XML tags
You recently noticed that your personal information has been altered on your university web account. You know that you did not make any changes and the registrar's office has no record of their office making changes. What type of unauthorized access are you a victim of?
active
Patricia has the following code below after reading an XML file that contains elements like these: <aid>12,56,9,234</aid>. How does she get access to the individual IDs, i.e., 12, 56, 9, and 234. Add the missing R code to make the statement execute properly.
answer 1: strsplit answer 2: substr answer 3: nchar
Generally, a for loop in any R program can be replaced with the _________ function which has a more efficient processing time.
apply
Alicia and Yifei both develop an ontology for their business domain but do so separately and independently. These two ontologies are _________. A: guaranteed to be the same as they are both for the same business domain B: are very likely different as there's no correct way to model a domain C: the same if both use a linear process to develop them D: subject to the same biases
are very likely different as there's no correct way to model a domain
In the UML Class Diagram below, the relationship between Zoo and Animal is a(n) _________ relationship.
association
Using a unique username and a complicated password is one possible method to verify that a user is who they say they are. What type of goal is this?
authentication
//PLANT[_______]/COMMON
last()-1
Using the built-in data set cars in R, complete the command to calculate the average of the speed column.
mean(cars$speed)
Which of the following can fill the blank space marked by ________ below in accordance with the rules of XML? Check all that apply.
measure = "cups" measure = 'cups'
Fill in the missing part in the XSL code below:
select
What is software that monitors transmissions, capturing unauthorized data of interest called?
sniffer
A ________ defines super and subclass hierarchies. • class • partonomy • taxonomy • formal axiom
taxonomy
Add the missing code so that the result of the R code fragment below returns the number of words.
unlist
Complete the R statement below that lists all rows from the data frame df where the conditions are true. df <- ToothGrowthdf[_____(df$len > 10 & df$dose < 1),]
which
Fill in the missing code in the highlighted part below
xml_xslt
In the code below, enter the missing XSL expression marked in yellow to ensure that the employee's name is only printed if their salary is greater than 250,000. Do not add extra spaces where not required. <xsl:template match="/employees/employee"><_____________________><xsl:value-of select="name" /></xsl:if></xsl:template>
xsl:if test="salary>250000"
Given the following information, which of the statements below are *not* correct for the UML Class Diagram below. Check all that apply. • At TTCG, courses are organized into modules. • Each module is dedicated to a topic and is divided into units that last no more than 20 minutes, so that three units are an hour of material. • Modules can be shared between courses. • To support teaching a unit requires a presentation deck, at least one example, and an exercise. It also needs instructor notes to support • delivery by other instructors. • Each presentation slide deck is one or more slides plus pre-recorded videos and demonstrations. These elements are commonly called presentation materials. They are often shared between units of different courses. • The Exercise class is missing and should be on the diagram. • The aggregation relationship between Course and Module is appropriate as presented. • The composition relationship between Unit and Example is on the correct end of the relationship. • The SlideDeck class should really be called PresentationDeck. • The multiplicity on SlideDeck is correct.
• The composition relationship between Unit and Example is on the correct end of the relationship. • The multiplicity on SlideDeck is correct.
Which of these are patient right afforded by HIPAA? Check all that apply.
• View and obtain copies of all medical records • Request an amendment to records • Control who is informed about their health information • Restrict information
Which of these are not common forms of bias? Check all that are not common or correct. • anchoring effect • projection bias • in-group bias • negativity bias • pre-purchase rationalization • selective neglect bias • increased likelihood bias
• pre-purchase rationalization • selective neglect bias • increased likelihood bias
Sandeep has a text file that was the result of an export of transactions from Mint. The fields are separated by commas. The first line of the file contains labels for each column. Which of these are correct functions to use to load the file into a data frame?
• read.csv(fileName,header=TRUE,quote="",stringsAsFactors=FALSE) • read.csv(fileName,header=TRUE,quote="",sep=",")
Collection management is usually understood as comprising all the processes which are involved in the creation and maintenance of a collection. Four of the eight usually included processes are listed below. Select the correct four from the list below.
