FinTech Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

(FIX) 50% of truck drivers are expected to lose their jobs to AI and driverless vehicles by 2020.

False

(FIX) A solution to the great cultural problems of the networked age will also originate from adults.

False

(FIX) In 1865 Gordon Moore invented his eponymous law in an article called Cramming More Components onto Integrated Circuits

False

(FIX) In an ideal society, More believes leisure matters but work matters more

False

(FIX) In an ideal society, More believes leisure matters but work matters more.

False

(Fix the Future)Keen believes we are in a techno apocalypse?

False

(Fix the Future)Keen writes that computers have goals and know how to fix the future.

False

(Fix the Future)There is a Moore s Law for human progress?

False

A KPI is a written, negotiated, and executed agreement between service provider and customer.

False

A Lean core capability is to actively suppress issues about continuous operations as a distraction.

False

A time series data structure is difficult to see and yet easy to save.

False

An example of an indirect risk to market defined by SCI would be a security hack of a core financial market infrastructure.

False

As far as emerging technologies go, AI should be viewed in isolation forgetting the other technologies like blockchain, quantum computing and the cloud.

False

Blue Tooth is exclusively used for audio conversation transmittal and receipt.

False

C# is a computer language derived from Cobol.

False

Cloud computing and mobile devices have had little impact on financial services.

False

ETL stands for a data technique Enterprise Table Logic.

False

Etherium is the only blockchain fabric which support the concept of smart contracts

False

Ethical questions should be ignored and left to the compliance department since it is their job.

False

Fix - In 2016, tech firms gave out less stock-based compensation than Wall Street paid out in bonuses.

False

Fix - Realists believe that the digital revolution will solve all of society's problems.

False

GDPR adoption reduces cost of cyber-security.

False

GPS supports POS transactions like buying a cup of coffee with your phone.

False

General AI exist today.

False

Hadoop is an object oriented Excel add-in for the delivery of standard financial services calculations and valuations.

False

Hardware and building infrastructures are the primary focus of SaaS.

False

Hyper-ledger has its own coin like Ethereum.

False

ITIL methodology advantage if found by defining service as delivering value to customer detached from outcomes the customer wants to achieve.

False

If we change the block data in front, we don t have to update the block after it.

False

Interpreted computer programming languages typically execute much faster than compiled computer programming languages.

False

It is the decision of each individual bank to determine when and how to recover from infrastructure interruptions to the markets.

False

Knight Capital is a great example of how Algo trading can earn large profit with almost no risk.

False

Laws confining FinTech disruptions are inherently unfair.

False

Moore s Law states that the processing speed of CPU doubles every 30 month

False

Once a business decision to change the technology is made the business can ignore the process until the new system is ready.

False

Professor Riley places low odds that during a student's career in financial services they will ever be presented an ethical dilemma.

False

Programs have no human comments stored in them because these statements would only confuse the computer.

False

Relational Data Bases allow for parent/child relationships with a variable number of children per parent record.

False

Research finds penalties for misbehaving female advisors are justified as women are three times as likely to engage in misconduct as male advisors.

False

Sales data show that apple is clearly America's favorite pie.

False

Technology being so critical today to the financial industry business processes means technology change always has priority.

False

The concept of APIs did not even exist until the recent advent of mobile smart device applications.

False

The current Dodd/Frank Act requires the SEC to get a subpoena when inspecting a bank's computer source code.

False

The insurance industry is experimenting with greenfield strategies to invest in their legacy systems.

False

The purpose of the Volker Rule is to ensure banks may continue to participate in high risk but only with their own capital.

False

There are more lines of code dedicated to processing the happy path in a typical production program than lines of code to complete the error processing.

False

There is a way to derive a private key from a public key.

False

Three tier, or fat app and gui, application architectures are the most efficient and least expensive by matching each tier function with the least cost solution.

False

Value At Risk (VAR) is a simple light weight algo used by retail insurance.

False

Venmo allows payments related to gambling or drugs in its user agreement,

False

Wealth management is a shrinking industry.

False

Wearable devices have little use as wellness care data collectors.

