IS 2000

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

i <- regexpr(some.text, pattern = "^[A-Z]*.ml")[1] if (i == ___) { print("pattern not found") }

-1

Complete the XML document below to make it well-formed

/language>

Enter the line number below where the XML document has a mistake. There are two mistakes

15 and 17

Enter the line number below where the XML document has a mistake. There are two mistakes

15 and 20

Enter the line number below where the XML document has a mistake.

16

Why is collection management not a separate context for information management

Collection management is a type of information management that is important in all 'memory institutions'

T or F? Every XML file must have a DTD

False

True or False? XML is a programming language similar to JavaScript.

False

Which of the following statements about XSLT are true? Check all that apply.

XSLT can produce any text file as output. An XSLT stylesheet is an XML document.

Write a regular expression pattern that would successfully match all strings in the first vector v but none in the second vector r in the R code below.

^[0-9]+[.][0-9][0-9]$

An XML document is well-formed if it __________. • has only one child element under the root element • is valid • a valid nesting of XML tags • contains a DTD

a valid nesting of XML tags

You recently noticed that your personal information has been altered on your university web account. You know that you did not make any changes and the registrar's office has no record of their office making changes. What type of unauthorized access are you a victim of?

active

Patricia has the following code below after reading an XML file that contains elements like these: <aid>12,56,9,234</aid>. How does she get access to the individual IDs, i.e., 12, 56, 9, and 234. Add the missing R code to make the statement execute properly.

answer 1: strsplit answer 2: substr answer 3: nchar

Generally, a for loop in any R program can be replaced with the _________ function which has a more efficient processing time.

apply

Alicia and Yifei both develop an ontology for their business domain but do so separately and independently. These two ontologies are _________. A: guaranteed to be the same as they are both for the same business domain B: are very likely different as there's no correct way to model a domain C: the same if both use a linear process to develop them D: subject to the same biases

are very likely different as there's no correct way to model a domain

In the UML Class Diagram below, the relationship between Zoo and Animal is a(n) _________ relationship.

association

Using a unique username and a complicated password is one possible method to verify that a user is who they say they are. What type of goal is this?

authentication

//PLANT[_______]/COMMON

last()-1

Using the built-in data set cars in R, complete the command to calculate the average of the speed column.

mean(cars$speed)

Which of the following can fill the blank space marked by ________ below in accordance with the rules of XML? Check all that apply.

measure = "cups" measure = 'cups'

Fill in the missing part in the XSL code below:

select

What is software that monitors transmissions, capturing unauthorized data of interest called?

sniffer

A ________ defines super and subclass hierarchies. • class • partonomy • taxonomy • formal axiom

taxonomy

Add the missing code so that the result of the R code fragment below returns the number of words.

unlist

Complete the R statement below that lists all rows from the data frame df where the conditions are true. df <- ToothGrowthdf[_____(df$len > 10 & df$dose < 1),]

which

Fill in the missing code in the highlighted part below

xml_xslt

In the code below, enter the missing XSL expression marked in yellow to ensure that the employee's name is only printed if their salary is greater than 250,000. Do not add extra spaces where not required. <xsl:template match="/employees/employee"><_____________________><xsl:value-of select="name" /></xsl:if></xsl:template>

xsl:if test="salary>250000"

Given the following information, which of the statements below are *not* correct for the UML Class Diagram below. Check all that apply. • At TTCG, courses are organized into modules. • Each module is dedicated to a topic and is divided into units that last no more than 20 minutes, so that three units are an hour of material. • Modules can be shared between courses. • To support teaching a unit requires a presentation deck, at least one example, and an exercise. It also needs instructor notes to support • delivery by other instructors. • Each presentation slide deck is one or more slides plus pre-recorded videos and demonstrations. These elements are commonly called presentation materials. They are often shared between units of different courses. • The Exercise class is missing and should be on the diagram. • The aggregation relationship between Course and Module is appropriate as presented. • The composition relationship between Unit and Example is on the correct end of the relationship. • The SlideDeck class should really be called PresentationDeck. • The multiplicity on SlideDeck is correct.

• The composition relationship between Unit and Example is on the correct end of the relationship. • The multiplicity on SlideDeck is correct.

Which of these are patient right afforded by HIPAA? Check all that apply.

