275

Ace your homework & exams now with Quizwiz!

American's rights to freedom of religion, freedom of expression, and freedom to assemble peaceably are protected by the _____. a.) HIPAA b.) First Amendment c.) COPPA d.) Fourth Amenndment

First Amendment

Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____. a.) Bank Secrecy ACT b.) Sarbanes-Oxley Act c.) PCI Data Security Standard d.) HIPAA

Bank Secrecy ACT

Which of the following is IBM's BI product? a.) Business Objects b.) Power BI c.) Cognos Business Intelligence d.) Hyperion

Congos Business Intelligence

Managers can help their organizations gain _____ through cost leadership, differentiation, or focus. a.) a set of procedures b.) technology infrastructure c.) information systems expertise d.) a competitive advantage

a competitive advantage

___. IBM's first 64-bit enterprise operating system, is capable of handling very heavy workloads. a.) Chrome b.) z/OS c.) Unix d.) Mac OS X

z/OS

Why is an effective ETL process essential to data warehousing? a.) "Dirty data" can result in incorrect or misleading statistics used for decision making. b.) Small-to-medium-sized businesses need a suitable data warehousing option. c.) Horizontal scaling of a relational database enables multiple servers to operate on the data. d.) The ETL process removes the necessity for a predefined database schema..

"Dirty data" can result in incorrect or misleading statistics used for decision making.

All of the following are examples of someone using personal productivity software EXCEPT ___. a.) Mark entering appointments into his online calendar b.) Brandon recording the number of miles he ran today in his exercise tracker c.) Shawna creating an electronic to-do list for the weekend d.) Callie entering a customer's order into a restaurant's ordering system

Callie entering a customer's order into a restaurant's oreding system

Suppose you need to advise someone about getting a certification. Which of the following will be appropriate advice? a.) Getting a certification is guaranteed to increase your income. b.) You need a college degree before you can take any certification exam. c.) Certifications are the same as courses offered at universities. d.) Certifications are often vendor-specific.

Certifications are often vendor-specific.

Which of the following legislation is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old? a.) American Recovery and Reinvestment Act b.) Children's Internet Protection Act c.) Family Educational Rights and Privacy Act d.) Children's Online Privacy Protection Act

Children's Online Privacy Protection Act

_____ is used to explore large amounts of data for hidden patterns to predict future trends. a.) Regression analysis b.) genetic algorithm c.) Data mining d.) Data governance

Data mining

Which of the following is a good problem statement with which to begin the ethical decision-making process? a.) Employee morale has declined by 15% based on survey data, and the reported cause is favoritism in granting time off requests and assigning work tasks. b.) Better systems for approving time off requests and assigning work tasks should be implemented to improve employee morale. c.) Employee morale seems worse lately. d.) Our employees require training to correct their misconceptions regarding the time off request and work scheduling procedures.

Employee morale has declined by 15% based on survey data, and the reported cause is favoritism in granting time off requests and assigning work tasks.

Suppose your employer has four manufacturing units, each with its own data operations. They are considering using BI and analytics tools. Which of the following is a valid recommendation regarding the BI and analytics initiative? a.) Purchase automated BI and analytics tools: including data scientists on the team is optional b.) Use BI and analytics tools to increase sales, but don't rely on them to optimize manufacturing operations. c.) Implement BI and analytics tools in each factory seperately d.) Ensure that an effective company-wide data management program, including data governance, is in place.

Ensure that an effective company-wide data management program, including data governance is in place

Which statement about Hadoop is correct? a.) Hadoop runs on top of an existing Apache Storm cluster and accesses its data store. b.) Hadoop's major limitation is that it cannot perform batch processing. c.) Each server in a Hadoop cluster houses the entiree data set plus a processing system. d.) Hadoop's HDFS divides data into subsets and distributes them onto different servers.

Hadoop's HDFS divides data into subsets onto different servers for processing

Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________. a.) none of these answers b.) Health and Medical Records Privacy Act c.) Gramm-Leach-Bliley Act d.) Health Insurance Portability and Accountability Act

Health Insurance Portability and Accountability Act

Leonard, a data scientist working in an information systems organization, is considering pursuing a certification in either Hadoop or Python. How would this benefit Leonard? a.) It may enhance his nontechnical more than his technical skills. b.) It may expand his career possibilities. c.) It would allow him to collaborate more frequently. d.) It would increase his expertise in network administration.

