Exam #2 Knowledge Check Questions
Related to the upcoming Exam-2 on March 25-26, which of the following are TRUE? a) Exam 2 must be completed no later than March 26 11:30PM (Az time; AZ does not observe daylight savings) b) The exam is taken on D2L with online Examity Proctoring (and I must sign-up for the online Examity proctoring following instructions on D2L) c) The exam requires an External webcam for proctoring. The external webcam needs to be setup following the external webcame setup guide to show my profile, desk area (including: keyboard, mouse, hands) and computer. d) The standard exam time is 75 minutes (DRC accommodations allow for increased time) e) The coverage is Module 2 d) ALL of the options above are TRUE
ALL of the options above are TRUE
Virtual Teams can benefit from a) Video conferencing b) Synchronous communication c) Asynchronous communication d) All of the above e) Video conferencing + Synchronous communication
All of the above
As discussed in our class, how does Amazon use databases on their website? a) Populate review data b) Welcome the user in a personalized way c) Provide product recommendations based on order history d) All of the other options are correct e) Retrieve product prices and images
All of the other options are correct
What are some of the advantages of modern data mining/analytics techniques? a) Can use patterns learned from past data to predict likely outcomes in new data b) All of the other options are correct c) Can analyze large amounts of data quickly d) Can provide analyses to support improved decision making e) Can discover new (previously unknown) patterns in data
All of the other options are correct
__________ is an example of an electronic conferencing tool. a) Wikipedia b) Google Docs c) MS Outlook d) MS SharePoint e) Apple FaceTime
Apple FaceTime
AZT owns a small Fleet of trucks and book jobs through an online fright brokerage. Which e-commerce business model does AZT fall under? a) G2C b) None of the other options is correct c) B2B d) C2B e) A2B
B2B
In our WordPress assignment, we learned to create a site that discussed a tech talk. Which of the following could we do with WordPress? a) All of: Normalize Data, Add images, Embed video b) Add images c) Embed video d) Normalize data e) Both: Add images, Embed video
Both: Add images, Embed video
Consider our class activity (screen capture below). To shoe pub_Name, number of books for each publisher, We need to: a) Both: {Enable the Totals Botton, Include pub_name as a GROUP BY column} b) include pub_name as a GROUP BY column c) All of: {Add one more Table, Enable the Totals Button, Include pub_name as a GROUP BY column} d) Add on more Table e) Enable the totals button
Both: {Enable the Totals Botton, Include pub_name as a GROUP BY column}
You're a business professional, but you enjoy painting in your spare time. Running out of space in your garage, you put a few pieces up on EBay. Which e-commerce business model does this fall under? a) None of the other options is correct b) B2B c) A2B d) C2B e) C2C
C2C
Recall our tech talk video about passwords featuring a clip from the Jimmy Kimmel show. Why do people give up their passwords in the Kimmel video? a) Knew the person well from before b) Confidence of the person asking questions. Also "victims" usually have a desire to be helpful or socially acceptable. c) All of the other options are correct d) Two-factor authentication e) Hypnosis effect
Confidence of the person asking questions. Also "victims" usually have a desire to be helpful or socially acceptable.
In the example COURSES table that follows, how do you know this is not normalized? [Note: primary key is underlined] a) Course Name is duplicated b) CourseID is the primary key c) None of the other options are correct d) Section is duplicated e) Instructor information should be in the courses table
Course Name is duplicated
__________ is used in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people. a) None of the other options are correct b) Disintermediation c) Nearshoring d) IN-shoring (a combination of Insourcing and Nearshoring) e) Crowdsourcing
Crowdsourcing
What are some of the problems with using a Spreadsheet for managing large datasets as company transactions (e.g., order history) data? a) Spreadsheet are not suitable for storing numbers like product prices and quantities b) Difficulty in sharing the data across department and users c) Spreadsheets are more expensive d) We cannot analyze and summarize data using spreadsheets e) None of the other options are correct
Difficulty in sharing the data across department and users
Best Buy is an example of a "brick-and-mortar" only business. a) True b) False
False
Facebook is good example of click-and-mortar company. a) True b) False
False
The primary use of online transaction processing (OLTP) systems is to define a set of reachable and exploitable vulnerabilities present in a database. a) True b) False
False
Web 1.0 applications allow people to collaborate and share information online. a) True b) False
False
Which of the following is NOT an example of Crowdsourcing? a) Wikipedia b) Kickstarter c) GoFundMe d) OpenStreetMap e) Google docs
Google docs
The Network Effect refers to the notion that the value of a network... a) Is measurable only on social networks (e.g., Facebook, Twitter, LinkedIn) b) None of the other options are correct c) Increases with the number of users in the network d) is driven by how it is (i.e., newer networks are more valuable) e) Decreases with the number of users in the network