• View and obtain copies of all medical records • Request an amendment to records • Control who is informed about their health information • Restrict information

Which of these are not common forms of bias? Check all that are not common or correct. • anchoring effect • projection bias • in-group bias • negativity bias • pre-purchase rationalization • selective neglect bias • increased likelihood bias

• pre-purchase rationalization • selective neglect bias • increased likelihood bias

Sandeep has a text file that was the result of an export of transactions from Mint. The fields are separated by commas. The first line of the file contains labels for each column. Which of these are correct functions to use to load the file into a data frame?

• read.csv(fileName,header=TRUE,quote="",stringsAsFactors=FALSE) • read.csv(fileName,header=TRUE,quote="",sep=",")

Collection management is usually understood as comprising all the processes which are involved in the creation and maintenance of a collection. Four of the eight usually included processes are listed below. Select the correct four from the list below.

• selection • acquisition • provision of access • evaluation of use

Nonaka and Takeuchi introduced the SECI model (Nonaka & Takeuchi 1996) which has become the cornerstone of knowledge creation and transfer theory. They proposed four ways that knowledge types can be combined and converted, showing how knowledge is shared and created in the organization. Which are they? • selection • externalization • correlation • independence • socialization • internalization • combination

• selection • externalization • socialization • internalization • combination

Complete the DTD below so that the XML document would be valid according to the DTD.

#PCDATA

Jan complains that they cannot calculate the standard deviation or the mean on the bmi column in the dataframe patients.df which they read from an XML as below. He has a similar problem with age. patients.df <- xmlToDataFrame("patients.xml", colClasses = c(_________))

'numeric','integer'

Fill in the missing DTD so that an XML file containing this DTD would allow for multiple DAY tags within a CHANNEL and the constraint that at least one DAY tag must be specified.

+

which of the following statements about this bubble chart are correct

- the size of a bubble encodes additional data dimension - bubble charts are a form of scatter plot

For an interview to yield information effectively, it should be no more than __ long and ideally be conducted _______. • 45 minutes, in the morning • 90 minutes, in the morning • two hours, when convenient to domain expert • an hour, within a week after scheduling • 30 minutes, in the afternoon

45 minutes, in the morning

Enter the line number below where the XML document has a mistake.

5

Janet received three time estimates from her business analyst for the roll-out of a new information system. The analyst believes that it could take as little as 3 days. However, should the vendor not be ready and the server operating system upgrade require a hardware upgrade, then it could potentially take 11 days. But her best guess is that it's about a five day job. Using wide-band Delphi what is the estimate for this task?

6 [5.6667] Excel Workbook

Which line in the XML document below is incorrect? Enter only the line number below.

7

The <xsl:stylesheet> XSL element is equivalent to which of the following?

<xsl:transform>

Complete line 4 in the DTD below so that the XML document would be valid according to the DTD.

?

In the code below, enter the missing XSL expression to ensure that the value printed is each employee's id. <xsl:for-each select="employees/employee">...Employees ID <xsl:value-of select="_______" />...</xsl:for-each>

@id

Consider the UML Class Diagram regarding a petting zoo below and answer these questions. Which of the following statements is true? • An animal can live at multiple zoos. • A petter may adopt no more than one animal. • Each adoption is for several animals. • An animal can only be adopted by a single petter.

A petter may adopt no more than one animal.

In an ontology, class C with attributes AC is a subclass of class B with attributes AB, which, in turn, is a subclass of class A with attributes AA. Which of the following axioms is true? • AC ⊂ AA • AA ⊂ AC • AC ⊂ AB • AB ⊂ AA

AA ⊂ AC

One of the key mistakes that data analysts often make when creating charts for presentations is to ______?

ALL OF THE ABOVE • display the raw data in a table • show all of the data • create exploratory visuals to show the audience the analysis process • use small fonts that are hard to read

Complete the R code below so that it produces the output below the code. Do not add extra spaces:

Answer 1: regexpr Answer 2: substring Answer 3: regexpr Answer 4 substring Answer 5 pos2-1

James has been observing the roulette wheel at Park Plaza Casino and saw that the past thirty spins were all red, so he decides to put all his money on black as it is way overdue. He is falling prey to the _________ type of bias.

Gambler's Fallacy

What relationship exists between domain entities (business objects) Highlighter and WritingInstrument? • Association • Dependency • Realization • Generalization • Composition

Generalization

When creating a heat map, the data analyst should follow which of the following design choices?