False

When discussing the ABCD's of technical disruption, the D stands for disruption.

False

Zero-Day bugs are insignificant errors that are so small that most PC vendors can repair them in zero days.

False

"British day trader, Navinder Singh Sarao, made tens of millions of dollars using an illegal practice called spoofing."

True

"Ethical behavior involves demonstrating respect for dignity, diversity and individual rights."

True

A primary key will serve to uniquely define a row of data in the table.

True

As much as 3% of the electricity created in the U.S. each year powers data centers.

True

Challenger banks are driving a tech-first approach in an attempt to move away from the traditional perceptions of the banking sector.

True

Changing yourself and your personal beliefs requires quieting the ego.

True

Entanglement property, when two particles become inextricable interlinked, is what Einstein termed spooky action at a distance.

True

Enterprises can use APIs in myriad ways, and not just for client facing applications.

True

Historically, early Manufacturing Automation was defined as 'real time' equipment controlled to repeatedly produce a product.

True

ITIL identifies best practices for IT service management.

True

In the early days of computing, machine programming languages were vendor specified.

True

Norbert Wiener addressed the alternative to mathematical innocence, taking responsibility, after he enhanced the effectiveness of WWII anti-aircraft fire using statistical theory of communication.

True

One of the three main types of ciphers is ID-based encryption

True

Public exchange floors were traditionally co-located with their data centers.

True

The C computer language is a traditional 3rd generation computer language.

True

The digital wallet technology revolution facilitates the parallel emergence of virtual purchasing power.

True

The dominance of Process concepts over Data concepts began during the early decades of computer science.

True

The high frequency & low latency trader makes money on the speed advantaged price discovery .

True

Time, in place of process and data, has become the top computer science focus during our current decade.

True

Today's financial services consumer APIs are mainly focused on managing bank accounts and financial transactions.

True

Turing invented and built a calculating machine that helped crack the German WWII encryption messages from Enigma.

True

With blockchain technology it is not possible to spend or transfer money that you don t possess.

True

With cloud computing pricing models it costs no more to use 1,000 servers for an hour than one server for 1,000 hours.

True

Your car insurance policy rate can now be set by your car's performance data.

True

(FIX) Regulations will hurt startups in their bid to disrupt the incombant monopolistic multi-billion dollar companies in the industry.

false

One of the three main types of ciphers is ID-based encryption.

true

(FIX) DMCA stands for Decentralized Markets Controlled Action.

False

(FIX) Edward Snowden taught us how little USA government knows about the citizens.

False

(FIX) Five hundred years after the publication of Utopia, More's Renaissance humanism in now used to fight universal basic income where government will give all its citizens a living wage whether or not they have a job.

False

(FIX) Gary Reback insists, it s not only possible but simple to bring a federal antitrust investigation against the Mountain View giant.

False

(FIX) In the UK, 25% of 18-24 year olds voted to stay in the EU.

False

(FIX) Labor strikes have been one of the most ineffective ways for employees to force reform of their working conditions and pay.

False

(FIX) Margarethe is trying to take away trust from the economy by fighting against Uber for the drivers.

False

(FIX) Regulations will hurt startups in their bid to disrupt the incombant monopolistic multi-billion dollar companies in the industry

False

(FIX) Strikes within disruptive tech industries or artist strikes are just as common as historical labor strikes.

False

(FIX) The Economist Magazine believes that we should embrace the binary option of either a full-time employment model or an independent model

False

(FIX) The Economist Magazine believes that we should embrace the binary option of either a full-time employment model or an independent model.

False

(FIX) The United States government is prepared for the technological disruption that is currently taking place.

False

(FIX) The vision, to borrow a term from the World Wide Web inventor Tim Berners-Lee, is the re-centralization of economic power; where power lies at the center rather than the edge leaf node.

False

(Fix the Future)Currently, the internet can fix the world.

False

(Fix the Future)Gordon Moore is a cofounder of IBM?

False

ADA is the name of a modern computer language because it stands for Analytical Data Algorithms.

False

APIs, by their very nature, provide only one attack point through the underlying operating system.

