Information Management 2

Information Management 2

[ad_1]

1. The introduction of new information technology has a:
a. ripple effect raising new ethical social and political issues.
b. beneficial effect for society as a whole while raising dilemmas for consumers.
c. waterfall effect in raising ever more complex ethical issues.
d. dampening effect on the discourse of business ethics.
2. In the information age the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
a. accountability and control.
b. system quality.
c. information rights and obligations.
d. property rights and obligations.
3. Accepting the potential costs duties and obligations for the decisions you make is referred to as:
a. responsibility.
b. accountability.
c. liability.
d. due process.
4. Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
a. System quality
b. Accountability and control
c. Information rights and obligations
d. Property rights and obligations
5. A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation you might argue that stealing the food is:
a. acceptable because the grocer suffers the least harm.
b. wrong because the man would not want the grocer to steal from him.
c. wrong because if everyone were to do this the concept of personal property is defeated.
d. acceptable because the higher value is the survival of the family.
6. Immanuel Kants Categorical Imperative states that:
a. if an action cannot be taken repeatedly then it is not right to be taken at any time.
b. one should take the action that produces the least harm or incurs the least cost.
c. one can put values in rank order and understand the consequences of various courses of action.
d. if an action is not right for everyone to take it is not right for anyone to take.
7. Types of information gathered by Web site tracking tools include all of the following except:
a. purchases.
b. birthplace.
c. income.
d. health concerns.
8. The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
a. the courts become involved.
b. a new version of the software is released.
c. hackers are able to break into the source code.
d. the software is widely distributed.
9. Software used to apply the computer to a specific task for an end user is called:
a. system software.
b. application software.
c. data management software.
d. network software.
10. The business case for using grid computing involves all of the following except:
a. cost savings.
b. centralized maintenance.
c. agility.
d. speed of computation.
11. A high-speed network dedicated to storage that connects different kinds of storage devices such as tape libraries and disk arrays so they can be shared by multiple servers best describes:
a. ASP.
b. LAN.
c. SSN.
d. SAN.
12. Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referred to as:
a. autonomic computing.
b. grid computing.
c. utility computing.
d. client/server computing.
13. Which of the following is a type of optical disk storage?
a. CD-ROM
b. Hard drive
c. USB Flash drive
d. Magnetic tape
14. Software applications that combine different components of online software applications are referred to as:
a. grid computing.
b. integrated software.
c. widgets.
d. mashups.
15. To analyze the direct and indirect costs and determine the actual cost of specific technology implementations you would use a:
a. total cost of ownership model.
b. cost benefit analysis.
c. return on investment model.
d. break-even point.
16. Which of the following is an open-source operating system designed for mobile devices?
a. iOS
b. Chrome
c. Android
d. OS X
17. In a table for customers the information about a single customer would reside in a single:
a. field.
b. row.
c. column.
d. table.
18. What is the first step you should take in managing data for a firm?
a. Normalize the data before importing to a database
b. Audit your data quality
c. Identify the data needed to run the business
d. Cleanse the data before importing it to any database
19. Which of the following best illustrates the relationship between entities and attributes?
a. The entity CUSTOMER with the attribute ADDRESS
b. The entity PRODUCT with the attribute CUSTOMER
c. The entity PRODUCT with the attribute PURCHASE
d. The entity CUSTOMER with the attribute PRODUCT
20. A field identified in a table as holding the unique identifier of the tables records is called the:
a. key field.
b. primary key.
c. primary field.
d. foreign key.
21. A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:
a. in two short marks.
b. with a crows foot.
c. in one short mark.
d. with a crows foot topped by a short mark.
22. Which of the following best describes the importance of creating an accurate data model for your businesss database?
a. Critical as without one your data may be inaccurate incomplete or difficult to retrieve
b. Somewhat important as the type of data model will define what kinds of data will be stored
c. Essential as table relationships cannot be created without an accurate data model
d. It is not essential as the data model itself is modified by the database continuously.
23. The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
a. normalization.
b. data scrubbing.
c. data cleansing.
d. data administration.
24. Which of the following statements about data warehouses is not true?
a. Data warehouse systems provide a range of ad hoc and standardized query tools analytical tools and graphical reporting facilities.
b. Data warehouse systems provide easy-to-use tools for managers to easily update data.
c. They may include data from Web site transactions.
d. They store supply data to be used across the enterprise for management analysis and decision making.
25. A DBMS makes the:
a. physical database available for different logical views.
b. logical database available for different analytical views.
c. physical database available for different relational views.
d. relational database available for different physical views.

The post Information Management 2 appeared first on homeworkcrew.

"96% of our customers have reported a 90% and above score. You might want to place an order with us."

Essay Writing Service
Affordable prices

You might be focused on looking for a cheap essay writing service instead of searching for the perfect combination of quality and affordable rates. You need to be aware that a cheap essay does not mean a good essay, as qualified authors estimate their knowledge realistically. At the same time, it is all about balance. We are proud to offer rates among the best on the market and believe every student must have access to effective writing assistance for a cost that he or she finds affordable.

Caring support 24/7

If you need a cheap paper writing service, note that we combine affordable rates with excellent customer support. Our experienced support managers professionally resolve issues that might appear during your collaboration with our service. Apply to them with questions about orders, rates, payments, and more. Contact our managers via our website or email.

Non-plagiarized papers

“Please, write my paper, making it 100% unique.” We understand how vital it is for students to be sure their paper is original and written from scratch. To us, the reputation of a reliable service that offers non-plagiarized texts is vital. We stop collaborating with authors who get caught in plagiarism to avoid confusion. Besides, our customers’ satisfaction rate says it all.

© 2022 Homeworkcrew.com provides writing and research services for limited use only. All the materials from our website should be used with proper references and in accordance with Terms & Conditions.

Scroll to Top