Mgmt 220 Exam 2
In a database storing data about customers, which of the following would be the best choice to be used as a primary key? a. Customer ID Number b. Last name c. Full name
a. Customer ID Number
Which of the following statements is true about hard data? a. It includes facts and numbers b. It involves the use of text mining technologies c. It includes non-analytical information d. It includes textual news stories.
a. It includes facts and numbers
As explained in the text, in database design redundant data should be avoided for which of the following reasons? Select all that apply. a. Redundant data wastes file storage space. b. Redundant data is not well organized (a change to a phone number could make it necessary to change many instance of that phone number.) c. Redundant data makes it difficult to print the data
a. Redundant data wastes file storage space. b. Redundant data is not well organized (a change to a phone number could make it necessary to change many instance of that phone number.)
In designing web sites to meet consumers' needs, successful companies will address which of the following sets of characteristics? Select all that apply. a. Representational Delight b. Functional convenience c. Impression-based model d. Search engine optimization e. Structural firmness
a. Representational Delight b. Functional convenience e. Structural firmness
The most common language used to work database and perform queries is called: a. SQL b. XML c. TCP/IP d. HTML
a. SQL
A business model based on the _____ caters to niche markets. a. long tail b. social commerce c. group buying d. paid inclusion
a. long tail
Knowledge management system often store _____ knowledge assets that reflect processes or procedures that are known, yet difficult to explain to others. a. tacit b. common c. explicit
a. tacit
Which of the following characteristics are associated with Big Data? Select all that apply. a. variety b. velocity c. volume d. verifiability
a. variety b. velocity c. volume
A website that is maintained by the city of Charlotte and allows residents to view the property tax rates is an example of: a.G2C b. C2C c. G2G d. C2B
a.G2C
Changes in technology that enabled dynamic web applications, allowing people to collaborate and share content online is referred to as Web 1.0. a. True b. False
b. False
SEO is managed well by using appropriate and relevant keywords on your website. Other concerns such as backlinks are not relevant. a. True b. False
b. False
The definition of e-commerce includes internet transactions only. a. True b. False
b. False
The term "structural firmness" refers to whether a website is easy to use with menus that are well-designed. a. True b. False
b. False
Select the common errors that compromise data integrity. Select all that apply. a. viruses b. errors in formulas c. failure to backup files d. power failures e. truncated data f. sorting incorrectly h. files overwritten
b. errors in formulas e. truncated data f. sorting incorrectly h. files overwritten
Adding information about the location a file was created is called ____. An example would be adding the longitude and latitude to a photograph. a. tagging b. geotagging c. posting d. labeling
b. geotagging
Which of the following are visual indicators that a website is being accessed over a secure connection. Select all that apply. a. The website asks for personal information b. the URL begins with "https". c. An image of a locked or green padlock is displayed in the address bar. d. The website text states that it is secure.
b. the URL begins with "https". c. An image of a locked or green padlock is displayed in the address bar.
A _____ is a special purpose information system designed to support organizational decision making. a. Transaction processing system b. Intelligent system c. Decision support system d. Expert system
c. Decision support system
Select the true statement below: a. A file with the extension .csv can be read only by spreadsheets, mathematical and statistical analysis software applications. b. The file extension .cvs stands for Common Standard Values. c. In using a .csv file in Excel, saving it as a .csv file again converts all formulas and functions to the displayed values in the saved file.
c. In using a .csv file in Excel, saving it as a .csv file again converts all formulas and functions to the displayed values in the saved file.
An _____ emulates human capabilities such as reasoning or sensing. a. Decision support system b. database system c. Intelligent agent system d. Transaction processing system
c. Intelligent agent system
Methods for improving a web site's rank in search engine results is: a. SEO - search entity operations b. SEO - simple engine optimization c. SEO - search engine optimization d. SEO - search engine operations
c. SEO - search engine optimization
The phrase "amateurization of journalism" is often used in reference to which of the following Web 2.0 applications? a. podcasts b. wikis c. blogs d. wecasting
c. blogs
In data analysis, _______ is used when records (or data) are segmented based on grouping known beforehand. a. mining b. clustering c. classification d. drilling down
c. classification
______ is the principle that all traffic on the internet should be treated equally with no interference from the internet service provider or any other 3rd party. a. Internal Tax Freedom Act b. m-commerce c. net neutrality d. disintermediation
c. net neutrality
In a database storing records about employees and the department to which they are assigned, which type of association would be most appropriate? a. one-to-one b. many-to-many c. one-to-many
c. one-to-many
According to the laws passed in accordance with the Internet Tax Freedom Act, companies are required to collect sales tax on internet sales. a. if they have sales over $100,000 per year b. if the company was created after 2004 c. only from customers who reside in a state in which the company has a presence d. according to the laws of the state in which the customers lives.