It may expand his career possibilities.

Which statement is true regarding the End User License Agreement for a software application? a.) It declares that the manufacture is liable for loss of data resulting from running the software. b.) It is displayed in a dialog box after the software has been in use for seven days. c.) It may explicitly accomodate multiple users of the software. d.) It is informal rather than legal agreement.

It may explicitly accomodate multiple users of the software

Which general-purpose programming language is used to develop applications for Google's Android smartphone? a.) Python b.) Perl c.) C d.) Java

Java

_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. a.) Libel b.) Phishing c.) Vishing d.) Slander

Libel

A newly discovered entity or attribute can be added to a NoSQL database dynamically because ___. a.) NoSQL databases don't require a predefined schema b.) NoSQL databases don't conoform to ACID properties. c.) the database provides horizontal scaling capability d.) data storage is modeled using simple two-dimensional relations

NoSQL databases don't require a predefined schema

One difference between NoSQL and relational databases is that _____. a.) NoSQL databases have a greater horizontal scaling capability b.) NoSQL databases require large, powerful, and expensive proprietary servers c.) relational databases consistently provide faster response times for queries d.) relational databases can easily spread data over multiple servers

NoSQL databases have a greater horizontal scaling capability

___ application software includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. a.) Destop publishing b.) Spreadsheet c.) Graphics d.) Word Processing

Spreadsheet

Hadoop's two major components are _____. a.) a cluster and a group of servers b.) a real-time data processor and a framework for data analytics c.) a JobTracker and a group of TaskTrackers d.) a data processing component and a distributed file system

a data processing component and a distributed file system

Jude, a senior executive, and the managers who report to him must make many decisions for their business units. To assist them with this, they rely on strategic planning to provide _____. a.) a reactive approach to market changes b.) the human and material resources they need c.) new and loyal customers d.) a framework and a clearly defined direction

a framework and a clearly defined direction

Which is a true statement regarding self-service BI and analytics? a.) A well-managed program increases IS staff involvment in routine tasks b.) providing a data dictionary is one approach to ensuring data security measures are implemented. c.) A well-managed program allows technology professionals to retain ultimate data governance d.) A successful program typically utilizes complex tools with sophisticated interfaces. a well-managed program allows technoolgy professionals to retain

a well-managed program allows technoolgy professionals to retain ultimate data governance.

Marina is a data scientist at a large financial coporation, and therefor she ___. a.) relies only on her computer science and statistics skills to do her job well. b.) works on a seperate team from the business managers and financial analysts c.) aims to uncover insights that will influence organizational decisions d.) focuses exclusively on accurately collecting and reporting data

aims to uncover insights that wiill influence organizational decisions

In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________. a.) all of these b.) provide input into the process c.) aid in product transformation d.) produce output

all of these

During the early formation of the United States, many influential writings criticizing British rule were published without the real names of their authors. These publications represented a form of _____. a.) slander b.) anonymous expression c.) incitement to crime d.) First Amendment expression

anonymous expression

Common themes in setting organizational strategies include "_____." a.) train customer behaviors b.) increase both sales and costs c.) attract and retain customers d.) limit product availability

attract and retain customers

Walter is a developer and part of a team that develops safety-critical systems. He often finds it an ethical challenge to _____. a.) choose between hardware mechanisms or redundant software to back up critical functions b.) weigh cost and ease of use issues while keeping the system safe and appealing c.) make the final product more expensive to manufacture or harder to use d.) identify what can go wrong and the likelihood and consequences of such occurrences

b.) weigh cost and ease of use issues while keeping the system safe and appealing

Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of _________. a.) data science b.) business analytics c.) all of these answers d.) a management information system

business analytics

Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon? a.) choosing an alternative b.) developing a problem statement c.) identifying alternatives d.) gathering information

choosing an alternative

Which of the following is NOT one of the common purposes of utility programs?

