ISYS 363 Final Exam ! Set 4
diamond
represents decision points and typically hold questions on a flowchart.
records
Collections of related fields in a database are referred to as ___.
persistent
Cookies stored on your device's hard drive and remain even if your computer has been restarted are called ___________ cookies.
Bachelor's degree
Data analysts are likely to have achieved what education level when beginning their career?
Business or organization
Data analysts must blend facts and data with knowledge about the ___.
pictogram
Design elements that can lead to misleading data visualization include exaggerated or improper scaling. This can most often occur when presenting data in the form of a ___.
project
If a client has a concept in mind, the ___________ manager must ensure the feasibility of the concept, provide for flexibility with the outcome, and manage the expectations of the client and all stakeholders.
external dependency.
If a task falls outside of the program manager's immediate control it is referred to as a(n) ____ __________.
planning
If required, a PERT network chart would be developed in the ___________ phase of a project.
Pie chart
If you are displaying data as a percentage of a whole or you have a set of variables that make up 100%, it is usually best to us a ___ to visualize the data.
opt
If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n) ________-in.
external
If your spouse must approve the paint selection before you can begin painting a room, then the paint project has an ___ dependency on the paint selection* *Note - this assumes that you have no control over your spouse.
analytics
Improving decision making, customer service, production and operations processes are just a few of the trends in data
Fields
In a database, data is organized in complex and meaningful collections specified by the database administrator. These collections are referred to as __________.
fields
In a database, data is organized in complex and meaningful collections specified by the database administrator. These collections are referred to as ____________.
internal
In addition to the main four relationships, project managers also categorize relationships according to whether they are internally or externally dependent. With an ______________ dependency, the project manager has a degree of control over the tasks.
syntax
In computer programming, a set of rules and guidelines that define a specific computer language is referred to as the language's ___.
rectangle
On the flowchart, a process is depicted by a
oval
On the flowchart, beginning and ending point. - the terminator
crashing
Once a program manager has developed a PERT network chart and determined the critical path for project completion (the critical path method (CPM)), the project manager will attempt to create efficiencies by addressing those activities along the critical path and focusing on how to make methods of making them as short as possible. This is referred to as project ___________
SS
One activity cannot begin until another has begun
FS
One activity must be accomplished before the dependent activity can be started.
expectations
One challenge that often faces project managers is managing the ___ of the client and other stakeholders.
communication
One of the keys to success in any project is highly transparent _____________ throughout each of the phases among all the parties involved.
PERT network chart
One reason to create a Gantt chart is that it provides the framework for the development of a ___.
unintended consequences
Part of making an ethical decision is understanding that your decision will most like result in ___ .
Ensures that the firm only accepts the right projects.
Project Portfolio manager
temporary
Projects have starting points and (hopefully) ending points, and are, therefore, ___ by their very nature.
Anonymization
Protecting private or sensitive information by eliminating or encrypting information is the goal of data __________.
- Gantt charts display the concurrent nature of certain project activities. - Unlike flowcharts, Gantt charts include the time duration on the X axis.
Select two advantages provided by a Gantt chart, as opposed to a simple flowchart.
- Data visualization - Data structuring - Data reporting
Some of the responsibilities of a data analyst include which 3 of the following?
Analyst
Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data ___.
network
The advantage of a PERT ________ chart is that it displays the interconnectivity of different processes, including activities that can be completed concurrently.
5
The ethical concerns of the digital age can be divided into ___ dimensions (categories).
data
The information technology (IT) architecture and infrastructure, software applications, programming languages, and storage technologies used for the collection, storage, analysis, and interpretation of meaningful data is referred to as the _____________ ecosystem.
Analytics
The process of investigating raw data of various types to uncover trends and correlations, and to answer specifically crafted questions is the role of data ___.
capture the user's account data, passwords, key strokes, and more
The purpose of spyware is to ______.
The Universalist Principle
This principle states that a manager must attempt to determine if this decision is fair for all involved.
- Composable data - Scalable AI - Data analytics as a core business function
Trends in data analytics include which 3 of the following?
spreadsheet
Which program is typically limited to one user at a time?
A persistent cookie
Which type of cookie is lost only if deleted or if is created with an expiration date?
Information Privacy Rights
Your boss states that in your organization data must be used responsibly and privacy should always be respected. This aligns with which dimension of ethical concerns in the digital age?
PERT
Allowing managers to direct resources from activities that are not on this critical path and apply them to more critical processes is an advantage of .
- Social security numbers - Names - Phone numbers
When discussing personally identifiable information (PII), which 3 of the following are usually anonymized?
arrow
describes a directional progress of a flowchart.
- Metrics - Data - Facts
According to Tableau, data-driven decision making (DDDM) is the uses which of the following to guide strategic business decisions that align with organizational goals, objectives, and initiatives.
