Computer Fundamentals
In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information? a. big data b. structured data c. data privacy infringement d. the Internet of Things (IoT)
big data
Creating an entirely new market is an example of a ________ ocean strategy.
blue
What does business-to-consumer (B2C) e-commerce replace?
brick-and-mortar store locations
A cloud database is a type of database developed on a ________ platform and retrieved by a cloud platform.
cloud
The Foreign Key is a ________ field between tables that is not the primary key.
common
A bank clerk has inappropriately used a customer's personal email address. The branch manager reprimands the employee and withholds an expected promotion. Which dimension of ethical behavior in the digital age is demonstrated by this disciplinary action? a. establishing quality standards b. intellectual property rights c. control and accountability d. quality of life
control and accountability
Small text files created by websites you visit that your web browser stores on your hard disk are called
cookies.
Cyber criminals often demand ________ as a ransom payment because this type of money is difficult to trace and accessible through any Internet-connected device.
cryptocurrency
Knowledge Discovery in Data (KDD) is also known as ________.
data mining
Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries? a. playing a multiplayer game from a personal computer using the company's Wi-Fi b. distributing company-owned software without authorization c. sending a personal email from a work computer d. posting to personal social media sites from a company computer
distributing company-owned software without authorization
Vector and raster files are
geographic data.
When multiple lists and data integrity. sources are maintained, information can become ________, leading to decreased data.
inconsistent
A wi-fi tracker following a shopper's path within a store is an example of what kind of data collection? a. direct inquiry b. predictive analytics c. indirect tracking d. third-party data purchase
indirect
Data centralization is critical for increasing data ________.
integrity
Database forms structure data input to ensure data ________.
integrity
Database reports are useful in many ways; one way a report is used is to provide details about individual records and to create ________.
labels
Under what type of system are employees encouraged to halt the manufacturing process in the event of a manufacturing error or safety risk?
lean manufacturing system
An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?
legal
A database relationship is a(n) ________ between tables that define how the data are related.
link
The DBMS (Database Management System) is designed to administer and ________ a database.
organize
Employees and organization stakeholders rely on managers to protect their online
privacy.
Which of the following statements encapsulates the purpose of the Federal Information Security Management Act? a. protect government assets against cybersecurity events b. prevent children's access to harmful Internet content c. require a warrant to intercept email and VoIP communications d. monitor terrorist activities and communications
protect government assets against cybersecurity events
Which shape in a common flowchart represents a process or step?
rectangle
Every project faces limitations, such the amount of available equipment or environmental constraints. To mitigate these limitations, project managers use software that provides
resource leveling.
A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees? a. restrictions on other employees' access to the company's social media pages b. standards for the quality of the employee photos that are featured in the posts c. private criteria for selecting the employees to be honored in the monthly posts d. rules of conduct for how social media followers and visitors respond to the posts
rules of conduct for how social media followers and visitors respond to the posts
Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers? a. searching for precedents b. determining who is affected c. listing options d. making a decision
searching for precedents
What type of cookie is stored in temporary memory and is lost when the web browser is closed? a. standard b. persistent c. authentication d. session
session
Which word best describes the nature of projects, given that they have starting points and (hopefully) ending points?
temporary
Where are session cookies stored? a. temporary memory b. IT servers c. website data storage d. user hard disks
temporary memory
The e-commerce company with the highest revenue is based in which country?
the United States
You own a pool installation business and need a list of high-income houses with large backyards. You buy the list from a data marketing company. What is this called? a. direct inquiry b. indirect tracking c. third-party data purchase d. predictive analysis
third-party data purchase
M-commerce is a subset of
traditional e-commerce.
Parameter queries prompt the user for ________ to run a query.
values
A manager must conduct an ethical analysis to decide whether an employee is abusing the company's flextime policy. When determining whom will be affected by her decision, it is important that the manager also consider
whether she might personally benefit or be harmed by it.