Increases with the number of users in the network
Which of the following best describe "Big Data"? a) Data on USB drives instead of clay disks b) Large volumes of data from a variety of sources c) Data from football and basketball players d) Data where tables have Primary keys e) None of the other options are correct
Large volumes of data from a variety of sources
__________ is an example of an electronic communication tool. a) Microsoft Outlook b) Apple FaceTime c) Google Hangouts d) MS SharePoint e) Google Docs
Microsoft Outlook
__________ is an example of a system that learns patterns from past data to apply to new cases or scenarios. a) Expert systems b) OLTP (online transaction processing) c) None of the other options are correct d) Primary Keys and Foreign Keys e) Neutral networks
Neutral networks
In context of BI, "slicing and dicing" refers to analysis using: a) OLTP b) Foreign Key c) Clustering d) Primary Key d) None of the other options are correct
None of the other options are correct (OLAP Cubes)
A student decided to sell a textbook from last semester online. Which e-commerce business model does this fall under? a) B2C b) B2B c) None of the other options is correct d) G2C e) A2B
None of the other options is correct (C2B or C2C)
In your spare time you enjoy a wood carving hobby. You sometimes sell a piece or two online. Which e-commerce business model does this fall under? a) G2C b) B2B c) A2B d) B2C e) None of the other options is correct
None of the other options is correct (C2C)
Which of the following is an example of Crowdsourcing? a) iCloud b) The Google docs platform c) OpenStreetMap d) Microsoft Access e) Your WordPress blog
OpenStreetMap
An "Instance" of a person matches a __________ whereas a "collection" of people matches a __________. a) Row; table b) Column; field c) Table; key d) Column; table e) Row; field
Row; table
As we saw in one of our Tech Talks, Sammi used the following approach to get Social Security numbers. a) Denial of service b) A virus (keylogger) c) Crowdsourcing d) Social engineering e) None of the other options are correct
Social engineering
Recall our class activity (screen capture below) adapted from out class activity. Which of the fields was used to map Revenue to locations? a) Revenue b) None of the other options are correct c) Display d) Region e) State
State
This is a Pivot table that only displays data for the west region (and no other region) for ALL displayed companies. a) True b) False
True
Walmart is an example of a "Click and Mortar" business. a) True b) False
True
For Assignment 5, we need to submit: a) One submission (an Access file) b) One submission (a Word file) c) 3 files: An Excel file, a Word file and an Access file d) One Submission (i.e., upload the Word file and Access file in the same submission box) e) Two Submissions (i.e., separate submission drop-boxes for a Word file, and an Access file)
Two Submissions (i.e., separate submission drop-boxes for a Word file, and an Access file)
Which of the following best relates to Web 2.0? a) Users becoming both consumers and creators of content b) The Long Tail c) None of the other options are correct d) Broadcast of information rather than two-way communication e) The University of Arizona website from 2000
Users becoming both consumers and creators of content
__________ are comprised of members from different geographic areas assembled as needed to collaborate on a certain project. a) Non-core teams b) Work groups c) Virtual teams d) Task forces e) Command groups
Virtual teams
A query is used to __________. a) ask a question of, and retrieve data from a database b) allocate storage space for a database c) eliminate data duplication d) organize and sort the data in a database e) prevent illegal or illogical entries from entering the database
ask a question of, and retrieve data from a database
When we consider entities as tables, each column is a(n) __________. a) attribute b) form c) applet d) query e) record
attribute
When we consider entities as tables, each column is a(n) __________. a) record b) query c) attribute d) form e) applet
attribute
Which of the following Web 2.0 applications has been classified as the "amateurization" of journalism? a) instant messaging b) message boards c) chat rooms d) discussion forums e) blogs
blogs
Once the data model is created, the format of the data is documented in a data __________. a) warehouse b) dictionary c) mart d) entry e) domain
dictionary
Which of the following is an example of asynchronous communication? a) e-mail b) videoconferencing c) online chat d) electronic meeting support systems e) shared whiteboards
Recommender systems and search capability of a website fall under which of the following categories? a) structural firmness b) disintermediation capacity c) functional convenience d) representational delight e) cost compliance
functional convenience
The orange line in the figure refers to an appropriate level of which concept (linear-horizontal)? a) functional convenience b) representational delight c) structural firmness
functional convenience
The term __________ refers to a class of software that enables people to work together more effectively. a) groupware b) firmware c) malware d) mashup e) spyware
gorupware
Nestle's Digital Acceleration Team (DAT) was created to a) monitor online consumer sentiment b) develop new viral advertising campaigns c) explore new product development d) All of the other options are correct e) respond to security breaches
monitor online consumer sentiment
Responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ___________ level of an organization. a) business b) strategic c) operational d) tactical e) executive
operational
Which of the following is a risk associated with a database approach? a) minimal data redundancy b) enforcement of standards c) reduced program maintenance d) program-data dependence e) organizational conflict
organizational conflict
When we consider entities as tables, each row is a _________. a) bot b) query c) record d) field e) form
record
A(n) __________ is compilation from a database that is organized and produced in printed format. a) form b) entity c) attribute d) field e) report
report
The blue line (i.e., with the positive slope) in the figure refers to an appropriate level of which component? a) functional convenience b) representational delight c) positive social engineering d) None of the other options are correct e) structural firmness
representational delight
Visual appeal of a website falls under which of the following categories? a) representational delight b) disintermediation capacity c) structural firmness d) cost compliance e) functional convenience
representational delight
__________ are produced at predefined intervals to support routine decisions. a) security reports b) drill-down reports c) scheduled reports d) exception reports e) key-indicator reports
scheduled reports
Companies use __________ in an attempt to move up their Web sites in the organic search engine results. a) search engine keyword insertion b) search engine image protection c) search-oriented architecture d) search engine optimization e) domain stacking
search engine optimization
Security and performance of a website fall under which of the following categories? a) representational delight b) functional convenience c) disintermediation capacity d) cost compliance e) structural firmness
structural firmness
In a database management system (DBMS), data are kept separate from the applications' programming code. This means that __________. a) an application cannot be changed without making changes to the database b) the database needs to be changed when a change is made to an application c) an application needs to be changed when the database is changed d) an application's programming code needs to be updated continuously to keep up with the database e) the database does not need to be changed if a change is made to an application
the database does not need to be changed if a change is made to an application
Which of the following statement is true about firms pursuing a click-and-mortar business strategy? a) these firms are only involved in export business activities b) these firms indulge in rafter bidding activities c) these firms operate in both physical and virtual arenas d) these firms avoid indulgence in electronic commerce e) these firms avoid indulgence in physical store locations
these firms operate in both physical and virtual arenas
Which of the following is an example of synchronous communication? a) work flow automation systems b) videoconferencing c) online reviews d) bulletin board systems e) e-mail
videoconferencing
Many companies have not been able to realize the full potential of a virtual world environment beyond just providing virtual showcases for their products. a) True b) False
True
Social media is classification of Web 2.0 applications. a) True b) False
True
In context of databases, which of the following is/are true? a) The following terms are synonymous, i.e., Primary Key = Foreign Key b) The following terms are synonymous, i.e., Relation = Row c) All of the other options are correct d) The following terms are synonymous, i.e., Attribute = Tuple e) The following terms are synonymous, i.e., Attribute = Column
The following terms are synonymous, i.e., Attribute = Column
In context of databases, which of the following is/are true? a) All of the other options are correct b) The following terms are synonymous, i.e., Primary Key = Foreign Key c) The following terms are synonymous, i.e., Attribute = Tuple d) The following terms are synonymous, i.e., Relation = Table e) The following terms are synonymous, i.e., Relation = Row
The following terms are synonymous, i.e., Relation = Table
In context of databases, which of the following is/are true? a) The following terms are synonymous, i.e., Tuple = Row b) The following terms are synonymous, i.e., Attribute = Tuple c) The following terms are synonymous, i.e., Relation = Row d) All of the other options are correct e) The following terms are synonymous, i.e., Primary Key = Foreign Key
The following terms are synonymous, i.e., Tuple = Row
Why is Blendtec successful in their Marketing videos? a) None of the other options are correct b) Focus on big surprises and do not make sequels c) Because of freeconomics. They charge for blenders but the YouTube videos are free. d) The video contains the unexpected/have shock value e) The videos are serious and focus on drama rather than humor
The video contains the unexpected/have shock value
Which of the following statements is true about ad hoc queries? a) They are predefined intervals to support routine decisions. b) They highlight situations that are out of the normal range. c) They answer unplanned information requests to support a non-routine decision. d) They help analyze why a key indicator is not an appropriate level or why exception occurred. e) They provide a summary of critical information on a recurring schedule.
They answer unplanned information requests to support a non-routine decision.