Computer Fundamentals

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information? a. big data b. structured data c. data privacy infringement d. the Internet of Things (IoT)

big data

Creating an entirely new market is an example of a ________ ocean strategy.

blue

What does business-to-consumer (B2C) e-commerce replace?

brick-and-mortar store locations

A cloud database is a type of database developed on a ________ platform and retrieved by a cloud platform.

cloud

The Foreign Key is a ________ field between tables that is not the primary key.

common

A bank clerk has inappropriately used a customer's personal email address. The branch manager reprimands the employee and withholds an expected promotion. Which dimension of ethical behavior in the digital age is demonstrated by this disciplinary action? a. establishing quality standards b. intellectual property rights c. control and accountability d. quality of life

control and accountability

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies.

Cyber criminals often demand ________ as a ransom payment because this type of money is difficult to trace and accessible through any Internet-connected device.

cryptocurrency

Knowledge Discovery in Data (KDD) is also known as ________.

data mining

Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries? a. playing a multiplayer game from a personal computer using the company's Wi-Fi b. distributing company-owned software without authorization c. sending a personal email from a work computer d. posting to personal social media sites from a company computer

distributing company-owned software without authorization

Vector and raster files are

geographic data.

When multiple lists and data integrity. sources are maintained, information can become ________, leading to decreased data.

inconsistent

A wi-fi tracker following a shopper's path within a store is an example of what kind of data collection? a. direct inquiry b. predictive analytics c. indirect tracking d. third-party data purchase

indirect

Data centralization is critical for increasing data ________.

integrity

Database forms structure data input to ensure data ________.

integrity

Database reports are useful in many ways; one way a report is used is to provide details about individual records and to create ________.

labels

Under what type of system are employees encouraged to halt the manufacturing process in the event of a manufacturing error or safety risk?

lean manufacturing system

An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?

legal

A database relationship is a(n) ________ between tables that define how the data are related.

link

The DBMS (Database Management System) is designed to administer and ________ a database.

organize

Employees and organization stakeholders rely on managers to protect their online

privacy.

Which of the following statements encapsulates the purpose of the Federal Information Security Management Act? a. protect government assets against cybersecurity events b. prevent children's access to harmful Internet content c. require a warrant to intercept email and VoIP communications d. monitor terrorist activities and communications

protect government assets against cybersecurity events

Which shape in a common flowchart represents a process or step?

rectangle

Every project faces limitations, such the amount of available equipment or environmental constraints. To mitigate these limitations, project managers use software that provides

resource leveling.

A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees? a. restrictions on other employees' access to the company's social media pages b. standards for the quality of the employee photos that are featured in the posts c. private criteria for selecting the employees to be honored in the monthly posts d. rules of conduct for how social media followers and visitors respond to the posts

rules of conduct for how social media followers and visitors respond to the posts

Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers? a. searching for precedents b. determining who is affected c. listing options d. making a decision

searching for precedents

What type of cookie is stored in temporary memory and is lost when the web browser is closed? a. standard b. persistent c. authentication d. session

session

Which word best describes the nature of projects, given that they have starting points and (hopefully) ending points?

temporary

Where are session cookies stored? a. temporary memory b. IT servers c. website data storage d. user hard disks

temporary memory

The e-commerce company with the highest revenue is based in which country?

the United States

You own a pool installation business and need a list of high-income houses with large backyards. You buy the list from a data marketing company. What is this called? a. direct inquiry b. indirect tracking c. third-party data purchase d. predictive analysis

third-party data purchase

M-commerce is a subset of

traditional e-commerce.

Parameter queries prompt the user for ________ to run a query.

values

A manager must conduct an ethical analysis to decide whether an employee is abusing the company's flextime policy. When determining whom will be affected by her decision, it is important that the manager also consider

whether she might personally benefit or be harmed by it.

Forms are created using ________ software.

DBMS - Database Management System

The acronym for Data Governance is ________.