Forms are created using ________ software.
DBMS - Database Management System
The acronym for Data Governance is ________.
DG
________ involves identifying errors in data sets and removing/correcting these errors to ensure the data is accurate.
Data scrubbing
The group of laws created to update copyright laws concerning regulation of digital material in accordance with World Intellectual Property Organization treaties is known as the
Digital Millennium Copyright Act (DMCA).
It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of
Distributive Justice.
Who published "How Competitive Forces Shape Strategy" in the Harvard Business Review in 1979?
Michael E. Porter
Data centralization means that data is centralized in ________ place(s).
NOT 2
What type of network chart depicts the timeline for a project and displays when certain processes will have slack?
NOT Gantt
To assist project managers with determining and evaluating potential risk, the project management body of knowledge (PMBOK) identifies ________ processes.
NOT ten
The Act that protects person-to-person wire, oral, and electronic communications is
NOT the Electronic Communications Privacy Act.
Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant? a. The USA PATRIOT Act/USA Freedom Act b. The Wiretap Act c. The Children's Internet Protection Act d. The Federal Information Security Management Act
The USA PATRIOT Act/USA Freedom Act
The principle that states that when faced with an ethical dilemma a manager should choose the option that does the greatest good for the most people involved is called the
Utilitarian Principle.
The Act that comprises a variety of crime statutes including identity theft and unlawful access to stored communications is the
Wiretap Act.
Jenaliah needs to create a password to access her credit card's online payment system. Which of the following passwords is the most secure? a. Yh30!nP#RJ? b. 1234567890 c. capone1 d. Jenaliah123
Yh30!nP#RJ?
The Universalist Principle states that
a decision must be fair for all involved.
Using a Database Management System (DBMS) increases data security by using ________ so that only authorized users can access data.
access rules
There are many RDBMS query tools we can use. Those query tools include crosstab queries, ________ queries, parameter queries, and queries specific to SQL.
action
Because it allows clients and investors, who might not be familiar with more evolved tools, to visualize the entire project at a glance, one of the first creations of a project manager is a
NOT PERT network chart.
What is the relationship of blue ocean strategy to price leadership versus product differentiation?
NOT With price leadership, an organization seeks to offer a product to a large market at the lowest possible price.
One important ________ is that the firm's employees will learn to use technologies to develop the new product, providing a competitive boost.
NOT fast-follower strategy
To create a relationship between two tables, you must use a ________ field that is present in both tables.
NOT primary key foreign key
Which type of employee in a project management firm works directly with the client in the early stages of a project?
NOT project manager
Data quality audit uses ________ analysis to test data, variabilities, and outcomes against test data.
NOT quality statistical
Parameter queries prompt the user for values in order to run/execute the query. When the value of a parameter is given, the query applies the field as a ________.
NOT report control
Data redundancy is the ________ of data.
NOT storage
What does the acronym RDBMS stand for? a. Referential Database Management Systems b. Relational Database Management Systems c. Redundant Database Management Systems d. Records of Database Management Systems
Relational Database Management Systems
Which of the following points is part of the fifth, or final, step in an ethical analysis? a. searching for precedents b. cultivating the ability to defend your decision c. determining who is affected d. making a physical list of all options
cultivating the ability to defend your decision
When creating a field in a database, the field type specifies the type of ________ in the field.
data
A database management system (DBMS) is a computer program that is used to create, process, and administer a ________.
database
Data administration tasks include the development of information policies, data planning, ________, security, and how internal-users and end-users use that data.
database design
If your roommate, spouse, or partner must approve the color before you can begin painting a room, then the project has a(an) ________ dependency on paint selection.
external
How many dimensions or categories can the ethical concerns of the digital age be divided into? a. six b. five c. four d. three
five
Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.
location-based services (LBS)
Along with employees themselves, those most responsible for ethical employee behavior are a. managers. b. customers. c. suppliers. d. subordinates.
managers.
