1. The introduction of new information technology has a:
a. ripple effect, raising new ethical, social, and political issues.
b. beneficial effect for society as a whole, while raising dilemmas for consumers.
c. waterfall effect in raising ever more complex ethical issues.
d. dampening effect on the discourse of business ethics.
2. In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
a. accountability and control.
b. system quality.
c. information rights and obligations.
d. property rights and obligations.
3. Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
a. responsibility.
b. accountability.
c. liability.
d. due process.
4. Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
a. System quality
b. Accountability and control
c. Information rights and obligations
d. Property rights and obligations
5. A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:
a. acceptable, because the grocer suffers the least harm.
b. wrong, because the man would not want the grocer to steal from him.
c. wrong, because if everyone were to do this, the concept of personal property is defeated.
d. acceptable, because the higher value is the survival of the family.
6. Immanuel Kant’s Categorical Imperative states that:
a. if an action cannot be taken repeatedly, then it is not right to be taken at any time.
b. one should take the action that produces the least harm or incurs the least cost.
c. one can put values in rank order and understand the consequences of various courses of action.
d. if an action is not right for everyone to take, it is not right for anyone to take.
7. Types of information gathered by Web site tracking tools include all of the following except:
a. purchases.
b. birthplace.
c. income.
d. health concerns.
8. The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
a. the courts become involved.
b. a new version of the software is released.
c. hackers are able to break into the source code.
d. the software is widely distributed.
9. Software used to apply the computer to a specific task for an end user is called:
a. system software.
b. application software.
c. data management software.
d. network software.
10. The business case for using grid computing involves all of the following except:
a. cost savings.
b. centralized maintenance.
c. agility.
d. speed of computation.
11. A high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers, best describes:
a. ASP.
b. LAN.
c. SSN.
d. SAN.
12. Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referred to as:
a. autonomic computing.
b. grid computing.
c. utility computing.
d. client/server computing.
13. Which of the following is a type of optical disk storage?
a. CD-ROM
b. Hard drive
c. USB Flash drive
d. Magnetic tape
14. Software applications that combine different components of online software applications are referred to as:
a. grid computing.
b. integrated software.
c. widgets.
d. mashups.
15. To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a:
a. total cost of ownership model.
b. cost benefit analysis.
c. return on investment model.
d. break-even point.
16. Which of the following is an open-source operating system designed for mobile devices?
a. iOS
b. Chrome
c. Android
d. OS X
17. In a table for customers, the information about a single customer would reside in a single:
a. field.
b. row.
c. column.
d. table.
18. What is the first step you should take in managing data for a firm?
a. Normalize the data before importing to a database
b. Audit your data quality
c. Identify the data needed to run the business
d. Cleanse the data before importing it to any database
19. Which of the following best illustrates the relationship between entities and attributes?
a. The entity CUSTOMER with the attribute ADDRESS
b. The entity PRODUCT with the attribute CUSTOMER
c. The entity PRODUCT with the attribute PURCHASE
d. The entity CUSTOMER with the attribute PRODUCT
20. A field identified in a table as holding the unique identifier of the table’s records is called the:
a. key field.
b. primary key.
c. primary field.
d. foreign key.
21. A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:
a. in two short marks.
b. with a crow’s foot.
c. in one short mark.
d. with a crow’s foot topped by a short mark.
22. Which of the following best describes the importance of creating an accurate data model for your business’s database?
a. Critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve
b. Somewhat important, as the type of data model will define what kinds of data will be stored
c. Essential, as table relationships cannot be created without an accurate data model
d. It is not essential, as the data model itself is modified by the database continuously.
23. The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
a. normalization.
b. data scrubbing.
c. data cleansing.
d. data administration.
24. Which of the following statements about data warehouses is not true?
a. Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities.
b. Data warehouse systems provide easy-to-use tools for managers to easily update data.
c. They may include data from Web site transactions.
d. They store supply data to be used across the enterprise for management analysis and decision making.
25. A DBMS makes the:
a. physical database available for different logical views.
b. logical database available for different analytical views.
c. physical database available for different relational views.
d. relational database available for different physical views.
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.
Get instant answers to the questions that students ask most often.
See full FAQ