Introduction To Information Systems 4th Canadian Ed By  Rainer  – Test Bank

$20.00

Description

INSTANT DOWNLOAD COMPLETE TEST BANK WITH ANSWERS

 

Introduction To Information Systems 4th Canadian Ed By  Rainer  – Test Bank

 

Sample  Questions

 

Chapter 3

Ethics and Privacy

 

Question type: True/False

 

 

1) When you access a website, the site could also have access to your data.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: Case 3.1 The Huge Scope of Privacy Issues

AACSB: Information Technology

Bloomcode: Knowledge

 

 

2) Property issues involve the ownership and value of information.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Reflective Thinking

Bloomcode: Knowledge

 

 

3) An individual or organization faced with an ethical decision is basically considering whether to break the law.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

4) A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

5) If something is unethical, that means it is illegal.

 

Answer: False

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Comprehension

 

 

6) Improvements in information technologies are leading to a decreasing number of ethical problems.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Evaluation

 

 

7) When you interview for a job at a company, it is likely that the company will google you and search social networking sites for information on you.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Information Technology

Bloomcode: Comprehension

 

 

8) The right of privacy is absolute.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Comprehension

 

 

9) Most electronic surveillance of employees is legal.

Answer: True

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

10) Determining whose laws should be followed is a problem related to the international aspects of privacy.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Analytic

Bloomcode: Knowledge

 

 

11) Facebook’s CEO believes privacy is no longer a social norm.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Reflective Thinking

Bloomcode: Knowledge

 

 

12) The individual’s right of privacy supersedes the public’s right to know.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

13) In general, employees have high legal protection against surveillance by employers.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Communication

Bloomcode: Knowledge

 

 

14) Privacy is the right to be left alone and to be free of unreasonable personal intrusions.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

15) The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Analytic

Bloomcode: Knowledge

 

 

16) The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors to that site.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

17) The flow of information among countries is called transborder data flows.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Reflective Thinking

Bloomcode: Comprehension

 

 

Question type: Multiple Choice

 

 

18) Which of the following allows users to take pictures or record videos that can self-destruct after a set amount of time and send them to a selected recipients?

 

  1. a) Wickr
  2. b) Burn Note
  3. c) Tapad
  4. d) Snapchat
  5. e) Disconnect

 

Answer: d

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: Case 3.2 Protecting Your Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

19) Which of the following the smartphone apps allows the user to send a video that will be automatically deleted after a limited time without leaving any trace of it?

 

  1. a) Wickr
  2. b) Burn Note
  3. c) Tapad
  4. d) Silent Circle
  5. e) Disconnect

 

Answer: d

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: Case 3.2 Protecting Your Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

20) The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.

 

  1. a) Common good
  2. b) Fairness
  3. c) Rights
  4. d) Utilitarian
  5. e) Well-being

 

Answer: d

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Analytic

Bloomcode: Comprehension

 

 

21) The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.

 

  1. a) Common good
  2. b) Fairness
  3. c) Rights
  4. d) Utilitarian
  5. e) Well-being

 

Answer: c

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

22) The _______________ approach maintains that the most ethical action is the one that provides the most good or does the least harm.

 

  1. a) Common good
  2. b) Fairness
  3. c) Rights
  4. d) Utilitarian

 

Answer: d

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

23) The _____________ ethical standard states that ethical actions treat all human beings equally.

 

  1. a) Common good
  2. b) Fairness
  3. c) Rights
  4. d) Utilitarian
  5. e) Well-being

 

Answer: b

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

24) The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions.

 

  1. a) Common good
  2. b) Fairness
  3. c) Rights
  4. d) Utilitarian
  5. e) Well-being

 

Answer: a

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Comprehension

 

 

25) Arguing that CEOs make 100 times more than their employees because they have to take more risk than lower-level employees is the ____________ approach.

 

  1. a) Common good
  2. b) Fairness
  3. c) Rights
  4. d) Utilitarian

 

Answer: b

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

26) Which of the following is not a step in ethical decision making?

 

  1. a) Recognize the ethical issue.
  2. b) Get the facts.
  3. c) Evaluate alternative actions.
  4. d) Make a decision and test it.
  5. e) All of these are steps in ethical decision making.

 

Answer: e

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

27) ____________ means that you accept the consequences of your decisions and actions.

