ISDS351 QUIZ 8 & 9 & 12
The _____ represent the international consensus regarding the collection and management of personal information.
1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines
Who is appointed by an organization to define, implement, and oversee a set of data privacy policies?
A Chief Privacy Officer (CPO)
Which of the following enables rapid consolidation of financial data across multiple organizational units and countries?
A well-implemented enterprise resource planning system
Which of the following key features of a customer relationship management (CRM) system has the ability to evaluate customer data to identify ways to increase revenue and decrease costs and identify the firm's "best customers?"
Analysis
Which of the following data mining techniques uses a specialized set of algorithms that sorts through data and forms statistical rules about relations among the items?
Association analysis
Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?
Automatic license plate reader
_____ tools frequently operate on data stores in a data warehouse or data mart
Business intelligence
How does an enterprise resource planning (ERP) system achieve its goal of enabling easy access to business data and creating efficient, streamlined work processes?
By building a single database that is accessed by multiple software modules
_______ is the use of software to assist in the creation, analysis, and modification of the design of a component or product
Computer-Aided Design
Which of the following can increase the productivity of a designer, improve the quality of design, and create a database that describes a product?
Computer-aided Design
Identify the technique through which an SQL database ensures that other transactions do not modify a database until the first transaction succeeds or fails
Concurrency control
______ is a key feature of a customer relationship management (CRM) system that provides the ability to track data on individual customers and sales leads and then access that data from any part of the organization
Contact Management
Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer.
Customer Relationship Management
_____, a key feature of a customer relationship management system, is the ability to aid customer service representatives so that they can quickly thoroughly, and appropriately address customer requests and resolve customer issues while collecting and storing data about those interactions
Customer Support
_____ present a set of key performance indicators about the state of a process at a specific point in time
Dashboards
________ involves the overall management of the availability, usability, integrity, and security of the data used in an organization
Data governance
______ is a business intelligence (BI) tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making
Data mining
Which of the following business intelligence tools will help an organization to make business predictions
Data mining tools
Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective _____ program.
Data privacy
A ____ is a database that stores larger amounts of historical data in a form that readily supports analysis and management decision making in an organization
Data warehouse
Which of the following is an advantage of the hosted software model?
Decreased total cost of ownership
Dove, a famous book publisher has to publish a new book in the international market. He needs determine the interest readers may have in his book, and he needs to determine the pricing and advertising strategies accordingly. Which process of supply chain management can help the publisher determine the number of books to print?
Demand Planning
Identify the term that is used to describe the gulf between those who do and those who don't have access to modern information and communications technology.
Digital Divide
Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid.
Doxing
______ is a powerful took that enables decision makers to gain insight into the details of business data to better understand why something happened
Drill-down analysis
A(n) _______ operates via an integrated database, using one set of data to support all business functions
Enterprise Resource System
The _____ prohibits the transfer of personal data to non-European Union nations that do not meet the European adequacy standard for privacy protection.
European Union Data Protection Directive
The Supreme Court has ruled that American citizens are protected by the _____ when there is a "reasonable expectation of privacy."
Fourth Amendment
A(n) ______ is a database management system that stores and entire database in random access memory (RAM)
In-memory database (IMDB)
Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy.
Increased legal liabilities
Identify the industry that implements data governance.
Insurance industry
_____ is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices.
Internet of Things
Which of the following is true of a cookie?
It captures browsing history for Web site customization and personalization purposes.
Which of the following is true about an enterprise system?
It employs a database of key operational and planning data that can be shared with authorized users across the organization
Which of the following best describes the relational database model?
It helps organize structured data into collections of two-dimensional tables
Identify a true statement about drill-down analysis
It involves the interactive examination of high-level summary data in increasing detail to gain insight into certain elements
Which of the following defines law?
It is a system of rules enforced by a set of institutions that states what a person can and cannot do.
Which of the following is true of the First Amendment to the U.S. Constitution?
It was adopted to guarantee Americans' rights to freedom of religion, freedom of expression, and freedom to assemble.
Metrics that consist of a direction, measure, target, and time frame are known as _____. Select one: a. key association indicators b. key performance indicators c. online analytical processors d. drill-down analysis indicators
Key performance indicators
______, a supply chain process, establishes a network of warehouses for storing products, chooses carriers to deliver products to customers, and schedules carrier pickups so that products are delivered to the customers or warehouse on a timely basis
Logistics
_____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.
Net Neutrality
A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email, Internet, and phone usage were not private and that their use might be monitored.
Private
_______ is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information.
Product Life Cycle Management
How are small and medium-sized enterprises (SMEs) benefited by the hosted software model?
SMEs can experiment with powerful software capabilities without making a major financial investment
Identify the framework developed by the U.S. Department of Commerce and the European Commission to ensure that U.S. companies don't experience interruptions in their dealings with countries in the European Union.
Safe Harbor
Which of the following is a process of supply chain management that chooses suppliers and establishes contract terms to provide the raw material needed to create a product?
Sourcing
_______ includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversion of a raw materials to finished products, and the warehousing and delivery of finished products to customers
Supply Chain Management
Which of the following policies should be agreed by a user before joining a social networking page?
Terms of Use policy
A large multinational firm that facilities in the US and Mexico City has an annual revenue of #3 billion. This firm will be targeted by _____ enterprise resource planning (ERP) vendors
Tier 1
Which of the following enterprise resource planning system solutions is the most expensive to implement and support?
Tier 1
______ enterprise resource planning system solutions are highly complex
Tier 1
Which of the following is the goal of supply chain management?
To reduce the overall investment in inventory, decrease costs, and improve customer service
Mapua Corp., a multinational corporation based in Germany, has decided to relocate its business to Japan. It faces difficulties in transferring the personal data of its employees from Germany to Japan. Which of the following is causing this difficulty?
d. The European Union Data Protection Directive
Database built to support online analytic processing (OLAP) consist of _________.
data cubes
The ACID (Atomicity, Consistency, Isolation, Durability) properties of SQL databases ensure _________.
data integrity
A(n) ______ is used to pull data from disparate data sources to populate and maintain a data warehouse
extract-transform-load (ETL) process
Social networking users are prone to _____.
identify theft
In-memory databases (IMDB) have become feasible because of the decrease in _______ capacities
random access memory (RAM)
Which of the following business intelligence tools performs operations on data based on formulas created by the end user?
spreadsheet
data that does not fit into relational databased is known as ______
unstructured data