Database
A SQL statement is used to ask a question or communicate a request of the _______ management system.
database
A SQL statement is used to ask a question or communicate a request of the _______ management system.
flowchart
A ___ can serve as a building block to more sophisticated program management tools and help all stakeholders to better understand the intermediate steps required to complete a project.
copyright
A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a
Gantt chart
A horizontal bar chart commonly used by PMs that shows project activities on the Y-axis and time on the X-axis is called a ___.
cloud
A major transition in the big data security sector is to move all data storage to ________ storage.
relaistic
A project is temporary in it's nature and is undertaken to achieve a goal. To be a goal it must meet the S.M.A.R.T. criteria. The R stands for ___ .
Information Privacy Rights
Which dimension of ethical behavior in the digital age is represented by the following question? You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?
- Spyware captures private information by monitoring how users interact online. - Downloading software or documents from unvetted sources is one way spyware can be installed.
Which of the following statements accurately describes spyware? More than one answer may be correct.
matches Choice Spreadsheet
Which program is typically limited to one user at a time?
Scalable
A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as ____ AI.
laws
A starting point to investigate the complex topic of a society's ethics is first to understand the society's _ and the history behind the enacting of them.
FF
Activities can be accomplished independently of each other, but both must be completed in order for the project to be completed.
planning
All projects have four essential phases; initiation, ____________ , execution, and closure.
- Curiosity - Data strategy - Understanding context
Analytical skills necessary for a data analyst include the characteristics and capabilities that allow for the observation, research, and interpretation of a problem or change in a desired state. According to Google, there are five essential aspects of analytical skills including which 3 of the following?
- Data strategy - Understanding context - Curiosity
Analytical skills necessary for a data analyst include the characteristics and capabilities that allow for the observation, research, and interpretation of a problem or change in a desired state. According to Google, there are five essential aspects of analytical skills including which 3 of the following?
- Realistic (R) - Attainable (A) - Time-based
As with all goals, projects should meet the S.M.A.R.T. criteria; that is, the project must have a specific objective (S), progress must be measurable (M), as well as which 3 of the following?
- Building a data-driven community - Data proficiency - Agility in analytics and data analysis
Because many business executives desire to create a data-driven decision making culture, which 3 of the following are competencies organizations invest in to support DDDM?
Gantt
Because some tasks in a project can be done concurrently while other tasks are dependent upon the completion of preceding tasks, the most widely used tool in project management is a horizontal bar chart known as the _______ chart.
flowcharts
By allowing viewers to see the project's progress, project managers can reduce the anxiety caused by apparent inaction. For this reason, PMs often provide simple ___.
- Characters - Records - Fields
Characteristics of databases include which 3 of the following?
- Information is organized into cells - Data is structured in rows and columns
Characteristics of spreadsheets include which 2 of the following?
Analytical
Curiosity, understanding context, having a technical mindset, data design, and data strategy are the 5 essential aspects of __ thinking and skills
project planner
Focusing on project scheduling and sequencing to optimize the progress of all of the projects in a firm's portfolio is the role of a ___.
facts
Getting all the pertinent __________ is the first step in an ethical analysis.
SF
One activity is not considered complete until the next task has been started.
1. Getting all the pertinent facts 2. determining the affected 3. searching for precedents 4. Listing possible options 5. Deciding and preparing for consequences
Place the 5 steps of an ethical analysis in order.
portfolio
Project management firms use project ____________ management (PPM) software to assist in appropriately allocating resources and to aid in determining whether additional projects can be successfully and profitably be completed.
Focuses on completing the project correctly.
Project manager
Ensures that the client understands the project cost and timeline.
Project planner
- To avoid the tendency to accept more projects than might be reasonable. - To minimize the possibility of project delays due to equipment or worker overscheduling. - To reduce the likelihood of overworking staff and disappointing clients.
Select the reasons why project planners use project portfolio management (PPM) software.
Gantt charts are primarily designed for internal stakeholders rather than external stakeholders.
Select the true statement regarding a Gantt chart.
- Unlike flowcharts, Gantt charts include the time duration on the X axis. - Gantt charts display the concurrent nature of certain project activities.
Select two advantages provided by a Gantt chart, as opposed to a simple flowchart.
standards
The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing .
planning
The final step in the ________ phase involves scheduling a meeting with project stakeholders and allowing these key players to review the Gantt chart or project timeline.
Personally
When data is anonymized, the PII is eliminated or encrypted. PII includes names, social security numbers, addresses, and more and stands for ___ identifiable information.
- Phone numbers - Names - Social security numbers
When discussing personally identifiable information (PII), which 3 of the following are usually anonymized?