False

Abdication of technology decisions to trained technologists is a business best practice in financial services.

False

All InsurTech disruption companies are small startup companies today.

False

All global financial industry regulatory rules are aimed at the seller of the asset, never the buyer

False

Always best to get all the change effort completed at once and schedule technology changes to be completed simultaneously with business process changes.

False

An ERD primary key is an optional attribute

False

Both Private and Public key are visible to everyone.

False

Collaboration is an example of unnatural human behavior.

False

Cryptocurrencies have rarely lost assets due to their use of modern encryption methods.

False

ERP stands for Extended Reference Processing.

False

Global flows of trade and finance are growing exponentially

False

Global flows of trade and finance are growing exponentially.

False

In reality 99% of our office work time is spent executing revenue business transactions.

False

Individual Investors may buy & sell securities directly in the listed market exchanges.

False

Leaf node devices tend to be based on the latest high-end performance and functionality for personal computing, like local data bases and statistical analysis.

False

Machines think like humans

False

Managing corporate data in today's hybrid cloud environments has become secure and inexpensive.

False

Moving data between private and public clouds is made simple in the hybrid cloud solution.

False

NFC is used in all modern cell phones to assist in defining your map location information.

False

Objects are the combination of Data + Process + Network.

False

Once again the United States tops the MGI rankings for global trade.

False

Oxford University research indicates a high probability that technology will replace less that 10% of U.S. jobs by 2033.

False

Psychology informs us that good people can always be counted on over the long haul.

False

Python is as hard to learn as Basic Assembler Language.

False

REG NMS, the major National Market System regulation, was repealed by President Clinton in 2005 leading to the financial crisis.

False

REG SCI established the basis of Glass Stiegel Act in 1944 defining the stock exchange functional requirements.

False

REG SCI requires an ATS to maintain and enforce written policies and procedures designed to ensure its SCI systems operate as intended.

False

Securities Trading Organizations are encouraged by Reg NMS but are not required to have an active BCP.

False

Special Needs Interfaces refers to extremely wealthy high net worth clients.

False

Steve Jobs thinks that learning to program a computer is a huge waste of time to learn.

False

Technology always increases transparency of business activity and responsible actors in the process.

False

The CEO reports to the COO.

False

The Consumer Financial Protection Board has no enforcement capacity

False

The EU equivalent of the U.S. CFPB is the FFIEC council

False

The FBI refers all financial services fraud cases to the NSA for prosecution in the U.S.

False

The FINRA KYC Rule 2090 is a clear detailed guide of specific requirements to meet standards.

False

The FINRA Rule 2020 is a clear detailed guide of specific requirements for the use of technology.

False

The Madoff IT staff had no idea the company was engaged in fraud

False

The Madoff IT staff had no idea the company was engaged in fraud.

False

The OFR is a wholly-owned subsidiary of the member-owned organization SIFMA.

False

The Office of the Controller of the Currency is deferring to the SEC for all FinTech companies regulation responsibilities.

False

The best reason to change your business technology is to decrease revenue and increase costs.

False

The four Lovelace principals of computing were documented by Ada Byron in 1983.

False

Today's well known products, Windows or Facebook or SAP, all tightly coded with less than 1 million lines of code.

False

When faced with a new complex data problem to solve it is best to start with identifying the underlying algo.

False

While APIs share function and data, actual source code sharing is far more efficient and less costly.

False

Whistleblowers reporting to FINRA enjoy full protection under the Dodd-Frank Act from corporate retribution.

False

The Consumer Financial Protection Board has no enforcement capacity.

Fasle

"Ethical behavior involves demonstrating respect for honesty, fairness, and equality."

True

"The CEO of Barclays, Bob Diamond, was implicated in the LIBOR manipulation scandal. "

True

(FIX) Adam Smith s invisible hand remains the best guarantor of innovation

True

(FIX) Apple was paying .005% tax on its revenue from its Irish based European subsidiary to the Irish government.

True

(FIX) DeepMind with Microsoft, Facebook, IBM, and Amazon formed Partnership on Artificial Intelligence to Benefit People and Society to make the world a better place.

