IST EXAM 2
_____ percent of individuals contribute to ______ percent of content
20, 80
country that does not have a GPS system
Australia
social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of
CRM
hackers use a botnet to perform
DDoS
"right to be forgotten" court order occurred in
Europe
can process unstructured as well as structured data
NoSQL
most recent example of ethical misbehavior in organizations
Wells Fargo
the entire business analytics process starts with
a business problem
if you bring your own router to school to set up wifi but do not have permission from the university to do this, this is
a rogue access point
company decides to not implement security procedures because employees don't comply anyway. this is an example of risk
acceptance
you only study for two hours for your next test, you fail the test and tell the teacher that they obviously did a really terrible job in teaching the material this means you aren't accepting _____ for you actions
accountability
issues that involve authenticity, fidelity, and correctness of information that is collected and processed
accuracy
many experts believe ____ is the solution to the challenge of making money from social networking sites and social commerce sites.
advertising
refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious
alien software
data hierarchy in order
bit, byte, field, record, file, database
short range wireless network
bluetooth
social computing increases
buyer power
data that visitors and customers produce when they visit a website and click on the hyperlinks
clickstream data
ethical standard states that respect and compassion for all others is the basis for ethical actions
common good
Ashley's Madison's data was first released on the ______ by _______
dark web, impact team
when varies copies of the data agree
data consistency
Credit card companies would most likely use which of the following to check for fraudulent credit card use?
data mining
belief that killing someone is wrong even in self defense is an example of the ______ approach
deontology
in the ____ phase of the decision-making process, managers construct a model that simplifies the problem
design
Which of the following is not a basic role of managers?
entrepreneurial
when an unauthorized individual attempts to gain illegal access to organization information
espionage
process of moving data from various sources into the data warehouse is called
extracting, transforming, loading
Improvements in information technologies are leading to a decreasing number of ethical problems.
false
unstructured decisions require combination of standard solution procedures and individual judgement (t/f)
false
from the 1950's until the early 1970's, organizations manager their data in a _______ this created _______
file management environment, information silos
The Sarbanes Oxley Act require publicly held companies to implement ________ controls because of the ____ crisis
financial, enron
how does society keep owner of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult questions because it involved the conflict between ____ and _______
freedom of speech, privacy
the rapid increase in the number of new smartphones in developing countries _______ been accompanied by a corresponding increase in mobile marketing because
has not, wireless data are still too expensive
computer crimes typically average ______of dollars and cause business ______ dollars of damage
hundreds of thousands, billions
answering the question "did this option work as proposed" occurs in the _______ phase of IDC
implementation
the development of mobile commerce is driven by all of the following except
increasing prices
As an individual student in your university's student database, you are a(n) _____ of the STUDENT class.
instance
databases minimize _____, this means
isolation, applications cannot access data associated with other applications
transmit data through electromagnetic waves
microwave
The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________.
mobility, broad reach
many publishers view ____ advertising as risky because it has the potential to erode the public's trust
native
organizations are turning to data governance because
of federal regulations
how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization
onboarding
used to uniquely identify a record
primary key
intellectual property is not protected under ____ laws
privacy
The greatest problem with GEO satellites is which of the following?
propagation delay
first step in the general framework for ethics
recognize an ethical issue
generally describes an entity
record
means that you accept the consequences of your decisions and actions
responsibility
the pursuit of the American dream and our ability to choose our religious orientation is a reflection of the _____ approach
rights
A company's annual employee evaluation best fits which type of decision?
semi-structured
The monitoring, collection, and analysis of socially generated data is called
social intelligence
volkswagen used _____ to cheat during emissions testing
software
You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, and providing order status reports this is a ____ task and a ____ decision
structure, operation control
Computer support is greatest for which of the following problems?
structured and operation control
standardized language used to manipulate data is
structured query language
data in data warehouses are organized by
subject
find my iPhone is an example of
telemetry
Compared to data warehouses, data marts have which one of the following characteristics?
they cost less
most important benefit of knowledge management system
they make best practices available to employees
any danger to which a system may be exposed
threat
amount of bandwidth actually available for you to use
throughput
Digital dashboards provide all of the following capabilities except:
transaction processing
social marketplaces are an example of c2c commerce (t/f)
true
does not promote it's use of filter bubbles
which of the following is the most appropriate wireless technology for real time location of caregivers and mobile equipment in healthcare environments
ultra wideband
who decides what data should be stored in the organization's data warehouse?
users
ethical standard that states that an ethical action is one that provides the most good or least harm
utilitarian
minimizing the organization's carbon footprint and otherwise striving for "green IT" is an example of a _____ approach
utilitarian
3 characteristics of big data
volume velocity variety
buying a hot dogs at a stand using your contactless credit card you are using a
wireless electronic payment system