- Your neighbor has a history of abusing children, do you have a right to know this? - One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? - You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment?
Which three of the following situations involve information privacy rights?
- Digital piracy - Cyberbullying
Which two of the following are examples of ethical concerns that have been created as a result of new technologies?
analyst
Working on data analytics teams to extract data from large data sets, creating reports that outline key findings, monitoring key performance indicators (KPIs) to identify success or failure, and analyzing data to identify trends are just a few of the responsibilities of a data
Listing options and weighing possible outcomes are __________________skills.
Select the fourth step in the five steps of an ethical analysis.
flowchart
Because projects are comprised of four distinct phases (initiation, planning, execution, and closure) and because each phase has multiple steps that can be conducted in series, (one after the other), or in parallel (at the same time), using a ___________ to visualize the overall process can be extremely beneficial in the overall process.
initiation phase
During the ___ the project's scope and a projected timeline for deliverables are described.
tables
Most databases are composed of multiple , ___________ which are groups of assigned records and fields organized in rows and columns.
- What are the time constraints for the project? - What overall outcomes and results that are needed? - Who will receive the information and analysis?
Questions that data analysts often ask include which 3 of the following?
- Who will receive the information and analysis? - What overall outcomes and results that are needed? - What are the time constraints for the project?
Questions that data analysts often ask include which 3 of the following?
Getting the facts
Select the first step in the five steps of an ethical analysis.
listing options
The final step when making an ethical analysis is to make a decision and to prepare for the consequences. Preceding this is the fourth step, which has the manager ___ .
Data visualization
The graphical and structured representation of data is known as ___.
composable
The process of taking components from data sources and analytics platforms to create a more user-friendly experience that makes finding critical insights easier is called ______ data and analytics.
Composable
The process of taking components from data sources and analytics platforms to create a more user-friendly experience that makes finding critical insights easier is called _______ data and analytics.
ethics
A religious leader might instruct you on how to uphold high morals, but the reasons for acting morally are based on your ___.
privacy
A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.
ethics
Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals. Multiple choice question.
cryptocurrency
Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .
anonymously
Encouraging communication with minimal barriers can help to ensure that management has the pulse of the organization. Managers should ensure that a system exists in which employees can report malfeasance to their superiors ________.
determine the affected
After getting all the pertinent facts, the next step in making an ethical analysis is to ___ .
search for precedents
Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ .
monitoring
Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee ___________ software or remote desktop software.
major cloud storage service providers such as Amazon Web Services.
Many businesses have reduced the likelihood of experiencing an expensive data breach by moving data storage to __
The principle of distributive justice
Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ___.
patent
Match the intellectual property with the device that protects it.: A new type of flower that you invent.
copyright
Match the intellectual property with the device that protects it.: A portrait that you paint.
trademark
Match the intellectual property with the device that protects it.: The logo of your company.
Control and accountability
Select the dimension (category) of ethical behavior that is illustrated by the following concern. Fourteen-year-olds are interested in cannabis shops but a state has determined that in order to view the websites of these shops you must be at least 21. How should this be managed and who should be responsible in case of violations?
- By not enforcing strong ethical behavior. - By failing to act ethically themselves.
Select two ways managers encourage employees to act unethically.
quality
Studies indicate that the more time teens spend on social media the more likely they are to suffer from depression. This concern falls in the ethical dimension of _________ of life.
even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.
The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___
The Digital Millennium Copyright Act (DMCA)
The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:
Justice
The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __.
rights
The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral
virtue
The principle of ethical conduct that states that you should think of someone you truly admire, perhaps a mentor, and ask yourself what decision they would make is the principle of _________.
precedents (examples)
The third step in the five-step process of conducting an ethical analysis is searching for
Principle of Virtue
This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.
utilitarian
This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the principle.
Utilitarian Principle
This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.
You pass a co-worker's computer screen and see him surfing through child pornography.
Under what circumstance should you report a computer ethics violation to your employer?
The Cybersecurity Information Sharing Act
Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?
The Principle of Virtue
Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.
The Principle of Distributive Justice
Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?
The Principle of Moral Rights
Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated?
There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.
Which statement encompasses the third step of the five-step process of an ethical analysis?
- Be brief and remember that your employer probably did not hire you monitor inappropriate computer use. - Only report incidences that you have personally witnessed.
Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.
- Computer scams launched from work computers. - Software piracy using an employer's computer network.
Which two of the following potential workplace computer ethics violations are also illegal activities.
it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.
With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___
- One advantage of cloud storage is that it greatly reduces the human factor in data protection. - Adherents argue that cloud service providers have security measures that far exceed the data security capabilities of small businesses. - Over half of all data breaches can be traced to human error.
Select three true statements regarding protecting big data.
universalist
The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the __________ principle.