Really great job. Thank you so much. I really love it. Thank you so much for all of your help.
1. The introduction of new information technology has a:
a. ripple effect, raising new ethical, social, and political issues.
b. beneficial effect for society as a whole, while raising dilemmas for consumers.
c. waterfall effect in raising ever more complex ethical issues.
d. dampening effect on the discourse of business ethics.
2. In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
a. accountability and control.
b. system quality.
c. information rights and obligations.
d. property rights and obligations.
3. Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
d. due process.
4. Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
a. System quality
b. Accountability and control
c. Information rights and obligations
d. Property rights and obligations
5. A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:
a. acceptable, because the grocer suffers the least harm.
b. wrong, because the man would not want the grocer to steal from him.
c. wrong, because if everyone were to do this, the concept of personal property is defeated.
d. acceptable, because the higher value is the survival of the family.
6. Immanuel Kantâ€™s Categorical Imperative states that:
a. if an action cannot be taken repeatedly, then it is not right to be taken at any time.
b. one should take the action that produces the least harm or incurs the least cost.
c. one can put values in rank order and understand the consequences of various courses of action.
d. if an action is not right for everyone to take, it is not right for anyone to take.
7. Types of information gathered by Web site tracking tools include all of the following except:
d. health concerns.
8. The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
a. the courts become involved.
b. a new version of the software is released.
c. hackers are able to break into the source code.
d. the software is widely distributed.
9. Software used to apply the computer to a specific task for an end user is called:
a. system software.
b. application software.
c. data management software.
d. network software.
10. The business case for using grid computing involves all of the following except:
a. cost savings.
b. centralized maintenance.
d. speed of computation.
11. A high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers, best describes:
12. Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referred to as:
a. autonomic computing.
b. grid computing.
c. utility computing.
d. client/server computing.
13. Which of the following is a type of optical disk storage?
b. Hard drive
c. USB Flash drive
d. Magnetic tape
14. Software applications that combine different components of online software applications are referred to as:
a. grid computing.
b. integrated software.
15. To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a:
a. total cost of ownership model.
b. cost benefit analysis.
c. return on investment model.
d. break-even point.
16. Which of the following is an open-source operating system designed for mobile devices?
d. OS X
17. In a table for customers, the information about a single customer would reside in a single:
18. What is the first step you should take in managing data for a firm?
a. Normalize the data before importing to a database
b. Audit your data quality
c. Identify the data needed to run the business
d. Cleanse the data before importing it to any database
19. Which of the following best illustrates the relationship between entities and attributes?
a. The entity CUSTOMER with the attribute ADDRESS
b. The entity PRODUCT with the attribute CUSTOMER
c. The entity PRODUCT with the attribute PURCHASE
d. The entity CUSTOMER with the attribute PRODUCT
20. A field identified in a table as holding the unique identifier of the tableâ€™s records is called the:
a. key field.
b. primary key.
c. primary field.
d. foreign key.
21. A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:
a. in two short marks.
b. with a crowâ€™s foot.
c. in one short mark.
d. with a crowâ€™s foot topped by a short mark.
22. Which of the following best describes the importance of creating an accurate data model for your businessâ€™s database?
a. Critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve
b. Somewhat important, as the type of data model will define what kinds of data will be stored
c. Essential, as table relationships cannot be created without an accurate data model
d. It is not essential, as the data model itself is modified by the database continuously.
23. The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
b. data scrubbing.
c. data cleansing.
d. data administration.
24. Which of the following statements about data warehouses is not true?
a. Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities.
b. Data warehouse systems provide easy-to-use tools for managers to easily update data.
c. They may include data from Web site transactions.
d. They store supply data to be used across the enterprise for management analysis and decision making.
25. A DBMS makes the:
a. physical database available for different logical views.
b. logical database available for different analytical views.
c. physical database available for different relational views.
d. relational database available for different physical views.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more