Data Resource Management — 35% of assessment Flashcards

1
Q

When using extract, transform, and load (ETL), what is done during the “transform” step?

A

The data are normalized and structured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the key characteristic that differentiates a datamart from a data warehouse?

A

A datamart is smaller and more specialized in its focus than a data warehouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A marketing employee is tasked with mailing discount coupons to the company’s top 100 customers by sales volume. The marketing employee only has lists of customers’ names, customers’ addresses, and the sales generated by each customer. Which process should this employee use to ensure coupons are mailed to the correct customers?

A

Data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the velocity of big data?

A

The speed of data produced in a given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is it called when an organization implements security procedures to protect the hardware, network, and software from intrusion?

A

System-level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term is used to refer to data that come from many different sources in various structures?

A

Disparate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are scrubbed data?

A

Data that have been validated for accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost.
What is this metric called?

A

Return on investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data.
What is the term that describes this effort?

A

Data governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which level of management gets the most detailed reports directly from the transaction processing system?

A

Supervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate.
What is the primary source of the data used by this DSS?

A

The transaction processing system (TPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a key capability of a decision support system?

A

It compiles data from many systems to assist in decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Endothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed.
Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week?

A

An extranet that provides the manufacturer access to data at Endothon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The IT department of a company has been asked to provide systems for financial and investment management.
Which business department has the greatest need for this type of system?

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which strategy can be used to help a company’s web page appear on the first page of search results in a browser?

A

Search engine optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which technology enables people without computer programming skills to design and publish their own websites?

A

Browser-based web development tools

17
Q

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices.
What is the designation of this new protocol?

A

Internet Protocol version 6 (IPv6)

18
Q

A small online retailer has grown rapidly over the past year, and now during times of high activity, the retailer’s web server is nearly at capacity. The retailer anticipates continued rapid growth but is concerned that this growth may stall if the economy goes into recession.
What is an appropriate strategic planning decision for this retailer to make in order to ensure adequate server capacity?

A

Use a cloud web hosting service

19
Q

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients.
Which action will give the graphic designer initial copyright protection of these marketing images?

A

Creating the marketing images

20
Q

A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area.
Which legal protection prohibits unethical duplication of this computer program?

A

Copyright

21
Q

An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system’s accounting record retention policies are set in accordance with federal law.
Which law should the IT manager become familiar with?

A

Sarbanes-Oxley Act

22
Q

An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author.
Which type of law prohibits this kind of unethical behavior?

A

Copyright

23
Q

Which communication technology has a range of approximately 30 feet and allows smartphones, tablets, and handheld product scanner devices to communicate with a network?

A

Bluetooth

24
Q

What is an example of an Internet of Things (IoT) device?

A

A light bulb that can be turned on or off with a smartphone

25
Q

Where does IoT data collection begin?

A

The edge

26
Q

Which type of technology can be used to monitor every product in a warehouse to enable real-time inventory tracking and updates?

A

Radio-frequency identification (RFID)

27
Q

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house.
What is an example of Internet of Things (IoT) technology in this scenario?

A

the door lock

28
Q

How does the healthcare industry use Internet of Things (IoT) devices?

A

To monitor patients’ heart rate and oxygen levels

29
Q

A large automobile maker has added sensors to its assembly line equipment to alert managers to manufacturing anomalies via a mobile application (app) on their smartphones. This Internet of Things (IoT) system connects proprietary manufacturing components.
What is the greatest risk created by incorporating this IoT system?

A

Increased security risk

30
Q

Which approach facilitates live communication when a business has employees that are in different locations and telecommute for work?

A

Real-time communication

31
Q

A company produces a mobile app that provides recipes and cooking tutorials.
Which category of app is this?

A

Lifestyle

32
Q

Which file format is suitable to use when sharing a legal contract that requires a digital signature?

A

PDF