1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A professional __________ states the principles and core values on organization wishes to develop.
Code of Ethics
3 multiple choice options
The Better Business Bureau recommends that an organization publish a privacy notice on its Web site that addresses all of the following elements EXCEPT ____________.
Selling
3 multiple choice options
Fair information practices is a term of __________.
A set of guidelines that govern the collection and use of personal data
3 multiple choice options
How do fair information practices in the US and the EU differ?
Unlike the EU, the US has no single, overarching national data privacy policy.
3 multiple choice options
It is not against the law for Ethel to possess an automatic weapon, but she believes possessing one is the wrong thing to do. For Ethel, possessing an automatic weapon is ________.
Legal but unethical
3 multiple choice options
Which of the following is a good problem statement with which to begin the ethical decision-making process?
Employee morale has declined by 15% based on survey data, and the reported cause is favoritism in granting time off requests and assigning work tasks.
3 multiple choice options
Because Marigold wants to join CompTIA (the Computer Technology Industry Association), she agrees to adhere to this organization's professional code of ethics. This means that she _____.
Has promised to behave in a way that CompTIA defined as desirable.
3 multiple choice options
A code of professional ethics can be used to assess one's own performance or, more formally, to decide when an organization should either reward or reprimand its members for their actions. This is because a code of ethics _____.
Provides an evaluation Benchmark.
3 multiple choice options
Which of the following actions will likely endanger rather than protect someone's personal privacy?
Filling out a change-of-address form with the US Postal Service.
3 multiple choice options
Some people believe that government electronic surveillance activities represent unreasonable searches and seizures, meaning that they violate the _____.
Fourth Amendment
3 multiple choice options
Anonymous expression __________.
Is an important right of a democratic society because it protects people from reprisals for their opinions.
3 multiple choice options
Which intermediary in the process of speaking on the Internet often receives defamation or copyright infringement claims from government authorities or copyright holders who demand that material be taken down?
Web host server
3 multiple choice options
Which of the following will prevent a product from being rated as a high-quality software system?
Software defects
3 multiple choice options
Fiat Chrysler recalled over a million trucks due to a software defect related to at least one fatality. This software defect was found in a _____.
Safety-critical software system
3 multiple choice options
Cade's team is developing a safety-critical system so they ______.
Must invest a great deal of effort in risk aversion, mitigation, and detection.
3 multiple choice options
Walter is a developer and part of a team that develops safety-critical systems. He often finds it an ethical challenge to _____.
Weigh cost and ease of use issues while keeping the system safe and appealing.
3 multiple choice options
Which of the following statements is true of a database?
It helps companies analyze information to identify new market opportunities.
3 multiple choice options
Which component of the data hierarchy is ranked just below the database and represents a collection of similar entities?
File
3 multiple choice options
Each attribute in a relational database model can be constrained to a range of allowable values called a _____.
Domain
3 multiple choice options
Mark creates a new relational database table that includes only five of the seven columns in the existing products table. This action is known as ____.
Projecting
3 multiple choice options
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
Structured Query Language (SQL)
3 multiple choice options
After entering data into a relational database, users can make all of the following basic data manipulations except:
Organizing
3 multiple choice options
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?
Currency
3 multiple choice options
Billing errors, even small ones, can make customers quite upset. Therefore, maintaining high-quality data with regards to product pricing, discounts, and sales taxes benefits businesses most directly by _____.
Increasing customer satisfaction
3 multiple choice options
Allie has noticed that people at her company spend a lot of time researching the reasons for and correcting errors in the data they must use for their job functions. Usually when a mistake is discovered, it has already been propagated into multiple places, requiring a considerable clean-up effort. Allie realizes that improving the quality of the data at her firm would change this situation by _____.
Raising productivity
3 multiple choice options
Which process consists of one application program following a logical access path (LAP) and then a DBMS following a physical access path (PAP)?
Data retrieval
3 multiple choice options
Mollie's company is having problems with their data integrity because multiple database users sometimes access and alter a record at the same time. A database management system could eliminate these problems by implementing _____.
Concurrency control
3 multiple choice options
Haley needs to query her firm's database, Jeff needs to generate a report for his next project status meeting, and Karen needs to make some modifications to update the data in the database. Which of the following tools can they all use to complete their current task?