Gradients of a single color

Which federal privacy regulation protects personal health information and regulates with whom a health care provider can share the information?

HIPAA

Which of the following statements is false regarding information as a resource

Information as a resource is very similar to every other resource in terms of management.

What is an XSLT Stylesheet?

It contains sets of rules and instructions used for transformations.

Which of these statements about encrypting a ZIP file with a password are true? Check all that apply.

It is a private key encryption scheme that requires all parties to know the key

The data analyst at Ravix International is preparing a that shows the number of new hires for the past 8 years. What kind of chart or graph would you recommend she uses? [dimitri]

Line Graph

An aggregation relationship (in which the part is not permanently fused to its container) is represented in UML notation by a _______. • Line with hollow diamond at one end • Line without an arrow • Line with solid diamond at one end • Line with an arrow at one end

Line with hollow diamond at one end

A composition relationship (in which the part is permanently fused to its container) is represented in UML notation by a _______. • Line with an arrow at one end • Line with solid diamond at one end • Line without an arrow • Line with hollow diamond at one end

Line with solid diamond at one end

Inheritance/generalization relationships (i.e., taxonomies) are represented in the UML notation by which of these? • Lines with solid triangular arrow at both ends • Lines with hollow triangular arrow at one end • Lines with solid diamond at one end • Lines with hollow diamond at one end

Lines with hollow triangular arrow at one end

Which of the following refers to security solutions that protect access to systems, applications, or data by ensuring users or systems are authenticated and allowed to have such access?

Logical Access Controls

Larissa needs to build an XML file and she's chosen to construct a test file manually. Which editor would not work for this purpose?

Microsoft Word

What is identity theft?

One uses another person's personal information for fraudulent activities.

Which of these below is a valid example of a taxonomy? • A captain leads a crew. • A charter is run by a crew. • Powerboats, sailboats, and pontoon boats are all types of vessels. • Books are collections of pages. • FedEx, UPS, DHL, and USPS are all types of delivery carriers.

Powerboats, sailboats, and pontoon boats are all types of vessels.

What is a better assessment on the value of information and why?

Qualitative is better since there are underlying values that can't simply be expressed quantitatively.

Which of the following is NOT a process of archive management?

Retaining records so long as they are needed, and then destroying them or sending them for archival preservation.

Complete the acronym REFSENO -- Representation Formalism for ________ Ontologies.

Software Engineering

Given the following UML Class Diagram, which statement is correct: • An instance of B is connected to several instances of A • Class A is a subclass of class B • Some instances of B are not connected to any instance of A • Some instances of A are linked to multiple instances of B • Some instances of A may not be connected to any instance of B • A and B are both objects

Some instances of A may not be connected to any instance of B

For the XML document below, which of these statements are correct? Check all that apply.

The XML document is well formed The <to> element is a child of the <note> element

Which of the statements below about the SECI model proposed by Nonaka and Takeuchi (1996) is not correct? • It describes four ways in which knowledge types can be combined and converted, showing how knowledge is shared and created in the organization • Knowledge is continuously converted and created as users practice, collaborate, interact, and learn. • The process is continuous and iterative rather than a static model. • The process follows a sequentially arranged set of practices that result in encoded knowledge that an organization can store in a knowledge management system. • All of the above statements are correct. • None of the above statements are correct.

The process follows a sequentially arranged set of practices that result in encoded knowledge that an organization can store in a knowledge management system.

What are two of the main differences between archive management versus record management?

The process of archive management differs from record management in that you should be retaining archival records indefinitely, or until archive policy, with respect to particular records, changes.

Which of these statements about symmetric key encryption is true?

The same key is used for encryption as well as decryption.

What does this instruction mean? <xsl:apply-templates select="//div" />

This means "Find all the <div> elements in the document, and process them according to any applicable templates".

True or False? Every valid and well-formed XML document must contain the preamble similar to the one below: <?xml version="1.0" encoding="UTF-8">

True

Jeff is trying to transform an XML that contains exported data from an inventory management system into a CSV, so he can import it into SPSS for analysis. He successfully built the XSL but the first line in the CSV is always: <?xml version="1.0" ?>

Try using <xsl: output>

What is a more recent and more powerful encryption algorithm widely available in most wireless 802.11 routers?

WPA-2

True or False?