creating spreadsheets

What can you obtain for free once a year from three key agencies in order to find out what is stored about you in existing databases? a.) privacy policy b.) Freedom of Information Act report c.) credit report d.) credit score

credit report

Which type of end user license requires that a single copy of the software reside on a file server? a.) individual/multiuser b.) general public c.) single-user d.) network/multiuser

d.) network/multiuser

Melanie's company takes a "store everything" approach to big data, saving all of it in a raw, unaltered form. Only when she needs to analyze some of the data is it extracted from this _____. a.) in-memory database b.) data lake c.) data warehouse d.) data mart

data lake

A ____ is a subset of a data warehouse that is used by small-and medium-sized businesses and departments within large companies to support decision making. a.) data model b.) data mart c.) data dictionary d.) data mine

data mart

Barry's job responsibilities include helping maintain a large database that holds business information from over a dozen source systems, covering all aspects of his company's processes, products, and customers. This database contains not only enterprise data but also data from other organizations. Barry works with a(n) _____. a.) data lake b.) data mart c.) data warehouse d.) in-memory database

data warehouse

Which of the following is a defining feature of a safety-critical software system? a.) minimum system downtime b.) meets users' needs completely c.) performs quickly and efficiently d.) defects could result in human injury

defects could result in human injury

While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson? a.) implementing the decision b.) choosing an alternative c.) developing a problem statement d.) identifying alternatives

developing a problem statement

Which type of information system do organizations use to define structured interactions among employees or between the organizational and external customers, suppliers, or business partners? a.) interorganizational information system b.) personal information system c.) enterprise information system d.) workgroup information system

enterprise information system

What criteria are used by the Uptime Institute to classify data centers into four tiers? a.) expected annual downtime, fault tolerance, and power outage protection b.) quality of fire protection systems, physical security systems, and HVAC systems c.) local climate, risk of natural disasters, and power usage effectiveness d.) number of customers, reliability of power source, and quality of equipment

expected annual downtime, fault tolerance, and power outage prediction

Which of the following actions will likely endanger rather than protect someone's personal privacy? a.) filling out a change-of-address form with the U.S. Postal Service b.) visiting the Direct Marketing Association Web site c.) obtaining an unlisted phone number d.) shredding credit card statements before disposing of them

filling out a change-of-address form with the U.S. Postal Service

Anne and Jordan have two preteen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______. a.) security passwords b.) privacy screening c.) Internet licensing d.) filtering software

filtering software

What determines the size of words in a word cloud? a.) frequency of occurance of the word in source documents. b.) length of the word or phrase c.) difficulty in pronouncing the word or phrase d.) whether the word is a noun or verb

frequency of occurance of the word in source documents

Santiago's IS organization developed a mobile app that allows salespeople to include images of how a customer's bathroom would look with new tiles installed when they generate a quote for a customer. Santiago's IS organization is viewed as a _____. a.) game changer b.) cost center or service provider c.) business partner or peer d.) value chain

game changer

JoAnn is a developer hired to help code the software that will control a nuclear power plant reactor. Compared with her previous project, which involved software for sophisticated video games for PCs and home game consoles, JoAnn's current project will most likely _____. a.) have a much smaller budget and a much longer development schedule b.) have a much smaller budget and a much shorter development schedule c.) have a much larger budget and a much shorter development schedule d.) have a much larger budget and a much longer development schedule

have a much larger budget and a much longer development schedule

When Peter purchases software, ___. a.) he owns it outright b.) he can choose to not accept the EULA but still use it c.) he is acquiring a license to use it on his computer d.) he gains t he legal right to share it with others

he is acquireing a license to use it on his computer.

Mollie has observed that her company's leadership lacks a strong commitment to data-driven decision making. As a result, when she learns that her company will be initiating a business intelligence and analytics program, she anticipates that ___. a.) her colleagues who are data scientists will soon lose their job b.) her company's data will become less accessible and reliable c.) her company will miss out on the real value of their BI and analytics d.) her company will gain a strong competitive advantage as a result

her company will miss out on the real value of their BI and analytics

Francis will need to adjust his information system strategic plan when _____. a.) the contract with a major vendor comes up for renewal b.) his department requires a larger budget c.) he completes a high-profile project d.) his firm's corporate strategy changes

his firm's corporate strategy changes

A hospital system that wants to utilize big data can use HIPAA regulations to help them _____. a.) process unstructured data into a usable form b.) identify which data needs to be protected from unauthorized access c.) choose a subset of data to store d.) find nuggets of data that are relevant to the decision making at hand