DG

________ involves identifying errors in data sets and removing/correcting these errors to ensure the data is accurate.

Data scrubbing

The group of laws created to update copyright laws concerning regulation of digital material in accordance with World Intellectual Property Organization treaties is known as the

Digital Millennium Copyright Act (DMCA).

It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of

Distributive Justice.

Who published "How Competitive Forces Shape Strategy" in the Harvard Business Review in 1979?

Michael E. Porter

Data centralization means that data is centralized in ________ place(s).

NOT 2

What type of network chart depicts the timeline for a project and displays when certain processes will have slack?

NOT Gantt

To assist project managers with determining and evaluating potential risk, the project management body of knowledge (PMBOK) identifies ________ processes.

NOT ten

The Act that protects person-to-person wire, oral, and electronic communications is

NOT the Electronic Communications Privacy Act.

Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant? a. The USA PATRIOT Act/USA Freedom Act b. The Wiretap Act c. The Children's Internet Protection Act d. The Federal Information Security Management Act

The USA PATRIOT Act/USA Freedom Act

The principle that states that when faced with an ethical dilemma a manager should choose the option that does the greatest good for the most people involved is called the

Utilitarian Principle.

The Act that comprises a variety of crime statutes including identity theft and unlawful access to stored communications is the

Wiretap Act.

Jenaliah needs to create a password to access her credit card's online payment system. Which of the following passwords is the most secure? a. Yh30!nP#RJ? b. 1234567890 c. capone1 d. Jenaliah123

Yh30!nP#RJ?

The Universalist Principle states that

a decision must be fair for all involved.

Using a Database Management System (DBMS) increases data security by using ________ so that only authorized users can access data.

access rules

There are many RDBMS query tools we can use. Those query tools include crosstab queries, ________ queries, parameter queries, and queries specific to SQL.

action

Because it allows clients and investors, who might not be familiar with more evolved tools, to visualize the entire project at a glance, one of the first creations of a project manager is a

NOT PERT network chart.

What is the relationship of blue ocean strategy to price leadership versus product differentiation?

NOT With price leadership, an organization seeks to offer a product to a large market at the lowest possible price.

One important ________ is that the firm's employees will learn to use technologies to develop the new product, providing a competitive boost.

NOT fast-follower strategy

To create a relationship between two tables, you must use a ________ field that is present in both tables.

NOT primary key foreign key

Which type of employee in a project management firm works directly with the client in the early stages of a project?

NOT project manager

Data quality audit uses ________ analysis to test data, variabilities, and outcomes against test data.

NOT quality statistical

Parameter queries prompt the user for values in order to run/execute the query. When the value of a parameter is given, the query applies the field as a ________.

NOT report control

Data redundancy is the ________ of data.

NOT storage

What does the acronym RDBMS stand for? a. Referential Database Management Systems b. Relational Database Management Systems c. Redundant Database Management Systems d. Records of Database Management Systems

Relational Database Management Systems

Which of the following points is part of the fifth, or final, step in an ethical analysis? a. searching for precedents b. cultivating the ability to defend your decision c. determining who is affected d. making a physical list of all options

cultivating the ability to defend your decision

When creating a field in a database, the field type specifies the type of ________ in the field.

data

A database management system (DBMS) is a computer program that is used to create, process, and administer a ________.

database

Data administration tasks include the development of information policies, data planning, ________, security, and how internal-users and end-users use that data.

database design

If your roommate, spouse, or partner must approve the color before you can begin painting a room, then the project has a(an) ________ dependency on paint selection.

external

How many dimensions or categories can the ethical concerns of the digital age be divided into? a. six b. five c. four d. three

five

Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.

location-based services (LBS)

Along with employees themselves, those most responsible for ethical employee behavior are a. managers. b. customers. c. suppliers. d. subordinates.

managers.

Cookies that are stored on the hard drive and are not lost when the web browser is closed are called

persistent cookies.