• selection • acquisition • provision of access • evaluation of use
Nonaka and Takeuchi introduced the SECI model (Nonaka & Takeuchi 1996) which has become the cornerstone of knowledge creation and transfer theory. They proposed four ways that knowledge types can be combined and converted, showing how knowledge is shared and created in the organization. Which are they? • selection • externalization • correlation • independence • socialization • internalization • combination
• selection • externalization • socialization • internalization • combination
Complete the DTD below so that the XML document would be valid according to the DTD.
#PCDATA
Jan complains that they cannot calculate the standard deviation or the mean on the bmi column in the dataframe patients.df which they read from an XML as below. He has a similar problem with age. patients.df <- xmlToDataFrame("patients.xml", colClasses = c(_________))
'numeric','integer'
Fill in the missing DTD so that an XML file containing this DTD would allow for multiple DAY tags within a CHANNEL and the constraint that at least one DAY tag must be specified.
+
which of the following statements about this bubble chart are correct
- the size of a bubble encodes additional data dimension - bubble charts are a form of scatter plot
For an interview to yield information effectively, it should be no more than __ long and ideally be conducted _______. • 45 minutes, in the morning • 90 minutes, in the morning • two hours, when convenient to domain expert • an hour, within a week after scheduling • 30 minutes, in the afternoon
45 minutes, in the morning
Enter the line number below where the XML document has a mistake.
5
Janet received three time estimates from her business analyst for the roll-out of a new information system. The analyst believes that it could take as little as 3 days. However, should the vendor not be ready and the server operating system upgrade require a hardware upgrade, then it could potentially take 11 days. But her best guess is that it's about a five day job. Using wide-band Delphi what is the estimate for this task?
6 [5.6667] Excel Workbook
Which line in the XML document below is incorrect? Enter only the line number below.
7
The <xsl:stylesheet> XSL element is equivalent to which of the following?
<xsl:transform>
Complete line 4 in the DTD below so that the XML document would be valid according to the DTD.
?
In the code below, enter the missing XSL expression to ensure that the value printed is each employee's id. <xsl:for-each select="employees/employee">...Employees ID <xsl:value-of select="_______" />...</xsl:for-each>
@id
Consider the UML Class Diagram regarding a petting zoo below and answer these questions. Which of the following statements is true? • An animal can live at multiple zoos. • A petter may adopt no more than one animal. • Each adoption is for several animals. • An animal can only be adopted by a single petter.
A petter may adopt no more than one animal.
In an ontology, class C with attributes AC is a subclass of class B with attributes AB, which, in turn, is a subclass of class A with attributes AA. Which of the following axioms is true? • AC ⊂ AA • AA ⊂ AC • AC ⊂ AB • AB ⊂ AA
AA ⊂ AC
One of the key mistakes that data analysts often make when creating charts for presentations is to ______?
ALL OF THE ABOVE • display the raw data in a table • show all of the data • create exploratory visuals to show the audience the analysis process • use small fonts that are hard to read
Complete the R code below so that it produces the output below the code. Do not add extra spaces:
Answer 1: regexpr Answer 2: substring Answer 3: regexpr Answer 4 substring Answer 5 pos2-1
James has been observing the roulette wheel at Park Plaza Casino and saw that the past thirty spins were all red, so he decides to put all his money on black as it is way overdue. He is falling prey to the _________ type of bias.
Gambler's Fallacy
What relationship exists between domain entities (business objects) Highlighter and WritingInstrument? • Association • Dependency • Realization • Generalization • Composition
Generalization
When creating a heat map, the data analyst should follow which of the following design choices?
Gradients of a single color
Which federal privacy regulation protects personal health information and regulates with whom a health care provider can share the information?
HIPAA
Which of the following statements is false regarding information as a resource
Information as a resource is very similar to every other resource in terms of management.
What is an XSLT Stylesheet?
It contains sets of rules and instructions used for transformations.
Which of these statements about encrypting a ZIP file with a password are true? Check all that apply.