identify which data needs to be protected from unauthorized access

Robin Hood famously steals from the rich to give to the poor. Robin considers this his moral responsibility because he believes it is unjust for a few wealthy people to live in luxury while many others struggle to meet their basic needs. Given that it is against the law to steal, for Robin, his activities are _____. a.) illegal but ethical b.) legal and ethical c.) legal but unethical d.) illegal and unethical

illegal but ethical

The use of in-memory databases for processing big data has become feasible in recent years, thanks to _____. a.) the advent of 2-bit processors b.) the decrease in single-core CPU costs c.) the increase in RAM capacities d.) increase in RAM costs

increase in RAM capacities

Collaboration between two or more organizations that lowers costs and reduces manual effort among employees is enabled by a(n) _____. a.) enterprise information system b.) personal information system c.) workgroup information system d.) interorganizational information system

interorganizational information system

Anonymous expression _____. a.) is specifically mentioned as a right of all Americans within the Bill of Rights b.) on the Internet is equally important to and advocated by all computer users c.) through email messages is impossible, even when a remailer is used d.) is an important right of a democratic society because it protects people from reprisals for their opinions

is an important right of a democratic society because it protects people from reprisals for their opinions

A high-quality software system _____. a.) reduces sales over the long term b.) is easy to learn and use c.) negatively affects productivity d.) is the same as a safety-critical system

is easy to learn and use

A SaaS provider such as Oracle or SAP manages service levels and availability. This is advantageous because ___. a.) it allows SaaS customers to control if and when upgrades and new releases are installed b.) it increases the security of financial transactions handled through SaaS applications c.) it typically makes SaaS customers with many users eligible for volume discounts d.) it allows SaaS customers to increase the number of users without expanding their communications capacity

it allows SaaS customers to increase number of users without expanding their communications capacity

One of the disadvantages of proprietary software is that ___. a.) it doesn't allow the modifications to feataures needed to counteract a competitor's initiative. b.) it is hard to control the output even if one is involved in the development of the software. c.) it is difficult to achieve what is required in terms of features and reports d.) it can take a long time and significant resources to develop the required software features

it can take a long time and significant resources to develop the required software features

The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________. a.) bus b.) processor c.) input/output device d.) main memory

main memory

Developing safety-critical systems is more expensive than developing high-quality systems because _____. a.) less extreme measures are taken to remove software defects from high-quality systems b.) more thorough documentation is required for high-quality systems c.) the tasks involved in developing high-quality systems require additional steps d.) high-quality systems usually involve more non-software components

more thorough documentation is required for high-quality systems

Marleys computer has a math chip to perform mathematical calculations and a graphics chip to manipulate graphics wihle the CPU is busy with other activities. What processing approach is she using? a.) massively parallel processing system b.) grid computing with a central server c.) multiprocessing using coprocessors d.) parallel processing using coprocessors

multiprocessing using coprocessors

An operating system with _____ capabilities allows a user to run more than one program concurrently. a.) multitasking b.) hardware independence c.) networking d.) memory management

multitasking

Cade's team is developing a safety-critical system so they _____. a.) are largely inexperienced and require additional training for success b.) must invest a great deal of effort in risk aversion, mitigation, and detection c.) should spend more time improving ease of use than identifying problems d.) can expect the project to move forward quickly and within a tight budget

must invest a great deal of effort in risk aversion, mitigation, and detection

Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________. a.) smartphone b.) desktop c.) nettop d.) e-book

nettop

Compared with the traditional licensing model in which users purchase and install software, SaaS ___. a.) provides more reliable accessin areas with no Internet Service b.) requires more maintenance on the part of customers c.) can be accessed from fewer devices per license d.) offers less expensive upgrades and new releases

offers less expensive upgrades and newer releases

Which of the following is NOT a recognized BI and analytics technique? a.) Monte Carlo simulation b.) genetic algorithm c.) online transaction processing d.) linear programming

online transaction processing

When choosing from various types of flat-panel displays, choose a(n)___ for the lowest power consumption. a.) organic light-emitting diod (OLED) display b.) liquid crystal display (LCD) c.) plasma display d.) light-emitting diode (LED) display

organic light-emitting diode

A firm that models, simulates, and analyzes large amounts of data quickly by using computers to execute the same task on multiple processors simultaneously is employing _____. a.) multiprocessing b.) parallel processing c.) multithreading d.) grid computing