True

(FIX) Eighteenth-century Prussian philosopher Immanuel Kant reminds us that with agency comes responsibility.

True

(FIX) In March 2017, a number of blue-chip firms including the UK offices of McDonald s, L Oreal, Volkswagen, Audi, Vodafone, Sky, HSBC, Lloyds, and Royal Bank of Scotland all suspended their advertising on Google and YouTube because their ads were too expensive.

True

(FIX) Keen believes that we must fuse technology and humanity for a brighter looking future

True

(FIX) The Economist Magazine argues: antitrust authorities need to move from the industrial era into the 21st century in order to reboot antitrust for the information age.

True

(FIX) The main goal of the self-policing initiative known as the Partnership on Artificial Intelligence to Benefit People and Society is to make the world a better place.

True

(FIX) Trust in government institutions and its politicians is highly important for a society evolving to a post privacy world.

True

(Fix the Future) Increased innovation, transparency, creativity and healthy disruption are all methods of getting us out of today's technology related issues.

True

(Fix the Future)Apple s 1984 Superbowl commercial launched the personal computer age?

True

(Fix the Future)Jaan Tallinn Inventor of Skype and Kazaa. Joins with Bill Gates, Elon Musk, Stephen Hawking in his concern that AI represents an existential risk. He states that it may be the biggest event in human history.

True

(Fix the Future)One paradox Keen mentions is that we are living in the most dystopian and utopian times simultaneously.

True

(Fix the Future)Singapore is today one of the most wired countries in the world with mobile phone penetration of 152%.

True

(Fix the Future)The 5 tools for fixing the future are: Regulation, competitive innovation, social responsibility, worker and consumer choice, and education.

True

(Fix the Future)The Edelman Trust Barometer measure s a population s trust in its own institutions.

True

(Fix the Future)The Edelman trust barometer is the gold standard for measuring trust around the world?

True

(Fix the Future)The identity card system puts digital identity and trust at the heart of a new social contract.

True

30% of all business failures are caused by employee theft

True

A 3 Qubit quantum computer would find an answer from a set of 8 options, and a 4 qubit from a set of 16, or 2 to the n power where n is the number of qubits.

True

A Data Lake (Hadoop Farm) is a shared centralized repository of raw copies of both internal and external data with minimal data structures.

True

A SHA 256 hash is nothing more than a fingerprint for some digital data.

True

A binary digit can be one of two states.

True

A data lake is a large object-based storage repository that holds data in its native format until it is needed.

True

A human brain decision requires a minimum of 650 milliseconds while a NASDAQ order takes 100 microseconds.

True

A hybrid cloud solution is nothing more than using the same virtualized server architecture internally and combing a private cloud with a public cloud.

True

A key get-right of a successful consumer API strategy requires minimal integration with existing systems.

True

A major benefit of using APIs is to decouple consuming applications from infrastructure service providers allowing transparent change and flexibility.

True

A major data management utility class is Extract, Translate, and Load (ETL).

True

A methodology can help identify business needs.

True

A modern smart phone utilizes at least 4 different networks depending on the function.

True

A new report by S&P Global Market Intelligence projects that digital lenders across the personal, small and medium enterprise, and student-focused segments will originate $62.84 billion in new loans in 2021; a compound growth rate of 16%.

True

A recent Radware study reported more than 25% of organizations experienced attacks on a daily basis, with the majority experiencing attacks weekly

True

A recent Radware study reported more than 25% of organizations experienced attacks on a daily basis, with the majority experiencing attacks weekly.

True

A significant project management issue is the unwillingness of a business unit to remain committed to project participation over a multi-year implementation.

True

A valid, or signed block, will have a hash that begins with x number of leading zeroes.

True

A voting use case would likely be best implemented on Etherium as it has a public network model.

True

AEI stands for artifical emotional intelligence

True

AI is a trial and error learner with an infinite capacity to acquire skills.

True

APIs are maps for hackers to exploit when attacking systems.

True

Access to data analysis only available in a corporate data processing center became more flexible and accessible as computer science matured into a business tool.