It is a private key encryption scheme that requires all parties to know the key
The data analyst at Ravix International is preparing a that shows the number of new hires for the past 8 years. What kind of chart or graph would you recommend she uses? [dimitri]
Line Graph
An aggregation relationship (in which the part is not permanently fused to its container) is represented in UML notation by a _______. • Line with hollow diamond at one end • Line without an arrow • Line with solid diamond at one end • Line with an arrow at one end
Line with hollow diamond at one end
A composition relationship (in which the part is permanently fused to its container) is represented in UML notation by a _______. • Line with an arrow at one end • Line with solid diamond at one end • Line without an arrow • Line with hollow diamond at one end
Line with solid diamond at one end
Inheritance/generalization relationships (i.e., taxonomies) are represented in the UML notation by which of these? • Lines with solid triangular arrow at both ends • Lines with hollow triangular arrow at one end • Lines with solid diamond at one end • Lines with hollow diamond at one end
Lines with hollow triangular arrow at one end
Which of the following refers to security solutions that protect access to systems, applications, or data by ensuring users or systems are authenticated and allowed to have such access?
Logical Access Controls
Larissa needs to build an XML file and she's chosen to construct a test file manually. Which editor would not work for this purpose?
Microsoft Word
What is identity theft?
One uses another person's personal information for fraudulent activities.
Which of these below is a valid example of a taxonomy? • A captain leads a crew. • A charter is run by a crew. • Powerboats, sailboats, and pontoon boats are all types of vessels. • Books are collections of pages. • FedEx, UPS, DHL, and USPS are all types of delivery carriers.
Powerboats, sailboats, and pontoon boats are all types of vessels.
What is a better assessment on the value of information and why?
Qualitative is better since there are underlying values that can't simply be expressed quantitatively.
Which of the following is NOT a process of archive management?
Retaining records so long as they are needed, and then destroying them or sending them for archival preservation.
Complete the acronym REFSENO -- Representation Formalism for ________ Ontologies.
Software Engineering
Given the following UML Class Diagram, which statement is correct: • An instance of B is connected to several instances of A • Class A is a subclass of class B • Some instances of B are not connected to any instance of A • Some instances of A are linked to multiple instances of B • Some instances of A may not be connected to any instance of B • A and B are both objects
Some instances of A may not be connected to any instance of B
For the XML document below, which of these statements are correct? Check all that apply.
The XML document is well formed The <to> element is a child of the <note> element
Which of the statements below about the SECI model proposed by Nonaka and Takeuchi (1996) is not correct? • It describes four ways in which knowledge types can be combined and converted, showing how knowledge is shared and created in the organization • Knowledge is continuously converted and created as users practice, collaborate, interact, and learn. • The process is continuous and iterative rather than a static model. • The process follows a sequentially arranged set of practices that result in encoded knowledge that an organization can store in a knowledge management system. • All of the above statements are correct. • None of the above statements are correct.
The process follows a sequentially arranged set of practices that result in encoded knowledge that an organization can store in a knowledge management system.
What are two of the main differences between archive management versus record management?
The process of archive management differs from record management in that you should be retaining archival records indefinitely, or until archive policy, with respect to particular records, changes.
Which of these statements about symmetric key encryption is true?
The same key is used for encryption as well as decryption.
What does this instruction mean? <xsl:apply-templates select="//div" />
This means "Find all the <div> elements in the document, and process them according to any applicable templates".
True or False? Every valid and well-formed XML document must contain the preamble similar to the one below: <?xml version="1.0" encoding="UTF-8">
True
Jeff is trying to transform an XML that contains exported data from an inventory management system into a CSV, so he can import it into SPSS for analysis. He successfully built the XSL but the first line in the CSV is always: <?xml version="1.0" ?>
Try using <xsl: output>
What is a more recent and more powerful encryption algorithm widely available in most wireless 802.11 routers?
WPA-2
True or False?
Whenever you click on a "Like" button on CNN.com to mark an article of interest to you, that information is sent to Facebook which may legally store that data, mine it, and use it to direct specific advertising to you.
