MSIS 2103 Exam 2 - Practice Questions for Data Management and IoT Applications

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

A professional __________ states the principles and core values on organization wishes to develop.

Code of Ethics

3 multiple choice options

2
New cards

The Better Business Bureau recommends that an organization publish a privacy notice on its Web site that addresses all of the following elements EXCEPT ____________.

Selling

3 multiple choice options

3
New cards

Fair information practices is a term of __________.

A set of guidelines that govern the collection and use of personal data

3 multiple choice options

4
New cards

How do fair information practices in the US and the EU differ?

Unlike the EU, the US has no single, overarching national data privacy policy.

3 multiple choice options

5
New cards

It is not against the law for Ethel to possess an automatic weapon, but she believes possessing one is the wrong thing to do. For Ethel, possessing an automatic weapon is ________.

Legal but unethical

3 multiple choice options

6
New cards

Which of the following is a good problem statement with which to begin the ethical decision-making process?

Employee morale has declined by 15% based on survey data, and the reported cause is favoritism in granting time off requests and assigning work tasks.

3 multiple choice options

7
New cards

Because Marigold wants to join CompTIA (the Computer Technology Industry Association), she agrees to adhere to this organization's professional code of ethics. This means that she _____.

Has promised to behave in a way that CompTIA defined as desirable.

3 multiple choice options

8
New cards

A code of professional ethics can be used to assess one's own performance or, more formally, to decide when an organization should either reward or reprimand its members for their actions. This is because a code of ethics _____.

Provides an evaluation Benchmark.

3 multiple choice options

9
New cards

Which of the following actions will likely endanger rather than protect someone's personal privacy?

Filling out a change-of-address form with the US Postal Service.

3 multiple choice options

10
New cards

Some people believe that government electronic surveillance activities represent unreasonable searches and seizures, meaning that they violate the _____.

Fourth Amendment

3 multiple choice options

11
New cards

Anonymous expression __________.

Is an important right of a democratic society because it protects people from reprisals for their opinions.

3 multiple choice options

12
New cards

Which intermediary in the process of speaking on the Internet often receives defamation or copyright infringement claims from government authorities or copyright holders who demand that material be taken down?

Web host server

3 multiple choice options

13
New cards

Which of the following will prevent a product from being rated as a high-quality software system?

Software defects

3 multiple choice options

14
New cards

Fiat Chrysler recalled over a million trucks due to a software defect related to at least one fatality. This software defect was found in a _____.

Safety-critical software system

3 multiple choice options

15
New cards

Cade's team is developing a safety-critical system so they ______.

Must invest a great deal of effort in risk aversion, mitigation, and detection.

3 multiple choice options

16
New cards

Walter is a developer and part of a team that develops safety-critical systems. He often finds it an ethical challenge to _____.

Weigh cost and ease of use issues while keeping the system safe and appealing.

3 multiple choice options

17
New cards

Which of the following statements is true of a database?

It helps companies analyze information to identify new market opportunities.

3 multiple choice options

18
New cards

Which component of the data hierarchy is ranked just below the database and represents a collection of similar entities?

File

3 multiple choice options

19
New cards

Each attribute in a relational database model can be constrained to a range of allowable values called a _____.

Domain

3 multiple choice options

20
New cards

Mark creates a new relational database table that includes only five of the seven columns in the existing products table. This action is known as ____.

Projecting

3 multiple choice options

21
New cards

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.

Structured Query Language (SQL)

3 multiple choice options

22
New cards

After entering data into a relational database, users can make all of the following basic data manipulations except:

Organizing

3 multiple choice options

23
New cards

To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?

Currency

3 multiple choice options

24
New cards

Billing errors, even small ones, can make customers quite upset. Therefore, maintaining high-quality data with regards to product pricing, discounts, and sales taxes benefits businesses most directly by _____.

Increasing customer satisfaction

3 multiple choice options

25
New cards

Allie has noticed that people at her company spend a lot of time researching the reasons for and correcting errors in the data they must use for their job functions. Usually when a mistake is discovered, it has already been propagated into multiple places, requiring a considerable clean-up effort. Allie realizes that improving the quality of the data at her firm would change this situation by _____.

Raising productivity

3 multiple choice options

26
New cards

Which process consists of one application program following a logical access path (LAP) and then a DBMS following a physical access path (PAP)?

Data retrieval

3 multiple choice options

27
New cards

Mollie's company is having problems with their data integrity because multiple database users sometimes access and alter a record at the same time. A database management system could eliminate these problems by implementing _____.

Concurrency control

3 multiple choice options

28
New cards

Haley needs to query her firm's database, Jeff needs to generate a report for his next project status meeting, and Karen needs to make some modifications to update the data in the database. Which of the following tools can they all use to complete their current task?