Cookies that are stored on the hard drive and are not lost when the web browser is closed are called
persistent cookies.
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products.
Parameter queries ________ the user for values to execute/run a query.
prompt
A database record is also referred to as a ________ in the table.
row
One reason to create database policies is to specify the ________ used in database design (how the data is structured).
rules
Relational databases organize data into ________ based on structured data groupings.
tables
Of the following principles, which states that a manager must attempt to determine if a decision is fair for all employees involved? a. the Universalist Principle b. the Principle of Distributive Justice c. the Utilitarian Principle d. the Principle of Virtue
the Universalist Principle
Of the principles of ethical conduct, one is said to be similar to a cost-benefit analysis. Which of the following principles does this description fit? a. the Principle of Distributive Justice b. the Universalist Principle c. the Utilitarian Principle d. the Principle of Virtue
the Utilitarian Principle
It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?
web planning
Coca-Cola and PepsiCo dominate the soft drink market. However, during the 2000s, many customers switched from soft drinks to water, causing Coca-Cola and PepsiCo to develop Dasani and Aquafina. The ability of customers to switch from one product to an alternate product illustrates what Porter called the force of
NOT customers. competitors.
Using technology to transform a market or to create an entirely new market is called creating a(n) ________ innovation.
disruptive
Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?
$56
Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continues to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?
NOT competitors suppliers
Making an ethical decision will most likely result in
NOT fierce competitors. confused employees.
Project managers create a Gantt chart not just to illustrate the project schedule but also to use it as a framework for developing a
NOT flowchart. PERT network chart
The purpose of information policies in a database is to indicate the ________ used in the design.
NOT integrity
Doing a data quality audit helps ensure the highest quality of data being used for business intelligence and other applications. The data analysis method involves quality assessment, design, transformation, and ________.
NOT intelligence monitoring
While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.
NOT laws
A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skin care product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?
NOT social media planning
Living a virtuous life involves acting with high morals that are logically defined or shaped by
NOT societies.
On the flowchart, a decision point is depicted by a(n)
diamond.
Search Engine Optimization (SEO) can be ________ through the information gained by web mining.
enhanced
A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy? a. Delete all data about employees' online activities after a set period. b. Inform employees of the monitoring and obtain their consent. c. Exclude personal email addresses and social media accounts from monitoring. d. Block employees' access to websites that collect data about visitors.
Inform employees of the monitoring and obtain their consent.
Because we can create relationships in Microsoft Access, this program is considered to be a(n) ________ database.
relational
With the increasing presence of Internet e-commerce sites, the force of customers has
NOT leveled off.
Vidya needs a password for a new app she downloaded on her phone. Which of the following passwords is the most secure? a. Sj49?zT$ b. Uber123 c. Yh30!nP#, which is the same password she uses for all apps on her phone d. Vidya#123
Sj49?zT$
Databases are designed to keep data and information about different types of data objects, including objects, events, ________, and places.
NOT markets
Music files and video games are examples of what kind of property in the eyes of the law? a. trade secrets b. intellectual property c. real property d. personal property
NOT personal property
What are third-party cookies? a. small text files created by websites other than those visited by web customers b. small text files created by following links within a website c. small text files that store shopping cart information on retail sites d. small text files that a user stores in the cloud
NOT small text files created by following links within a website
Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?
NOT social media implementation cost
Which situation involves a computer ethics violation that you should report to your employer? a. A trusted colleague tells you that your coworker has stolen a company laptop. b. You have heard that a colleague has been using a work computer to launch a computer scam. c. You pass a coworker's computer screen and see him surfing through child pornography. d. You think you see an unauthorized gambling site on a coworker's screen before she closes the window.
You pass a coworker's computer screen and see him surfing through child pornography.
Which element of a PESTEL analysis is represented by the use of data mining information from the Bureau of Labor Statistics to gain insight into regional employment figures?
economic