Would you agree with the following statement about the SECI Model proposed by Nonaka & Takeuchi (1996)? The model has some weaknesses in that it presumes a strong culture, both organizational and national, specifically that culture acts as a limiting factor of the model and is not actually an element in a knowledge management model. • agree • disagree
agree
Biometrics are primarily used for one of two things. What are they?
authentication, identification
What should a data analyst do with information on a chart that is not essential to the story but important such as the source of the data or axis labels
blend them into the background through the use of a lighter color
Which of the following is not a preattentive attribute or pattern?
blending
Each class can be considered a _______ for storing data about a set of similar things.
blueprint
In a stacked bar chart the data analyst shows _______.
both an overall relative amount and the proportions of that amount
All potential primary keys for an entity, class, or table are called its __________ keys. • foreign • artificial • unique • candidate • surrogate • reference
candidate
An ontology design in generally driven by __________ or use cases. • requirements • formal methods • competency questions • classes
competency question
When talking about ontologies, a class describes a _______. • instance • concept • relation • data table
concept
When a person seeks information that is similar to what they already know and avoid other information that might disagree with their point of view or decision, we call such a person as being subject to _________ bias.
confirmation
What is the current most popular approach businesses use to assign value to information?
contingent valuation
All evaluations must be measured. Suggested by Wilfred Lancaster, a useful 6-way typology of what may be measured, contains six of the following seven choices. Which is NOT one of the suggested six?
cost-benefit-effectiveness
What kind of threat renders a system inoperative or limits its capability to operate?
denial of service
Preattentive Patterns
draw the audience to key elements of a visual
Horvath (2000) argues that one should differentiate between knowledge embodied in people and knowledge that is ______ in processes, organizational culture, routines, and such. • applied • used • embedded • organized
embedded
_______ knowledge refers to the knowledge that is locked in processes, products, culture, routines, artifacts, or structures.
embedded
When presenting information visually to an audience that summarizes findings, the analyst should produce which of these visuals?
explanatory
Gruber and Borst define an ontology as "[...] a ______, explicit specification of a shared conceptualization. A: tacit B: defined C: externalized D: formal
formal
Complete this R statement so that it properly parses the string to a data object: depDate <- as.Date("Dec 24/14", _____)
format='%b %d/%y'
IT and IS can be used to help map organizational knowledge areas and can be viewed as a tool in reverse engineering of products. What does this often uncover? • structure • models • hidden embedded knowledge • explicit knowledge
hidden embedded knowledge
A concept that information problems can become serious business problems is _________________.
information risk
Attributes such as name, student ID, major, birth date are examples of _______ attributes for a class Student. • instance • class • derived • inherited • descriptive
instance
Which of these are not properly named identifiers for a data frame object? Check all that apply.
is$married 79YTD
When constructing an ontology, the designer should ________. • always think of an implementation • only use UML to represent the ontology • keep it conceptual and independent of implementation • view them as representations of software structures
keep it conceptual and independent of implementation
Complete the DTD below so that the XML document would be valid according to the DTD.
nid
More than most documents, records have a distinct and predictable lifecycle. Which is NOT a stage in their lifecycle?
none of the above
A class is generally a _____ while a relation is generally a _____. • verb, noun • noun, verb • noun, adjective • verb, adjective
noun, verb
Which R command would you use to determine the total number of rows in the data frame df? Do not add extra spaces that are not required.
nrow(df)
Complete the R statement below so that the code runs. Do not add extra spaces. w <- "79.99" n <- as._______(w) usd <- n * currExch[7]
numeric
Consider o <- c(34,32,223,21,"null"). What is the R statement to access the 4th element? Do not add any spaces in your answer.
o[4]
Ravix' Business Analysis team has decided to use LucidChart as their primary charting tool and replace Visio. After having made the decision to switch, Srujan, the business analysis team lead, notices that many of the charts produced by his vendors appear to use LucidChart. In addition, he notices that LucidChart is among the most common charting tools and that many of his colleagues in other divisions are also using it. This type of bias is known as _________ bias.
observational selection
You are asked to provide your location and email address when downloading iTunes from the Apple site. You are also prompted to check a box if you would like any Apple News updates. This checkbox allows you to do what?