Data manipulation language
3 multiple choice options
Data normalization involves ________.
Dividing a relational database into two or more tables and defining relationships between them.
3 multiple choice options
A key purpose of data normalization is to eliminate ______.
Data redundancy
3 multiple choice options
A DaaS arrangement _________.
Reduces hardware, software, and staffing related costs for the client.
3 multiple choice options
What integrated set of functions defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization?
Data management
3 multiple choice options
Data quality management, data architecture management, and data development are three of the many functions of _____.
Data management
3 multiple choice options
Ryleigh knows that it is crucial to ensure that key business decisions are made using high-quality data. She argues that this is one reason why her firm should invest in _____.
Improved data management
3 multiple choice options
Marina is a data scientist at a large financial corporation, and therefore she _____.
Aims to uncover insights that will influence organizational decisions.
3 multiple choice options
Which of the following is NOT a component required for effective BI and analytics?
Well-maintained NoSQUL databases
3 multiple choice options
Which of the following is NOT a recognized BI an analytics technique?
Online transaction processing
3 multiple choice options
What determines the size of words in a word clous?
Frequency of occurrence of the word in the source documents
3 multiple choice options
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
Data mart
3 multiple choice options
A hospital system that wants to utilize big data can use HIPAA regulations to help them _____.
Identify which data needs to be protected from unauthorized access.
3 multiple choice options
One challenge presented by the volume of big data is that _______.
Business users can have a hard time finding the information they need to make decisions.
3 multiple choice options
Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____.
Bank Secrecy Act
3 multiple choice options
Melanie's company takes a "store everything" approach to big data, saving all of it in a raw, unaltered form. Only when she needs to analyze some of the data is it extracted from this _____.
Data lake
3 multiple choice options
Which step of the ETL process has the goal of collecting source data from all the desired sources and converting it into a single format suitable for processing?
Extract
3 multiple choice options
During which step of the ETL process can data that fails to meet expected patterns or values be rejected to help clean up "dirty data"?
Extract
3 multiple choice options
Which of the following events is an example of a transformation that might occur during the second stage of the ETL process?
A sales district is substituted for a customer's street address.
3 multiple choice options
Sometimes Theodore's queries for data from his employer's NoSQL database do not return the most current data. Why is this?
NoSQL databases provide for "eventual consistency" when processing transactions.
3 multiple choice options
Graph NoSQL databases________.
Are well-suited for analyzing interconnections
3 multiple choice options
What open-source software framework includes several software modules that provide a means for storing and processing extremely large data sets, organized into two primary components?
Hadoop
3 multiple choice options
Hadoops two major components are _________.
A data processing component and a distributed file system.
3 multiple choice options
Jerome recommends that his company's IS team consider moving from a database on secondary storage to an in-memory database because the in-memory database would provide _____.
Faster access to data.
3 multiple choice options
KDDI Corporation chose to consolidate their servers into a single Oracle SuperCluster running the Oracle Times Ten in-memory database in order to _____.
Increase data access rates and efficiency.
3 multiple choice options
Data scientists are a necessary component to ensure an organization's business intelligence and analytics efforts are effective because they _____.
Pull together knowledge of the business and data analytics tools and techniques.
3 multiple choice options
Suppose a business wishes to have access to servers and storage devices, but does not want to buy them. The business prefers to have their own employees install and maintain the computing platform and application software. What is their best choice?
Could Computing: Infrastructure as a Service
3 multiple choice options
One benefit of the cloud computing option known as software as a service is ________.
Lower costs compared with licensing needed applications.
3 multiple choice options
James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
Unexpected clous service costs.
3 multiple choice options
Sensors inside IoT wearable devices typically collect information such as _____.
Location and heart rate.
3 multiple choice options
Which type of IoT application enables automatic monitoring combined with remote control, trend analysis, and reporting by using individual devices that each gather a small amount of data?
Control and react.
3 multiple choice options
Compology's dumpster-monitoring software uses data from garbage container sensors plus external data to determine when dumpsters need service and alert sanitation workers so they can take preemptive action. Which type of IoT application is this?
Predict and adapt.
3 multiple choice options
Security is a serious issue with IoT applications because _____.
They can expose internal systems to hacking, viruses, and malware.
3 multiple choice options