Whenever you click on a "Like" button on CNN.com to mark an article of interest to you, that information is sent to Facebook which may legally store that data, mine it, and use it to direct specific advertising to you.

Would you agree with the following statement about the SECI Model proposed by Nonaka & Takeuchi (1996)? The model has some weaknesses in that it presumes a strong culture, both organizational and national, specifically that culture acts as a limiting factor of the model and is not actually an element in a knowledge management model. • agree • disagree

agree

Biometrics are primarily used for one of two things. What are they?

authentication, identification

What should a data analyst do with information on a chart that is not essential to the story but important such as the source of the data or axis labels

blend them into the background through the use of a lighter color

Which of the following is not a preattentive attribute or pattern?

blending

Each class can be considered a _______ for storing data about a set of similar things.

blueprint

In a stacked bar chart the data analyst shows _______.

both an overall relative amount and the proportions of that amount

All potential primary keys for an entity, class, or table are called its __________ keys. • foreign • artificial • unique • candidate • surrogate • reference

candidate

An ontology design in generally driven by __________ or use cases. • requirements • formal methods • competency questions • classes

competency question

When talking about ontologies, a class describes a _______. • instance • concept • relation • data table

concept

When a person seeks information that is similar to what they already know and avoid other information that might disagree with their point of view or decision, we call such a person as being subject to _________ bias.

confirmation

What is the current most popular approach businesses use to assign value to information?

contingent valuation

All evaluations must be measured. Suggested by Wilfred Lancaster, a useful 6-way typology of what may be measured, contains six of the following seven choices. Which is NOT one of the suggested six?

cost-benefit-effectiveness

What kind of threat renders a system inoperative or limits its capability to operate?

denial of service

Preattentive Patterns

draw the audience to key elements of a visual

Horvath (2000) argues that one should differentiate between knowledge embodied in people and knowledge that is ______ in processes, organizational culture, routines, and such. • applied • used • embedded • organized

embedded

_______ knowledge refers to the knowledge that is locked in processes, products, culture, routines, artifacts, or structures.

embedded

When presenting information visually to an audience that summarizes findings, the analyst should produce which of these visuals?

explanatory

Gruber and Borst define an ontology as "[...] a ______, explicit specification of a shared conceptualization. A: tacit B: defined C: externalized D: formal

formal

Complete this R statement so that it properly parses the string to a data object: depDate <- as.Date("Dec 24/14", _____)

format='%b %d/%y'

IT and IS can be used to help map organizational knowledge areas and can be viewed as a tool in reverse engineering of products. What does this often uncover? • structure • models • hidden embedded knowledge • explicit knowledge

hidden embedded knowledge

A concept that information problems can become serious business problems is _________________.

information risk

Attributes such as name, student ID, major, birth date are examples of _______ attributes for a class Student. • instance • class • derived • inherited • descriptive

instance

Which of these are not properly named identifiers for a data frame object? Check all that apply.

is$married 79YTD

When constructing an ontology, the designer should ________. • always think of an implementation • only use UML to represent the ontology • keep it conceptual and independent of implementation • view them as representations of software structures

keep it conceptual and independent of implementation

Complete the DTD below so that the XML document would be valid according to the DTD.

nid

More than most documents, records have a distinct and predictable lifecycle. Which is NOT a stage in their lifecycle?

none of the above

A class is generally a _____ while a relation is generally a _____. • verb, noun • noun, verb • noun, adjective • verb, adjective

noun, verb

Which R command would you use to determine the total number of rows in the data frame df? Do not add extra spaces that are not required.

nrow(df)

Complete the R statement below so that the code runs. Do not add extra spaces. w <- "79.99" n <- as._______(w) usd <- n * currExch[7]

numeric

Consider o <- c(34,32,223,21,"null"). What is the R statement to access the 4th element? Do not add any spaces in your answer.

o[4]

Ravix' Business Analysis team has decided to use LucidChart as their primary charting tool and replace Visio. After having made the decision to switch, Srujan, the business analysis team lead, notices that many of the charts produced by his vendors appear to use LucidChart. In addition, he notices that LucidChart is among the most common charting tools and that many of his colleagues in other divisions are also using it. This type of bias is known as _________ bias.

observational selection

You are asked to provide your location and email address when downloading iTunes from the Apple site. You are also prompted to check a box if you would like any Apple News updates. This checkbox allows you to do what?