opt-in
When installing the latest version of Microsoft Edge, a dialogue box pops up with a box checked telling you that Bing will be your automatic search provider. You have the opportunity to change this selection before continuing. This checkbox allows you to do what?
opt-out
In a(n) ______ observation, subjects tend to ________, often called _______. • active, change the normal work procedure, the Halo effect • active, work faster, the Hawthorne effect • passive but visible, change the normal work procedure, the Hawthorne effect • active but invisible, follow the normal process, process crashing • passive and visible, be unaware of the observation, the Hawthorne Effect
passive but visible, change the normal work procedure, the Hawthorne effect
In an effort to limit the Hawthorne Effect during an observation of call center representatives to determine customer interaction skills, it is advisable to perform a ________ and _______ observation. • passive, invisible • active, invisible • invisible, remote • passive, in-context • selective, passive
passive, invisible
Which function or operator is used in R to concatenate multiple strings into a single string?
paste
You have received an email from your university IT department stressing that the IT department will NEVER ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from?
phishing
When considering security threats it is very important to consider _______ and _______ of the threat on the organization.
prevalence, impact
To encrypt its message payload, the secure socket layer (SSL) protocol uses which of these encryption schemes?
public key encryption
A focus group is an example of a ________ research method, while a post-implementation survey using Likert-scale questions is an example of a ________ research method. • qualitative, quantitative • quantitative, qualitative • mixed-method, quantitative • triangulation, mixed-method • exploratory, mixed-method • in-depth, superficial but fast
qualitative, quantitative
Karl needs a vector of 20 random numbers from 1 to 36. Help him complete the code below (only enter in your answer what is required to complete the code and make it run): r <- runif(_________)
r = runif(20,1,36)
For the built-in data set iris, what is the range of the Sepal.Length feature (column)? Enter a single number not upper and lower bounds.
r code: max(iris$sepal.length) - min(iris$sepal.length) 3.6
Non-randomized surveys often are subject to the _________ bias which described the situation where principally respondents at the extreme respond to the survey, often resulting in skewed data.
response
In the XML document below, the element (tag) <employees> is referred to as the _______. • primary tag • leaf element • root element or root • key element
root element or root
Assume that the XSL transformation (fragment) below is applied to the following XML document (fragment). In the code below, enter the missing XSL expression to ensure that the value printed is each employee's salary. <xsl:template match="/employees/employee">Salary is: <xsl:value-of select="______" /></xsl:template>
salary
What are cookies?
small text files stored by the browser on the client computer
What term is used to refer to someone (or something) pretending to be someone else (or another computer)?
spoofing
When creating a presentation, it is often advisable to _____ the key message
start with
Virginia Coastal College has gone through an extensive process of evaluating alternative LMS products to replace Blackboard. After a year-long selection process, they decided to stay with Blackboard and they felt it's the safe choice because everyone is familiar with the product, its flaws, and the vendor. This is an example of _________ bias.
status-quo
In the relationship, "helicopter is a particular type of aircraft", helicopter is a(n) ____________. • generalization • supertype • instance • subclass • entity • actor
subclass
To extract (get) the currency (which is always a letter followed by a symbol or two letters) from strings like "R$ 99.99" or "EU 149.50", you would use which Base R function? Check all functions that would apply.
substring substr
Which R command would you use to generate the following output for the built-in cars data set? Enter the full command to get the result below without adding extra spaces that are not required.
summary(cars)
Which one of the following is not common disadvantage of surveys for information collected? • self reporting may lead to bias • small response groups may bias the results • surveys do not provide adequate information on context • surveys are relatively inexpensive to conduct
surveys are relatively inexpensive to conduct
______ knowledge refers to intuitive, hard to define knowledge that is largely experience based. Because of this, that type of knowledge is often context dependent and personal in nature and thus hard to communicate and deeply rooted in action, commitment, and involvement.