True

According to the video, a blockchain is simply multiple blocks linked together with the new block pointing to the hash of the prior block.

True

Acord Conference 2015 takeaway: Forcing yourself to speculate what types of problems people will be concerned about before they happen is the best path to (InsurTech) innovation.

True

Ada Byron invented algorithmic processing, including subroutines, in 1843.

True

Ada Byron stated general purpose calculating machines have no capacity for originality in 1843.

True

Admiral Grace Hopper, while leading a U.S. Navy team, is credited with inventing COBOL.

True

Alan Turing is considered the father of computer science and AI

True

Algorithmic trading is now conducted at speeds the human brain can not recognize in real time.

True

An API can be thought of as the grammar that exposes functions and data between programs.

True

An ATS is regulated as broker-dealers, not as a traditional exchange.

True

An ETL is used to move data from an ODS to a DW.

True

Another name for a program or a collection of programs is an application.

True

Apple s new peer-to-peer payment service has a chance to upset existing leaders in the space, including PayPal, Square Cash, and the aforementioned poster child of peer-to-peer payments, Venmo.

True

Application complexity is created by multiple applications for the same task, multiple revisions of the same single application, and multiple users from differing time zone and language locations.

True

Applications declare at least two entry points when defining an API, one for the initialization and one for the event entry.

True

Archimedes point is the view from nowhere is the ideal observation point.

True

As API management becomes more popular, organizations are looking to deliver more sophisticated and complex enterprise-class APIs that transmit sensitive information or execute business transactions.

True

BASIC, Python, and Perl are all interpreted languages.

True

BIS identified one of the most significant lessons learned from the global financial crisis that began in 2007 was that banks information technology (IT) and data architectures were inadequate to support the broad management of financial risks.

True

Block chain is used to prevent modification of transactions.

True

Blockchain consists of Blocks, Nonce, Data, Previous link and a Hash .

True

Bond ETFs provide the trading benefits of equities and the diversified exposure of a bond portfolio.

True

Both a teller and an ATM can process pre-defined simple account operations well.

True

Britain is investing more into financial technology companies that are direct challengers to traditional lenders, as opposed to FinTech collaborators.

True

Business motivated technology change can be driven by competitive pressure.

True

Business motivated technology change can be driven by internal innovation.

True

Business motivated technology change can be driven by regulatory requirements.

True

C and C++ and COBOL are all examples of High Level Languages and are compiled.

True

COBOL was the first major general purpose computer language for multiple computer vendors.

True

CPU, processing speed and algorithms are all important but data is the single most important resource for enabling a car to drive.

True

CRM stands for Customer Relationship Management.

True

Chinese banks are collaborating with technical partners like Baidu cloud services and Intel to meet performance and security requirements.

True

Clearing agencies are included in the definition of SCI entities.

True

Clock cycles were reduced in size with the move from mechanical to analog devices.

True

Comparing Q3 2017 to Q3 2016, there was a 200% increase in web application attacks sourcing from the U.S.

True

Compiled computer programming languages are pre-translated into executable code before they are executed.

True

Correctness of data extracted from a data lake is the responsibility of the business, not IT.

True

Correlation is not causation. Correlation indicates that two variables move in relation to one another. Causation indicates that the second variable is dependent upon the first.

True

Cryptojacking has now displaced ransomware as the top malware threat.

True

Cybernetics is the study of communication and control.

True

Cybersecurity is as much a human behavior challenge as it is a technology challenge

True

Cybersecurity is as much a human behavior challenge as it is a technology challenge.

True

DLT stands for Distributed Ledger Technology.

True

DMZ is a network security technique often used for protecting a corporate private network that is also attached to the internet.

True

Data Mart are decentralized repositories of customized extractions for a local use.

True

Data for insurance research now includes social media sourced data.

True

Data processing is the repeatable sequences of arithmetic operation on a supplied data set.

True

Determining a real human user vs bots is a challenge of modern application security.

True

Digital bandwidth measures the amount of information that can flow from one place to another in a given amount of time.

