Concepts Assessment 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?

$56

Which intellectual property is correctly matched with the legal device or tool that protects it?

A portrait that you paint can be copyrighted.

The acronym for a database administrator is ________.

DBA

Which Act outlines a plan to protect government information and assets against cyberthreats?

Federal Information Security Management Act (FISMA)

June, an IT manager at a financial institution, learns that team member Charla has a health issue and needs to take a half day off once a week for a few months. Without violating Charla's privacy, how can June make an ethical decision that maintains a perception of fairness at a very busy time?

Following the Universalist Principle, June can remind the team that flexible hours are available to all members as long as everyone logs their total hours per week.

Many project managers create a flowchart before creating a

Gantt chart.

A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?

Inform employees of the monitoring and obtain their consent.

What does the acronym RDBMS stand for?

Relational Database Management Systems

________ software allows managers to take control of an employee's computer remotely and record the computer's mouse and keyboard entries.

Remote desktop

Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant?

The US PATRIOT Act/USA Freedom Act

In 1998, the Child Online Protection Act was sponsored by both Democrats and Republicans, passed by both houses of Congress, and signed into law by President Clinton. Why can't an offender be punished today for violating this law?

The law was later found unconstitutional for violating the First Amendment (freedom of speech).

In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?

This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.

The principle that states that when faced with an ethical dilemma a manager should choose the option that does the greatest good for the most people involved is called the

Utilitarian Principle.

Jenaliah needs to create a password to access her credit card's online payment system. Which of the following passwords is the most secure?

Yh30!nP#RJ?

One of the ________ of data warehouses is their ability to provide access and analysis of information from a variety of subject areas.

advantages

Data marts assist with the ________ of what data a user needs rather than focusing on existing data.

analysis

Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.

analyzing

In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information?

big data

When data is stored in one place, it means it is ________.

centralized

A record is a ________ of related fields in a data file.

collection

A bank clerk has inappropriately used a customer's personal email address. The branch manager reprimands the employee and withholds an expected promotion. Which dimension of ethical behavior in the digital age is demonstrated by this disciplinary action?

control and accountability

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies.

Which of the following would the project completion time be based on?

creating the software which all components of the project depend upon to run smoothly

When creating a field in a database, the field type specifies the type of ________ in the field.

data

A database management system (DBMS) is a computer program that is used to create, process, and administer a ________.

database

Data administration tasks include the development of information policies, data planning, ________, security, and how internal-users and end-users use that data.

database design

When conducting an ethical analysis, what is the last step you should take?

deciding and preparing for consequences

On the flowchart, a decision point is depicted by a(n)

diamond.

What is the goal of a project portfolio manager?

ensure that their firm accepts only the right projects

The First Amendment to the U.S. Constitution affects Internet privacy because it

extends freedom of speech protection to the Internet, which means government does little filtering of content.

There are ________ basic principles of ethical conduct.

five

A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skincare product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?

implementation

An online photo printing company can temporarily lose its e-commerce ubiquity if

its website crashes due to a coding error or attack by hackers.

Which of these is the "L" factor that managers examine while conducting a PESTEL analysis?

legal considerations

A DBMS provides the ability to ________, query, and store information in a database for managers and database administrators.

monitor

What is the basic formula for estimating risk exposure?

multiply risk probability by risk impact

What does the acronym NoSQL stand for?

non-relational databases

Cookies that are stored on the hard drive and are not lost when the web browser is closed are called

persistent cookies.

How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of the Internet

privacy.

A ________ is also known as a question. A request for information from a database.

query

Because we can create relationships in Microsoft Access, this program is considered to be a(n) ________ database.

relational

What are third-party cookies?

small text files created by websites other than those visited by web customers

Keystroke loggers and packet analyzers (sniffers) are two common types of

spyware.

SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the ________ language for relational database management systems.

standard

If McDonald's and Burger King raise prices too high, customers may switch from burgers to tacos. This illustrates Porter's force of

substitutes.

When creating a relationship in a relational database management system (DBMS), which object is used?

table

Relational databases organize data into ________ based on structured data groupings.

tables

Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?

the Digital Millennium Copyright Act (DMCA)

What is a company that purchases consumer behavior information from other organizations engaged in?

third-party data purchase

What is antivirus software used for?

to scan files to identify and remove computer viruses and other malicious programs

Making an ethical decision will most likely result in

unintended consequences

Online content that has been created and posted by unpaid contributors such as customers or fans of a product or service is referred to as

user-generated.

To remain relevant in today's e-commerce landscape, many businesses use progressive ________ applications to undertake m-commerce.

web

On an e-commerce presence map, what is presence?

websites, email, social media sites, and offline media


Set pelajaran terkait

Chapter 26: Disorders of Blood Flow and Blood Pressure Regulation

View Set

Good Stuff for Mental Health Final

View Set

chapter 32 animal diversity and evolution of body plans

View Set