opt-in

When installing the latest version of Microsoft Edge, a dialogue box pops up with a box checked telling you that Bing will be your automatic search provider. You have the opportunity to change this selection before continuing. This checkbox allows you to do what?

opt-out

In a(n) ______ observation, subjects tend to ________, often called _______. • active, change the normal work procedure, the Halo effect • active, work faster, the Hawthorne effect • passive but visible, change the normal work procedure, the Hawthorne effect • active but invisible, follow the normal process, process crashing • passive and visible, be unaware of the observation, the Hawthorne Effect

passive but visible, change the normal work procedure, the Hawthorne effect

In an effort to limit the Hawthorne Effect during an observation of call center representatives to determine customer interaction skills, it is advisable to perform a ________ and _______ observation. • passive, invisible • active, invisible • invisible, remote • passive, in-context • selective, passive

passive, invisible

Which function or operator is used in R to concatenate multiple strings into a single string?

paste

You have received an email from your university IT department stressing that the IT department will NEVER ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from?

phishing

When considering security threats it is very important to consider _______ and _______ of the threat on the organization.

prevalence, impact

To encrypt its message payload, the secure socket layer (SSL) protocol uses which of these encryption schemes?

public key encryption

A focus group is an example of a ________ research method, while a post-implementation survey using Likert-scale questions is an example of a ________ research method. • qualitative, quantitative • quantitative, qualitative • mixed-method, quantitative • triangulation, mixed-method • exploratory, mixed-method • in-depth, superficial but fast

qualitative, quantitative

Karl needs a vector of 20 random numbers from 1 to 36. Help him complete the code below (only enter in your answer what is required to complete the code and make it run): r <- runif(_________)

r = runif(20,1,36)

For the built-in data set iris, what is the range of the Sepal.Length feature (column)? Enter a single number not upper and lower bounds.

r code: max(iris$sepal.length) - min(iris$sepal.length) 3.6

Non-randomized surveys often are subject to the _________ bias which described the situation where principally respondents at the extreme respond to the survey, often resulting in skewed data.

response

In the XML document below, the element (tag) <employees> is referred to as the _______. • primary tag • leaf element • root element or root • key element

root element or root

Assume that the XSL transformation (fragment) below is applied to the following XML document (fragment). In the code below, enter the missing XSL expression to ensure that the value printed is each employee's salary. <xsl:template match="/employees/employee">Salary is: <xsl:value-of select="______" /></xsl:template>

salary

What are cookies?

small text files stored by the browser on the client computer

What term is used to refer to someone (or something) pretending to be someone else (or another computer)?

spoofing

When creating a presentation, it is often advisable to _____ the key message

start with

Virginia Coastal College has gone through an extensive process of evaluating alternative LMS products to replace Blackboard. After a year-long selection process, they decided to stay with Blackboard and they felt it's the safe choice because everyone is familiar with the product, its flaws, and the vendor. This is an example of _________ bias.

status-quo

In the relationship, "helicopter is a particular type of aircraft", helicopter is a(n) ____________. • generalization • supertype • instance • subclass • entity • actor

subclass

To extract (get) the currency (which is always a letter followed by a symbol or two letters) from strings like "R$ 99.99" or "EU 149.50", you would use which Base R function? Check all functions that would apply.

substring substr

Which R command would you use to generate the following output for the built-in cars data set? Enter the full command to get the result below without adding extra spaces that are not required.

summary(cars)

Which one of the following is not common disadvantage of surveys for information collected? • self reporting may lead to bias • small response groups may bias the results • surveys do not provide adequate information on context • surveys are relatively inexpensive to conduct

surveys are relatively inexpensive to conduct

______ knowledge refers to intuitive, hard to define knowledge that is largely experience based. Because of this, that type of knowledge is often context dependent and personal in nature and thus hard to communicate and deeply rooted in action, commitment, and involvement.

tacit

In practice, all knowledge is a mixture of ______ and ______ elements rather than being one or the other. • ingrained, hidden • organized, unorganized • tacit, explicit • hidden, implicit

tacit, explicit

Inspect this XML file (plants.xml download) and then complete the XPath expression below that only returns the value of the matching elements, i.e., what is between the opening and closing tags. Do not add extraneous spaces. //PLANT/PRICE/

text()