tacit
In practice, all knowledge is a mixture of ______ and ______ elements rather than being one or the other. • ingrained, hidden • organized, unorganized • tacit, explicit • hidden, implicit
tacit, explicit
Inspect this XML file (plants.xml download) and then complete the XPath expression below that only returns the value of the matching elements, i.e., what is between the opening and closing tags. Do not add extraneous spaces. //PLANT/PRICE/
text()
When designing an ontology for some domain, the analyst discovers that two classes have several attributes in common. In such a situation, it is likely that ________. • one of these classes is a superclass of the others • it is a coincidence • the classes have a common superclass • all classes are part of another class • another class has each as a superclass
the classes have a common superclass
To combat viruses and other malware a company has adopted a whitelisting approach to managing computer security. What does that mean?
the company only allows certain pre-identified programs to run on its computers
True or False? A class represents a concept and not a term or word in a language, i.e., an ontology would have one class rather than a class for Car, another for Voiture (French), another for Carro (Portuguese), and another for Auto (German). • true • false
true
Which multiplicity expressions are valid in a UML Class Diagram showing relationships between domain entities? Check all that are valid. • 5..5 • * • -5..5 • 1 • 1..0 • 0..* • 2..10
• 5..5 • 1 • 0..* • 2..10
An ontology generally contains which of the following? Check all that apply. • Classes • Attributes • Relationships • Formal Axioms • Slots • Properties • XML
• Classes • Attributes • Relationships • Formal Axioms • Slots • Properties
For the wide-band Delphi estimation process, which of these statements are correct? Check all that apply.
• Delphi requires at least 2 rounds of estimates • after easch round, except the final round the estimates are discussed and the high and low estimators are asked to share their assumptions • the participants in Delphi are expected to be experts • The estimates must be provided anonymously by each participant
Knowledge Management Systems that contain facts and explicit information store which of the following? Check all that apply. • E-Mails • Names of people who know processes • Databases • Documents • Notes • Memos
• E-Mails • Databases • Documents • Notes • Memos
Which of the following are three elements to a knowledge management program?
• content, the type of knowledge to be shared, and the way in which it is represented • technology, the means by which it is shared • culture, promoting the sharing of knowledge
Data management is the management of structured sets of facts and figures instead of bodies of text. What does data management include? Check all that apply.
• database systems • data modeling • metadata • data quality and • security issues • archives and repositories
A class name in an ontology should _________. Check all that apply. A: define a concept B: should not be reserved word C: follow a naming convention such as camelCase D: be a verb E: be a noun
• define a concept • should not be reserved word • follow a naming convention such as camelCase • be a noun
When defining a relation (aka relationship) in an ontology, which of these are generally given or provided? Check all that apply. • name • source concept/class • target concept/class • cardinality/multiplicity • implementation
• name • source concept/class • target concept/class • cardinality/multiplicity
Which of the following statements about the UML Class Diagram below are correct? Check all that apply. • no video has more than two narrators • some videos may not have any narrators • all narrators are required to narrate videos • a video must have at least one narrator • every video is narrated by at least one narrator • the video on "Tactical Cat Breeding" has four narrators
• no video has more than two narrators • a video must have at least one narrator • every video is narrated by at least one narrator
Which of the following are components/the framework for information management? Select all that apply.
• policies and strategies • plans and objectives • missions and visions
In the XML document below, the element (tag) <photo> is referred to as a _______. Check all that are valid. • sibling element of <id> • leaf element or leaf • child element of <employee> • root element
• sibling element of <id> • leaf element or leaf • child element of <employee>
According to Horvath (2000) and Gamble & Blackwell (2001), embedded knowledge refers to knowledge that is locked in which of these? Check all that apply. • structures • routines • culture • data models • processes
• structures • routines • culture • processes
Which of the following statements about the UML Class Diagram below are correct? Check all that apply. • there are some examples which are not included in any lesson • some lessons may not have any examples • every lesson has at least one example • lessons are collections of tutorials and examples • some learning assets may not be allocated to a lesson
• there are some examples which are not included in any lesson • some lessons may not have any examples • lessons are collections of tutorials and examples • some learning assets may not be allocated to a lesson
What are some drawbacks of XML? Check all that apply.
• ΧΜL cannot be used for images • XML is not suitable for large data sets • XML can get difficult to read as the object structures get more complex