True

During the past 20 years JPM and Wells Fargo had several instances when the business and the technology had to change on the same day.

True

Each ERD entity has a primary key.

True

Encoding is a method of converting a stream of data bits into a predefined code.

True

Excel is not scalable as a corporate database solution.

True

FIX) The main goal of the self-policing initiative known as the Partnership on Artificial Intelligence to Benefit People and Society is to make the world a better place.

True

Faster delivery of market data has historically been an early funding source of new communication technologies.

True

Fed Reserve Board of Governors Lael Brainard recent speech included AI within the scope of the existing Guidance on Model Risk Management.

True

FinCen is a network of domestic and international law enforcement and financial communities.

True

Finance is said to be the combination of Time and Risk.

True

Financial Intermediaries participate in a market on-behalf of an investor.

True

Fix -In 2016, the World Economic Forum on Digital Transformation focused on the combinatorial effects of the new internet based technologies.

True

GDPR changes the answer to the question personal data ownership, giving ownership to the individual data subject and not the harvesting organization

True

GDPR changes the answer to the question personal data ownership, giving ownership to the individual data subject and not the harvesting organization.

True

Generally only limited data on ATSs is publicly available.

True

Global data center energy consumption is larger than all of the energy consumed by the U.K.

True

Global flows of data has grown 45X from 2005 - 2014.

True

Google corporations information stores are Big Data examples of Exabyte data sets.

True

Google recently announced a series of new clean energy purchases that bring its total wind and solar capacity to more than 3 gigawatts, enough to cover 100% of the energy it required to run its products in 2017.

True

Grace Hopper was an Admiral in the U.S. Navy.

True

HFT claim they providing liquidity to the market.

True

HFT if focused on low latency transactions.

True

Hash is a fingerprint of digital data that the user enters.

True

HealthTech is connecting health care with health insurance.

True

Hierarchical Data Bases allow for parent/child relationships with a variable number of children per parent record.

True

Identity Based Cryptography mechanisms require a centralized server

True

Identity Based Cryptography mechanisms require a centralized server.

True

Identity Based Cryptography mechanisms requires a secure channel between sender or recipient and the IBE server for transmitting the private keys.

True

If business and technology change is achieved then throw a party.

True

If machine learning algorithms are the new combustion engine then data is the new oil.

True

In Financial Services Lean thinking employee performance should be directly linked to customer value.

True

In the event of a dispute a distributed peer to peer set of nodes will work in a democratic fashion to determine the truth.

True

In the past customer retention has been built upon high cost of entry and big barriers to switching firms, in the near future engaging clients will be driven by continuously improving product performance.

True

In the past market power of financial institutions came from scale of assets, in the near term the competitive edge will come from the scale of data and the ability to draw insights from that data.

True

Individuals are participating in globalization directly, using digital platforms to learn, find work, showcase their talent, and build personal networks.

True

Interpreted computer programming languages are translated into executable code during the time the program is executed.

True

Interpreters have the lowest cost-of-ownership.

True

It is only a matter of time before the global capital markets infrastructure is compromised, hacked, resulting in a major chaotic event.

True

LIBOR is being eliminated as an industry benchmark.

True

Lean is intuitive and accessible to just about anyone throughout an organization.

True

MIKE 2.0 is a delivery methodology for Enterprise Information Management projects.

True

Machines are now being used to predict the liklihood of a future cardiac event

True

Manual paper lists were naturally kept in arrival order in time, and sequentially organized.

True

Manufacturing automation required the abstraction of events to enable interrupting a processing sequence.

True

Migration from rotating to solid state technology is a reference to disk storage.

True

Mike 2.0 is an Open Source delivery methodology for Enterprise Information Management projects.

True

Monet's real Lilly Pond, not the painting, is located in France.

True

Moore s Law states that the power of a CPU doubles every 18 months

True

Multiple parties can access a block chain at once

True

Natural language processing will aid in contract interpretation.

True

Non-U.S. citizens who break U.S. trading laws and violate regulations accessing U.S. markets from overseas are subject to arrest and extradition (depending on the country).