parallel processing

Bubba creates a web application that allows his coworkers to generate reports providing information on sales, costs, and inventory that they need for their job functions without assistance. Bubba has developed a(n) _____. a.) workgroup information system b.) interorganizational information system c.) enterprise information system d.) personal information system

personal information system

One of the goals of business intelligence is to _________. a.) educate the end users about business-related statistics b.) present the results of analysis in an easy-to-understand manner c.) ensure that transaction data is properly stored d.) use the most sophisticated techiques available

present the results of analysis in an easy-to-understand manner

A code of professional ethics can be used to assess one's own performance or, more formally, to decide when an organization should either reward or reprimand its members for their actions. This is because a code of ethics _____. a.) improves ethical decision making b.) engenders trust and respect from the general public c.) provides an evaluation benchmark d.) sets high standards of practice and ethical behavior

provides an evaluation benchmark

Surveys indicate that a solid majority of employers use IT certifications to _____. a.) substitute for on-the-job experience b.) qualify or disqualify applicants for certain jobs c.) make decisions about raises in pay d.) train new information system workers

qualify or disqualify applicants for certain jobs

June and her team are planning the implementation of a new company-wide order processing information system. One of June's major concerns is the need to _____. a.) comply with EDI standards b.) complete stand-alone tasks c.) collaborate with others d.) redesign key work processes

redesign key work processes

Because electronic devices are composed of materials such as beryllium, cadium, lead, mercury, BFRs, selenium, and polyvinyl chloride, one of three goals of green computing is to ___. a.) improve corporate employee safety and public relations b.) allow companies to lower their power-related costs c.) prevent the disposal of computers and computer-related equipment. d.) reduce the use of hazardous material

reduce the use of hazardous material

Which of the goals of green computing, if implemented successfully, would be the BEST practice for reducing the hazards posed by e-waste in the United States? a.) dispose of or recycle computers and computer-related equipment b.) allow companies to lower their power-related costs c.) improve coporate employee safety and public relations d.) reduce the use of hazardous material

reduce the use of hazardous material

___ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after exectuion by the central processing unit (CPU). a.) The motherboard b.) register c.) Main memory d.) Control unit

register

Self-service BI and analytics can exacerbate problems by ___. a.) excluding most nontechnical end users b.) removing checks and balances on data preparation and use c.) undermining the value of trained data scientists d.) eliminating investment in data sources and analytics tools

removing checks and balances on data preperation and use

The Bill of Rights protects many forms of expression, but the Supreme Court has ruled that it does NOT protect _____. a.) dance movements b.) sedition c.) hand gestures d.) flag burning

sedition

The Better Business Bureau recommends that an organization publish a privacy notice on its Web site that addresses all of the following elements EXCEPT ________. a.) choice b.) redress c.) selling d.) access

selling

IS professionals at PKO Bank Polski S.A. use an approach where they logically divide the resources of a physical server to reduce hardware-related costs, cut unshcheduled downtime for applications, and reduce the time spent on problem solving. What strategy do they use? a.) API optimizations b.) service-oriented architechture c.) embedded systems d.) server virtualization

server virtualization

Which type of end user license allows the program to be installed and used and one CPU that is not accessed by the other users over a network? a.) individual/multiuser b.) general public c.) network/multiuser d.) single-user

single user

Which class of general-purpose computer systems is the least expensive option that meets a wide range of personal computing needs, from data entry to computer-aided design or engineering, and from accessing Internet applications to software development? a.) single-user nonportable computers b.) multiple-user computers c.) embedded computers d.) single-user portable computers

single-user nonportable computers

Amazon's decision to explore the possible use of delivery drones to gain a real competitive advantage over competitors who rely on less efficient ground transportation is an example of _____. a.) procurement b.) inbound logistics c.) human resources management d.) strategic planning

strategic planning

The process that helps managers identify initiatives and projects that will achieve organizational objectives is known as _____. a.) corporate strategy b.) the value chain c.) innovation d.) strategic planning

strategic planning

The Assembly and C programming languages are used to build software that controls a computer's hardware known as ___. a.) web applications b.) application software c.) system software d.) embedded system software

system software

Which of the following is NOT one of the four main components in Leavitt's Diamond? a.) people b.) technology infrastructure c.) systems d.) processes

