Concepts Assessment 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

When conducting an ethical analysis, what is the last step you should take?

deciding and preparing for consequences

On the flowchart, a decision point is depicted by a(n)

diamond.

Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries?

distributing company-owned software without authorization

Data redundancy is the ________ of data.

duplication

National Weather Service databases are used by modern supply chain management systems to track weather events that could impact logistics. Which element of a PESTEL analysis does this example represent?

environmental

Data scrubbing (data cleaning) involves identifying ________ in data sets then duplicating these errors to ensure the data is accurate for an organization.

errors N

Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards

Living a virtuous life involves acting with high morals that are logically defined or shaped by

ethics.

A dependent data mart is constructed from ________ warehouses and utilize a top-down approach where organizational data is stored in a centralized location. Specific data is extracted when an analysis is needed.

existing

The First Amendment to the U.S. Constitution affects Internet privacy because it

extends freedom of speech protection to the Internet, which means government does little filtering of content.

If your roommate, spouse, or partner must approve the color before you can begin painting a room, then the project has a(an) ________ dependency on paint selection.

external

How many types of dependencies, or relationships among activities, does a project contain?

four

Vector and raster files are

geographic data.

Which of the following is the first of the five steps in an ethical analysis?

getting the facts ?

When conducting a five-step ethical analysis, the first step in the process is

getting the facts.

What does the Wiretap Act aim to protect against?

identity theft and unlawful access to stored communications

Data centralization is critical for increasing data ________.

integrity

Database reports are useful in many ways; one way a report is used is to provide details about individual records and to create ________.

labels

Manufacturing practices that emphasize developing efficient and smooth supply lines and minimizing excess inventory, delays, and waste are

lean techniques.

What is the fourth step in a five-step ethical analysis?

listing options

Along with employees themselves, those most responsible for ethical employee behavior are

managers.

Deepfake technology raises questions about the ethics of

modifying images or video by replacing one person's likeness with another's.

A DBMS provides the ability to ________, query, and store information in a database for managers and database administrators.

monitor

According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called

monopolistic competition.

Databases maintain data and information about various types of data ________.

objects

Databases are designed to keep data and information about different types of data objects, including objects, events, ________, and places.

people

Which type of cookie is lost only if deleted or if is created with an expiration date?

persistent cookie

Cookies that are stored on the hard drive and are not lost when the web browser is closed are called

persistent cookies.

When conducting a SWOT analysis, an organization's human resource management system is used to evaluate the relative strength or weakness of its

personnel (workforce).

A Gantt chart is fully developed during the ________ phase of the project management process.

planning

A branch manager for a national car rental company is in the process of conducting a SWOT analysis for her location. Which of the 5 Ps can she examine using the company's inventory management system for its rental fleet?

plant (physical attributes or resources)

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

To set a primary key field in a database table, you must click the ________ key button.

primary

A network chart that displays all the paths to project completion is known as a

program evaluation and review technique chart.

Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?

protect government assets against cybersecurity events

A ________ is also known as a question. A request for information from a database.

query

Because we can create relationships in Microsoft Access, this program is considered to be a(n) ________ database.

relational

Every project faces limitations, such the amount of available equipment or environmental constraints. To mitigate these limitations, project managers use software that provides

resource leveling.

A database record is also referred to as a ________ in the table.

row ?

A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees?

rules of conduct for how social media followers and visitors respond to the posts

Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?

searching for precedents

The ________ step of an ethical analysis involves asking whether the decision will impact the privacy or property rights of any individuals or corporations.

second

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session ?

What are third-party cookies?

small text files created by websites other than those visited by web customers

An independent data mart is a(n) ________ system created separate from a data warehouse and focused on specific organizational functions.

stand-alone

If McDonald's and Burger King raise prices too high, customers may switch from burgers to tacos. This illustrates Porter's force of

substitutes.

Relational databases organize data into ________ based on structured data groupings.

tables

What object is used to store information when creating a database?

tables

The Act that specifically requires all pornographic sites to include some sort of age verification is

the Children's Internet Protection Act of 2000 (CIPA).

Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?

the Digital Millennium Copyright Act (DMCA)

Which 1986 law makes it illegal to intercept calls or messages without a warrant?

the Electronic Communications Privacy Act

Of the principles of ethical conduct, one is said to be similar to a cost-benefit analysis. Which of the following principles does this description fit?

the Utilitarian Principle

The Act that protects person-to-person wire, oral, and electronic communications is

the Wiretap Act.

What is a company that purchases consumer behavior information from other organizations engaged in?

third-party data purchase

M-commerce is a subset of

traditional e-commerce.

Which of the following scenarios represents a customer acquisition cost of $100?

A company spends $100,000 on advertising and marketing in one month. They gain 1,000 new customers in that month.

Which intellectual property is correctly matched with the legal device or tool that protects it?

A portrait that you paint can be copyrighted.

Why is MIS critical in the implementation of Six Sigma techniques?

During the Measure and Analyze steps of the Six Sigma procedure, collecting data and using data analytics are essential, particularly when measuring variances in products or processes.

Which Act outlines a plan to protect government information and assets against cyberthreats?

Federal Information Security Management Act (FISMA)

Which Act requires all government agencies to have a plan in place in the event of a cyberattack?

Federal Information Security Management Act (FISMA) ?

The U.S. Constitution specifically protects freedom of speech from government censorship through the

First Amendment.

The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the

USA PATRIOT Act/USA Freedom Act.

What is legendary GE CEO Jack Welch quoted as saying about competition?

WRONG "The time your game is most vulnerable is when you're ahead."

Which Act requires all government agencies to have a plan in place in the event of a cyberattack?

WRONG Electronic Communications Privacy Act

What type of network chart depicts the timeline for a project and displays when certain processes will have slack?