True

Once general AI is reached, the AI algorithm will engage in recursive self improvement resulting in an exponential growth in intelligence.

True

Once the iPhone came about and mobile commerce began to take hold, Apple extended this model to iTunes, and Google followed with Google Play, both providing a software solution for repeat online purchase via the mobile device.

True

One best-practice is to evaluate the decay rate of an application and forecast the date for retirement based on the minimum required business functionality.

True

One of the barriers for researching ethics of technology in the domain of finance is that financial technologies usually remain invisible and poorly defined

True

One of the barriers for researching ethics of technology in the domain of finance is that financial technologies usually remain invisible and poorly defined.

True

One of the major sources of production enterprise operational data is a CRM.

True

One of the three main types of ciphers is asymmetric encryption.

True

One of the three main types of ciphers is symmetric encryption.

True

One of top three sources of project cost over run is a lack of training requiring external experts to aid in production support.

True

One of top three sources of project cost over run is the cost of running both the new and the old systems.

True

Over a decade, global flows have raised world GDP by at least 10 percent; this value totaled $7.8 trillion in 2014 alone.

True

Physical restrictions on hardware were masked by the creation of physical to virtual substitutions as in physical memory replaced by virtual memory.

True

Placement of your servers directly changes the order of the market data you will be seeing.

True

Portfolio Optimization is often cited as a possible quantum computing problem space.

True

Post-Only orders, found on several markets in Canada, are designed to not cross the spread.

True

Programming is translating complicated processes into simple uncomplicated steps.

True

Provisioning is the process of taking an acquisition from a purchased state to an operational state.

True

Public key is for everyone to know and there is no harm in letting anyone know.

True

Qubits usually have a spin-up or spin-down state as well as a quantum super position.

True

REG SCI relies on industry standards to define compliance metrics.

True

REG SCI requires the collection, safe-keeping, and commission accessibility of records on all matters related to REG SCI.

True

ROI analysis is often sensitive to short term P&L impacts.

True

Relating tables to each other resulted in the invention of RDBMS where the fields from one table were the index into another table, defining a relation.

True

Robotic Process Automation (RPA) has reduced audit and contractual processing times from several months to a few weeks.

True

SME is an acronym for small to medium enterprises.

True

Securitization involves the process where banks find borrowers, originate loans but then sell the loans, repackaged as securities, on to investors.

True

Solvency II Directive concerns the amount of capital that insurance companies must hold to reduce the risk of insolvency.

True

Solvency II Directive is a Directive in European Union law that codifies and harmonizes the EU insurance regulations.

True

Solvency II regulations are aimed at the insurance industry.

True

Standard IEEE 802.11 is commonly referred to as Wi-Fi.

True

TPM, Technology Process Modeling is built on the manufacturing time & motion analysis methods.

True

Tesla currently is the leader in accumulating real life driving miles, besting Google, nVidia and Uber.

True

The 3 v's stand for velocity, volume and variety

True

The 5 major application silos can be mapped to the 5 categories of work: corporate, reporting, projects, analysis, and transactions.

True

The CBOT trading pits are closed or closing.

True

The CFP Board published a Code of Ethics and Standards that defines fiduciary duty.

True

The CFP Code of Ethics requires the duty of loyalty: Place the interests of the Client above the interests of the CFP professional and CFP Professional's Firm

True

The CFP Code of Ethics requires the duty of loyalty: Place the interests of the Client above the interests of the CFP professional and CFP Professional's Firm.

True

The CFPB is the primary securities enforcement body in China.

True

The CFPB, FTC, DOJ may each bring cases against Fintech companies for noncompliance

True

The CME exchanges is where the world comes to manage risk.

True

The Financial Stability Board was established by the G20 and has a global enforcement responsibility.

True

The Human Use of Human Beings was first published in 1950.

True

The OFR defines a stable financial system when price discovery is provided even during stress events.

True

The OFR defines a stable financial system when risk transfer is provided even during stress events.

True

The OFR promotes financial stability by delivering high-quality financial data, standards, and analysis for the Financial Stability Oversight Council and the public.