Data manipulation language

3 multiple choice options

29
New cards

Data normalization involves ________.

Dividing a relational database into two or more tables and defining relationships between them.

3 multiple choice options

30
New cards

A key purpose of data normalization is to eliminate ______.

Data redundancy

3 multiple choice options

31
New cards

A DaaS arrangement _________.

Reduces hardware, software, and staffing related costs for the client.

3 multiple choice options

32
New cards

What integrated set of functions defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization?

Data management

3 multiple choice options

33
New cards

Data quality management, data architecture management, and data development are three of the many functions of _____.

Data management

3 multiple choice options

34
New cards

Ryleigh knows that it is crucial to ensure that key business decisions are made using high-quality data. She argues that this is one reason why her firm should invest in _____.

Improved data management

3 multiple choice options

35
New cards

Marina is a data scientist at a large financial corporation, and therefore she _____.

Aims to uncover insights that will influence organizational decisions.

3 multiple choice options

36
New cards

Which of the following is NOT a component required for effective BI and analytics?

Well-maintained NoSQUL databases

3 multiple choice options

37
New cards

Which of the following is NOT a recognized BI an analytics technique?

Online transaction processing

3 multiple choice options

38
New cards

What determines the size of words in a word clous?

Frequency of occurrence of the word in the source documents

3 multiple choice options

39
New cards

A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

Data mart

3 multiple choice options

40
New cards

A hospital system that wants to utilize big data can use HIPAA regulations to help them _____.

Identify which data needs to be protected from unauthorized access.

3 multiple choice options

41
New cards

One challenge presented by the volume of big data is that _______.

Business users can have a hard time finding the information they need to make decisions.

3 multiple choice options

42
New cards

Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____.

Bank Secrecy Act

3 multiple choice options

43
New cards

Melanie's company takes a "store everything" approach to big data, saving all of it in a raw, unaltered form. Only when she needs to analyze some of the data is it extracted from this _____.

Data lake

3 multiple choice options

44
New cards

Which step of the ETL process has the goal of collecting source data from all the desired sources and converting it into a single format suitable for processing?

Extract

3 multiple choice options

45
New cards

During which step of the ETL process can data that fails to meet expected patterns or values be rejected to help clean up "dirty data"?

Extract

3 multiple choice options

46
New cards

Which of the following events is an example of a transformation that might occur during the second stage of the ETL process?

A sales district is substituted for a customer's street address.

3 multiple choice options

47
New cards

Sometimes Theodore's queries for data from his employer's NoSQL database do not return the most current data. Why is this?

NoSQL databases provide for "eventual consistency" when processing transactions.

3 multiple choice options

48
New cards

Graph NoSQL databases________.

Are well-suited for analyzing interconnections

3 multiple choice options

49
New cards

What open-source software framework includes several software modules that provide a means for storing and processing extremely large data sets, organized into two primary components?

Hadoop

3 multiple choice options

50
New cards

Hadoops two major components are _________.

A data processing component and a distributed file system.

3 multiple choice options

51
New cards

Jerome recommends that his company's IS team consider moving from a database on secondary storage to an in-memory database because the in-memory database would provide _____.

Faster access to data.

3 multiple choice options

52
New cards

KDDI Corporation chose to consolidate their servers into a single Oracle SuperCluster running the Oracle Times Ten in-memory database in order to _____.

Increase data access rates and efficiency.

3 multiple choice options

53
New cards

Data scientists are a necessary component to ensure an organization's business intelligence and analytics efforts are effective because they _____.

Pull together knowledge of the business and data analytics tools and techniques.

3 multiple choice options

54
New cards

Suppose a business wishes to have access to servers and storage devices, but does not want to buy them. The business prefers to have their own employees install and maintain the computing platform and application software. What is their best choice?

Could Computing: Infrastructure as a Service

3 multiple choice options

55
New cards

One benefit of the cloud computing option known as software as a service is ________.

Lower costs compared with licensing needed applications.

3 multiple choice options

56
New cards

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?

Unexpected clous service costs.

3 multiple choice options

57
New cards

Sensors inside IoT wearable devices typically collect information such as _____.

Location and heart rate.

3 multiple choice options

58
New cards

Which type of IoT application enables automatic monitoring combined with remote control, trend analysis, and reporting by using individual devices that each gather a small amount of data?

Control and react.

3 multiple choice options

59
New cards

Compology's dumpster-monitoring software uses data from garbage container sensors plus external data to determine when dumpsters need service and alert sanitation workers so they can take preemptive action. Which type of IoT application is this?

Predict and adapt.

3 multiple choice options

60
New cards

Security is a serious issue with IoT applications because _____.

They can expose internal systems to hacking, viruses, and malware.

3 multiple choice options