c. only from customers who reside in a state in which the company has a presence
The term which refers to perform a search or retrieval of information from a database is _____. a. ad hoc b. normalization c. query d. lookup
c. query
People meeting at the same time, whether in person or virtually is _____ communication a. asynchronous b. collaborative c. synchronous d. virtual teams
c. synchronous
A primary key is a. used as a secondary method of identifying an attribute b. can be duplicated within the entity c. a combination of two or more attributes d. a unique identifier for a record
d. a unique identifier for a record
In order to minimize fraud, e-trailers look for anomalies in a. email addresses b. shipping and billing addresses c. transaction patterns d. all possible answers provided
d. all possible answers provided
A wiki a. allows users to add content b. allows users to revert edits c. allows anyone to read content d. allows all of the above
d. allows all of the above
Methods used to discover previously unknown, or hidden, predicative relationships in data is _____ a. classification b. data modeling c. clustering d. data mining
d. data mining
The term _____ refers to technologies in innovative way to support the financial sector. a. electronic bill pay b. online brokerage c. e-finance d. fintech
d. fintech
Which of the following statements is true about tagging? a. It is the process of categorizing digital photos b. It is the process of distributing digital media for playback. c. It is the process of creating avatars and syndication feeds d. It is the process of adding metadata to digital information such as files or photos.
not a.
unplanned; created to support non-routine decisions
Ad Hoc
A concept which uses people with a divergent range of skills and expertise to outperform that capabilities of an individual expert. Example might be an online journal about brain surgery.
Collective Intelligence
The use of the contributions of others as free labor to complete a task. Example: Wikipedia
Crowdsourcing
In a relational database design, each column is an ____. a. entity b. attribute c. query d. record
Not d
Reviewing reports of restaurant sales from each of night of the prior week.
Descriptive Analytics
give greater detail to help analyze information on a prior report
Drill-down
provide a summary of critical information on a recurring schedule
Key-indicator
Data about data, which may describe a digital file in terms of when it was created and by whom, etc.
Metadata
Estimating the expected sales of the coming week based upon last weeks' sales.
Predictive Analytics
Scheduling the correct number of employees for the coming week based upon last weeks sales reports.
Prescriptive Analystics
produced at predefined intervals or days/times
Scheduled
Using the data below, which answer accurately reflects the results of this query? SELECT Lname, Firstname FROM Employees WHERE Location= "DisneyLand"
White, Snow Bunny, Bugs
Which of the following are tips for businesses to be prepared in case of a crisis with social media? Select all that apply. a. Act fast. b. Before reacting, monitor the situation for a while to see if the problem resolves itself. c. Identify a crisis team d. Monitor your social media environment e. Identify your social media nightmare.
a. Act fast. c. Identify a crisis team d. Monitor your social media environment e. Identify your social media nightmare.
Which of the following statement concerning the management of master data are true? Select all that apply. a. The format and rules of use of master data must be agreed upon by all units in the organization who collect, store or use the data. b. Master data are considered the most important in the operation of a business. c. Access to modify or edit master data is to normally allowed to all employees. d. The information presented by master data is typically shared among units in an organization as "one version of the truth".
a. The format and rules of use of master data must be agreed upon by all units in the organization who collect, store or use the data. b. Master data are considered the most important in the operation of a business. d. The information presented by master data is typically shared among units in an organization as "one version of the truth"
A database is simply a collection of related data organized in a way that makes searches possible. Therefore, a small database could be stored as an Excel spreadsheet. a. True b. False
a. True
Data integrity can be protected by human means and by use of technological means a. True b. False
a. True
Finding the right technology to manage knowledge assets is often easier than determining what knowledge needs to be captured and who has this knowledge. a. True b. False
a. True
Success using applications in the consumer environment usually indicates the application will be successful in the corporate environment. a. True b. False
a. True
To truncate data means to remove characters from the end of a data element, often to save space. For example, to truncate the word "computer" at 4 characters produces "comp". a. True b. False
a. True
Companies following a _____ business strategy choose to operate solely in the traditional physical markets a. brick and click b. click only c. brick and mortar d. none of the above
a. brick and click
_____ refers to tools and techniques for analyzing past data. a. business analytics b. advanced analytics c. business intelligence
a. business analytics
The phenomenon of cutting out the middleman in transactions is referred to as a. disintermediation d. net neutrality c. show rooming d. group buying e. e-tailing
a. disintermediation
In order to minimize fraud, EC businesses look for anomalies in which of the following? Select all that apply. a. e-mail address provided b. click fraud c. transaction patterns d. shipping and billing addresses
a. e-mail address provided c. transaction patterns d. shipping and billing addresses
Technological methods used to protect data integrity and enforce business rules are called: a. integrity contraints b. integrity assurance c. validation d. error messages
a. integrity contraints