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

Parameter queries ________ the user for values to execute/run a query.

prompt

A database record is also referred to as a ________ in the table.

row

One reason to create database policies is to specify the ________ used in database design (how the data is structured).

rules

Relational databases organize data into ________ based on structured data groupings.

tables

Of the following principles, which states that a manager must attempt to determine if a decision is fair for all employees involved? a. the Universalist Principle b. the Principle of Distributive Justice c. the Utilitarian Principle d. the Principle of Virtue

the Universalist Principle

Of the principles of ethical conduct, one is said to be similar to a cost-benefit analysis. Which of the following principles does this description fit? a. the Principle of Distributive Justice b. the Universalist Principle c. the Utilitarian Principle d. the Principle of Virtue

the Utilitarian Principle

It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?

web planning

Coca-Cola and PepsiCo dominate the soft drink market. However, during the 2000s, many customers switched from soft drinks to water, causing Coca-Cola and PepsiCo to develop Dasani and Aquafina. The ability of customers to switch from one product to an alternate product illustrates what Porter called the force of

NOT customers. competitors.

Using technology to transform a market or to create an entirely new market is called creating a(n) ________ innovation.

disruptive

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?

$56

Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continues to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?

NOT competitors suppliers

Making an ethical decision will most likely result in

NOT fierce competitors. confused employees.

Project managers create a Gantt chart not just to illustrate the project schedule but also to use it as a framework for developing a

NOT flowchart. PERT network chart

The purpose of information policies in a database is to indicate the ________ used in the design.

NOT integrity

Doing a data quality audit helps ensure the highest quality of data being used for business intelligence and other applications. The data analysis method involves quality assessment, design, transformation, and ________.

NOT intelligence monitoring

While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.

NOT laws

A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skin care product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?

NOT social media planning

Living a virtuous life involves acting with high morals that are logically defined or shaped by

NOT societies.

On the flowchart, a decision point is depicted by a(n)

diamond.

Search Engine Optimization (SEO) can be ________ through the information gained by web mining.

enhanced

A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy? a. Delete all data about employees' online activities after a set period. b. Inform employees of the monitoring and obtain their consent. c. Exclude personal email addresses and social media accounts from monitoring. d. Block employees' access to websites that collect data about visitors.

Inform employees of the monitoring and obtain their consent.

Because we can create relationships in Microsoft Access, this program is considered to be a(n) ________ database.

relational

With the increasing presence of Internet e-commerce sites, the force of customers has

NOT leveled off.

Vidya needs a password for a new app she downloaded on her phone. Which of the following passwords is the most secure? a. Sj49?zT$ b. Uber123 c. Yh30!nP#, which is the same password she uses for all apps on her phone d. Vidya#123

Sj49?zT$

Databases are designed to keep data and information about different types of data objects, including objects, events, ________, and places.

NOT markets

Music files and video games are examples of what kind of property in the eyes of the law? a. trade secrets b. intellectual property c. real property d. personal property

NOT personal property

What are third-party cookies? a. small text files created by websites other than those visited by web customers b. small text files created by following links within a website c. small text files that store shopping cart information on retail sites d. small text files that a user stores in the cloud

NOT small text files created by following links within a website

Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?

NOT social media implementation cost

Which situation involves a computer ethics violation that you should report to your employer? a. A trusted colleague tells you that your coworker has stolen a company laptop. b. You have heard that a colleague has been using a work computer to launch a computer scam. c. You pass a coworker's computer screen and see him surfing through child pornography. d. You think you see an unauthorized gambling site on a coworker's screen before she closes the window.

You pass a coworker's computer screen and see him surfing through child pornography.

Which element of a PESTEL analysis is represented by the use of data mining information from the Bureau of Labor Statistics to gain insight into regional employment figures?

economic


संबंधित स्टडी सेट्स

Limited Liability/The Gilded Age

View Set