WRONG Gantt

Which chart is used to determine and display a critical path in a project?

WRONG Gantt network chart

Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.

analyzing

Data centralization is necessary for maintaining ________.

data filing

When creating a database field, we set ________ for each field to decrease data input mistakes.

data types

The ________ step of an ethical analysis involves asking whether the decision will impact the privacy or property rights of any individuals or corporations.

2 ?

The role of a DBA is to ________ and maintain tables in a relational database.

? build

Reports offer a way to view, format, and summarize the information in a ________.

? database

Doing a data quality audit helps ensure the highest quality of data being used for business intelligence and other applications. The data analysis method involves quality assessment, design, transformation, and ________.

? monitoring

data quality audit uses ________ analysis to test data, variabilities, and outcomes against test data.

? quality

Data centralization means that data is centralized in ________ place(s).

? 2

The essential RDBMS functions; create, read, update, and delete data is collectively referred to as which acronym?

CRUD

Forms are created using ________ software.

DBMS

The acronym for Data Governance is ________.

DG

Which View lets you change database table Field Names and Field Properties?

Design View

It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of

Distributive Justice.

Item68 Item 68 A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?

Inform employees of the monitoring and obtain their consent.

OLAP software allows users to perform multidimensional analysis of a wide range of business data, complex calculations, and trend analysis, as well as data modeling. What does OLAP stand for?

Online Analytical Processing

By displaying activities that have slack, a _________ can help speed the completion of an entire project by directing resources to critical activities.

PERT chart

The principle that asks the decision maker to imagine the answer a highly moral person would have for the same question is the

Principle of Virtue.

What does the acronym RDBMS stand for?

Relational Database Management Systems

________ software allows managers to take control of an employee's computer remotely and record the computer's mouse and keyboard entries.

Remote desktop

In a data warehouse, data is analyzed using business intelligence (BI) tools, ________ clients, and a variety of analytics applications designed to interpret the data.

SQL

Vidya needs a password for a new app she downloaded on her phone. Which of the following passwords is the most secure?

Sj49?zT$

What does the abbreviation SQL stand for?

Structured Query Language

Which provision of the USA PATRIOT Act was not renewed after it expired in 2015 nor covered by the subsequent USA Freedom Act?

The National Security Agency may not collect mass phone data from United States residents and citizens. ?

In 1998, the Child Online Protection Act was sponsored by both Democrats and Republicans, passed by both houses of Congress, and signed into law by President Clinton. Why can't an offender be punished today for violating this law?

The law was later found unconstitutional for violating the First Amendment (freedom of speech).

June, an IT manager at a financial institution, learns that team member Charla has a health issue and needs to take a half day off once a week for a few months. Without violating Charla's privacy, how can June make an ethical decision that maintains a perception of fairness at a very busy time?

WRONG June can follow the Principle of Distributive Justice and adjust Charla's salary according to the hours she works.

To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.

WRONG control and accountability ? information privacy rights

What is a misunderstanding that can be clarified by a flowchart?

WRONG lack of payment from the client

Online Analytical Processing (OLAP) is included in many Business Intelligence (BI) software applications. We use this OLAP for a range of ________ discovery activities, including report creation and analysis, analytical calculations, forecasting, budgeting, planning, and what-if predicative analysis.

WRONG query

Under what type of system are employees encouraged to halt the manufacturing process in the event of a manufacturing error or safety risk?

WRONG red ocean development system

When creating a relationship in a relational database management system (DBMS), which object is used?

WRONG report

Structured Query Language (SQL)-specific queries use specific SQL ________ to execute the query.

WRONG requests

A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skin care product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?

WRONG web development

It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?

WRONG web implementation

The Act that comprises a variety of crime statutes including identity theft and unlawful access to stored communications is the

Wiretap Act.

The Universalist Principle states that

a decision must be fair for all involved.

Data governance policies help to ensure an organization's data is valid, understandable, complete, and ________.

accessible

One of the ________ of data warehouses is their ability to provide access and analysis of information from a variety of subject areas.

advantages

Which of the following is an example of direct inquiry?

asking a customer to fill out a survey after calling customer service

Tasks of a database administrator (DBA) include database security, tuning, ________, and creation of queries and reports used to assist business decisions.

backup

In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information?

big data

What does business-to-consumer (B2C) e-commerce replace?

brick-and-mortar store locations

A cloud database is a type of database developed on a ________ platform and retrieved by a cloud platform.

cloud

We use a ________ field between the two database tables to create a relationship link.

common

What type of field is used in both tables to create a relationship?

common

As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because

consumers expect integrated shopping experiences that include face-to-face options.

A state requires all visitors to online cannabis shops to be at least 21 years old. However, it is unclear who should screen the website visitors and who should be responsible for any violations. Which dimension (category) of ethical behavior does this issue fall under?

control and accountability

Which of the following determines the interest rate you'll be charged when you want to borrow money?

credit report

Which of the following points is part of the fifth, or final, step in an ethical analysis?

cultivating the ability to defend your decision

If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?

customers

Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?

type of presence

Making an ethical decision will most likely result in

unintended consequences

When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have

weakened.

On an e-commerce presence map, what is presence?

websites, email, social media sites, and offline media

One of the ways web mining improves web experiences is through site visibility. Site visibility includes how and ________ the website appears when queries are executed in a search engine.

when

A manager must conduct an ethical analysis to decide whether an employee is abusing the company's flextime policy. When determining whom will be affected by her decision, it is important that the manager also consider

whether she might personally benefit or be harmed by it.


संबंधित स्टडी सेट्स

Decision Chapter 2 intro To Probability

View Set

Organismal Biology Lab Practical 1

View Set

Clinical Interview Final Exam study guide

View Set