True

The OFR states their main job is to shine a light in the dark corners of the financial system.

True

The SEC rewards whistle blowers with millions of dollars for successful prosecution of fraud.

True

The SIP is often used for client order pricing but rarely for proprietary principal trades.

True

The U.S. Department of the Treasury has a dual mandate to maintain a strong economy and create job opportunities.

True

The US is the current leader of AI development

True

The WEF's report The new physics of financial services cuts through sensationalism to talk about industry structure and impact on business models and regulation.

True

The Windows API categories includes one category dedicated just to security.

True

The book Filter Shift claims that in 9 hours of training an individual can identify their own biases as well as the biases in others.

True

The evolutionary process of physical to virtual resulted in lower costs for identical functionality emulating the original service in a software construction.

True

The human labor required for the complex listed security trade assembly, like the complex process of car assembly before it, is being automated.

True

The initial BPM design question begins with is this process fit for purpose.

True

The insurance industry disrupting tech companies have the advantage with a culture of innovation compared to the traditional insurance company.

True

The insurance industry disrupting tech companies have the advantage with superior digital communication capabilities compared to the traditional insurance company.

True

The management view of the company supports compensation decisions.

True

The need for importing foreign data into the data environment began at the Data Mart level, migrated to the Data Warehouse with the resulting complexity delaying any change to the environment.

True

The new insurance products will be priced based on your behavior as collected.

True

The preferred wealth management trust relationship will remain between two humans, states Schild and Riley.

True

The priority of Process or Data or Time is defined by the perception of the viewer.

True

The process of mining is nothing more than finding and adding a nonce to the block such that the resulting hash begins with x leading zeroes.

True

The purpose of every tool should be to help us to do something we want to do more effectively.

True

The reality is that the Financial Services Industry is very much a service business.

True

The required use of a clearing organization is being regulated across an increasing number of asset classes.

True

The security information network is separate and independent of the production information network.

True

The shift to a more digital form of globalization changes who is participating, how business is done across borders, and where the economic benefits are flowing.

True

The singularity is the point at which AI is capable of recursively improving itself to the point of super intelligence.

True

The technology infrastructure functional requirements for the capital markets are defined by the compliance and integrity regulations of the financial industry.

True

The term INFORMATION can be defined as a numerical quantity that measures the uncertainty in the outcome of an experiment to be performed.

True

The thought experiment of a Turing Machine is to prove computability of a problem.

True

The trading speed wars are now being replaced by the A.I. trade wars.

True

The transactional history on a blockchain is immutable not because the data cannot be changed, but because any change will be immediately visible across the fabric.

True

The typical quantum computer has a slower execution speed than a general purpose computer for each execution step.

True

The typical quantum computer is much faster than a general purpose computer at calculating a result because it needs less steps.

True

There are three types of ERD cardinality: 1:1, 1:M, M:M.

True

There can be public and private block chains.

True

Three in every four applications have at least one vulnerability

True

Throughput is the measure of the transfer of bits across the media over a given period of time.

True

Two prominent blockchain platforms are Etherium and Hyperledger.

True

VIX Weeklys futures began trading at Cboe Futures Exchange

True

When a serverless application has completed its task, it goes dormant, waiting for another event trigger before executing again.

True

When discussing serverless computing, two key concepts are important to understand; functions and events.

True

When faced with a new complex data problem to solve it is best to start with identifying what is known

True

When faced with a new complex data problem to solve it is best to start with identifying what is known.

True

While both accounting and operations view the same assets, the categories and groupings are often significantly different.

True

Apple's iOS provides APIs while Microsoft Windows provides none.

false

BAL and XML were both introduced as proprietary computer languages by IBM in the early 1960s.

false

State transition diagrams are used to encode the organizational structure of state government officials.

false

Waiting for the business vision to prioritize technology change options is a step that should be skipped.

false


संबंधित स्टडी सेट्स

Unit 3.5 - Events Before the War

View Set

Exam 1 - Module 1 (Nurse's Role)

View Set

International Accounting Final Chapter 8

View Set

chapter 22 Postpartum complications

View Set