systems

The process of building software for safety-critical systems _____. a.) is less expensive than that for high-quality systems b.) takes much less time than that for high-quality systems c.) is just as expensive as that for high-quality systems d.) takes much longer than that for high-quality systems

takes much longer than that for high-quality systems

Which of the following components forms the foundation of every computer-based information system and includes resources such as hardware, software, and data center facilities? a.) technology infrastructure b.) processes c.) structure d.) people

technology infrastructure

In countries with "three strikes" laws, what action may Internet service providers be required to take? a.) require users to enter certain keywords in search engine searches b.) convert human-readable host and domain names into machine-readable, Internet Protocol addresses c.) pursue defamation or copyright infringement claims against their customers d.) terminate the Internet connections of users who have repeatedly been caught posting illegal content

terminate the Internet connections of users who have repeatedly been caught posting illegal content

Which of the following is classified as a workgroup information system? a.) Walmart's vendor-managed inventory system, which allows suppliers to manage warehouse inventory b.) the Monterey Bay Aquarium's tool that helps staff communicate, organize, plan, schedule, and track jobs c.) Allan Bros, Inc.'s system that informs workers when to prune grape vines and predicts grape crop quality d.) Kroger's ClickList system, which allows customers to choose and purchase grocery items

the Monterey Bay Aquarium's tool that helps staff communicate, organize, plan, schedule, and track jobs

Big data veracity is a measure of _____. a.) the degree of organization or structure of the data b.) the accuracy, completness, and currency of the data. c.) the data's worth for decision making in a given scenario d.) the rate at which data in an area is becoming available.

the accuracy, completness, and currency of the data

When an IS organization is viewed as a business partner/business peer: a.)the strategic planning process is typically directed inward and focused on determining how to do what it is currently doing but doing it cheaper, faster, and better. b.) achieving alignment between the IS strategic plan and the rest of the business is less important than it would be if the IS organization was perceived in a different way. c.) the strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization. d.) their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like "What do we want to be?"

the strategic planning process is based on understanding the collective business plans for the next year and determining what those mean for the IS organization.

One key difference between a relational database and a NoSQL database is _____. a.) where data comes from b.) which vendors provide applicable software tools c.) the data backup and recovery procedure d.) the way data storage and retrieval are modeled

the way data storage and retrieval are modeled

When an IS organization is viewed as a game changer: a.) the sttrategic planning process is typically directed inward and focused on determining how to do what it is currently but doing it cheaper, faster, and better. b.) the strategic planning process is based on understanding the collective business plans for next year and determining what those mean for the IS organization. c.) achieving alignment between the IS strategic plan and the rest of the business is less important than it would be if the IS organization was percieved in a different way. d.) their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like "What do we want to be/"

their strategic planning process is outwardly focused and involves meeting with customers, suppliers, and leading IS consultants and vendors to answer questions like "What do we want to be?"

Procedures are an important component of an IS implementation approach because _____. a.) good onese are quick and easy to develop and implement b.) employee motivation, authority, and support depend on them c.) they can help avoid lengthy business disruptions following a natural disaster. d.) they can increase the time required to complete the tasks.

they can help avoid lengthy business disruptions following a natural disaster.

Government entities may pressure upstream Internet service providers to _____. a.) accept defamation or copyright infringement claims b.) deregister domains because of their hosted content c.) immediately take down particular hosted material d.) track and monitor the Internet activities of individuals

track and monitor the Internet activities of individuals

Guillarme, a data scientist, utilizes data from company documents, machine logs, Data.gov, and Facebook Graph in his work. What characteristic of big data does this best demonstrate? a.) variety b.) value c.) velocity d.) veracity

variety

One key characteristic of big data is that it is being generated at a rate of 2.5 quintillion bytes per day. This is known as big data's _____. a.) veracity b.) variety c.) velocity d.) volume

velocity


Related study sets

Abeka 8th grade History (America Land I Love) Test 10

View Set

Personal Financial stewardship ch. 1

View Set

EASA Part 66 : Electrical Question15

View Set

Mktg Lesson 2 Chapter 2 T/F, maybe questions

View Set

5 characteristics of successful goal setting

View Set

Chapter 5: Consumer Markets and Buyer Behavior

View Set

CK-12 Chemistry Atomic Structure

View Set