When designing an ontology for some domain, the analyst discovers that two classes have several attributes in common. In such a situation, it is likely that ________. • one of these classes is a superclass of the others • it is a coincidence • the classes have a common superclass • all classes are part of another class • another class has each as a superclass

the classes have a common superclass

To combat viruses and other malware a company has adopted a whitelisting approach to managing computer security. What does that mean?

the company only allows certain pre-identified programs to run on its computers

True or False? A class represents a concept and not a term or word in a language, i.e., an ontology would have one class rather than a class for Car, another for Voiture (French), another for Carro (Portuguese), and another for Auto (German). • true • false

true

Which multiplicity expressions are valid in a UML Class Diagram showing relationships between domain entities? Check all that are valid. • 5..5 • * • -5..5 • 1 • 1..0 • 0..* • 2..10

• 5..5 • 1 • 0..* • 2..10

An ontology generally contains which of the following? Check all that apply. • Classes • Attributes • Relationships • Formal Axioms • Slots • Properties • XML

• Classes • Attributes • Relationships • Formal Axioms • Slots • Properties

For the wide-band Delphi estimation process, which of these statements are correct? Check all that apply.

• Delphi requires at least 2 rounds of estimates • after easch round, except the final round the estimates are discussed and the high and low estimators are asked to share their assumptions • the participants in Delphi are expected to be experts • The estimates must be provided anonymously by each participant

Knowledge Management Systems that contain facts and explicit information store which of the following? Check all that apply. • E-Mails • Names of people who know processes • Databases • Documents • Notes • Memos

• E-Mails • Databases • Documents • Notes • Memos

Which of the following are three elements to a knowledge management program?

• content, the type of knowledge to be shared, and the way in which it is represented • technology, the means by which it is shared • culture, promoting the sharing of knowledge

Data management is the management of structured sets of facts and figures instead of bodies of text. What does data management include? Check all that apply.

• database systems • data modeling • metadata • data quality and • security issues • archives and repositories

A class name in an ontology should _________. Check all that apply. A: define a concept B: should not be reserved word C: follow a naming convention such as camelCase D: be a verb E: be a noun

• define a concept • should not be reserved word • follow a naming convention such as camelCase • be a noun

When defining a relation (aka relationship) in an ontology, which of these are generally given or provided? Check all that apply. • name • source concept/class • target concept/class • cardinality/multiplicity • implementation

• name • source concept/class • target concept/class • cardinality/multiplicity

Which of the following statements about the UML Class Diagram below are correct? Check all that apply. • no video has more than two narrators • some videos may not have any narrators • all narrators are required to narrate videos • a video must have at least one narrator • every video is narrated by at least one narrator • the video on "Tactical Cat Breeding" has four narrators

• no video has more than two narrators • a video must have at least one narrator • every video is narrated by at least one narrator

Which of the following are components/the framework for information management? Select all that apply.

• policies and strategies • plans and objectives • missions and visions

In the XML document below, the element (tag) <photo> is referred to as a _______. Check all that are valid. • sibling element of <id> • leaf element or leaf • child element of <employee> • root element

• sibling element of <id> • leaf element or leaf • child element of <employee>

According to Horvath (2000) and Gamble & Blackwell (2001), embedded knowledge refers to knowledge that is locked in which of these? Check all that apply. • structures • routines • culture • data models • processes

• structures • routines • culture • processes

Which of the following statements about the UML Class Diagram below are correct? Check all that apply. • there are some examples which are not included in any lesson • some lessons may not have any examples • every lesson has at least one example • lessons are collections of tutorials and examples • some learning assets may not be allocated to a lesson

• there are some examples which are not included in any lesson • some lessons may not have any examples • lessons are collections of tutorials and examples • some learning assets may not be allocated to a lesson

What are some drawbacks of XML? Check all that apply.

• ΧΜL cannot be used for images • XML is not suitable for large data sets • XML can get difficult to read as the object structures get more complex


Set pelajaran terkait

Head and neck practice questions

View Set

La culture française (questions ouvertes)

View Set

Psychology 101 - Chapters 4, 5 and 6

View Set

LSU 1101 BOYAJIAN SPRING 2018 HW MIDTERM

View Set

Chapter 3 - Process Cost Systems (ACCT 2025)

View Set

GP: MUSCULOSKELETAL/ORTHO/NEURO ISSUES

View Set

silvestri practice questions for exam 2

View Set