 

  1. a) Accountability
  2. b) Due process
  3. c) Liability
  4. d) Responsibility

 

Answer: d

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Analysis

 

 

28) Various organizations that promote fair and responsible use of information systems often develop a _____.

 

  1. a) Code of ethics
  2. b) Strategic plan
  3. c) Mission statement
  4. d) Responsibility charter
  5. e) Goals outline

 

Answer: a

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

29) The Sarbanes-Oxley Act in 2002 requires publicly held companies to implement ________ controls.

 

  1. a) ethical
  2. b) financial
  3. c) security
  4. d) technology

 

Answer: b

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

30) ____________ issues revolve around who should have access to information and whether they should have to pay for this access.

 

  1. a) Accessibility
  2. b) Accuracy
  3. c) Privacy
  4. d) Property

 

Answer: a

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

31) Which of the following is NOT a drawback of photo tagging and geotagging:

 

  1. a) It is easier for everyone to gather information about you.
  2. b) You are forced to manually un-tag yourself.
  3. c) It is easier to lie about where you’ve been or what you’ve been doing.
  4. d) You may experience a certain lack of control over your information.

 

Answer: c

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.2 Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

32) Which of the following is NOT a benefit of photo tagging and geotagging:

 

  1. a) It is easier for police to track criminals.
  2. b) Criminals can be identified more quickly and accurately.
  3. c) Our purchase history can be tracked so that billboards are more customized.
  4. d) Digital sensors are more efficient so that home security is easier to implement.

 

Answer: c

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.2 Privacy

AACSB: Analytic

Bloomcode: Comprehension

 

 

33) What is _____ is not necessarily _____.

 

  1. a) Illegal, unethical
  2. b) Ethical, illegal
  3. c) Unethical, illegal
  4. d) Unethical, legal
  5. e) Ethical, legal

 

Answer: c

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

34) _____ issues involve collecting, storing, and disseminating information about individuals.

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Transferability
  4. d) Property
  5. e) Accessibility

 

Answer: a

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

35) _____ issues involve the authenticity and fidelity of information that is collected and processed.

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Transferability
  4. d) Property
  5. e) Accessibility

 

Answer: b

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Comprehension

 

 

36) _____ issues involve who may obtain information and how much they should pay for this information.

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Transferability
  4. d) Property
  5. e) Accessibility

 

Answer: e

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Reflective Thinking

Bloomcode: Knowledge

 

 

37) _____________ means accepting the consequences of your decisions and actions.

 

  1. a) Privacy
  2. b) Responsibility
  3. c) Transferability
  4. d) Accountability
  5. e) Liability

 

Answer: b

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Communication, Ethics, Analytic, Information Technology, Diversity, Reflective Thinking

Bloomcode: Knowledge, Comprehension, Application, Analysis, Synthesis, Evaluation

 

 

38) ______________ determines who is responsible for the actions taken.

 

  1. a) Privacy
  2. b) Responsibility
  3. c) Transferability
  4. d) Accountability
  5. e) Liability

 

Answer: d

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Comprehension

 

 

39) Which of the following is not an ethical issue related to IT?

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Accountability
  4. d) Property (such as intellectual property)
  5. e) Accessibility to information

 

Answer: c

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Reflective Thinking

Bloomcode: Knowledge

 

 

40) ______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

 

  1. a) Privacy
  2. b) Responsibility
  3. c) Transferability
  4. d) Accountability
  5. e) Liability

 

Answer: e

 

Difficulty: Easy

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Reflective Thinking

Bloomcode: Knowledge

 

 

41) Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT?

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Accountability
  4. d) Property (such as intellectual property)
  5. e) Accessibility to information

 

Answer: a

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Application

 

 

42) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved?

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Accountability
  4. d) Property (such as intellectual property)

 

Answer: a

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Comprehension

 

 

43) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT?

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Accountability
  4. d) Property (such as intellectual property)
  5. e) Accessibility to information

 

Answer: e

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Analysis

 

 

44) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT?

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Accountability
  4. d) Property (such as intellectual property)
  5. e) Accessibility to information

 

Answer: a

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

45) Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. The intern responds that he found the design on the Internet. Shelli replies that they can’t use it. Her decision reflects which ethical issue related to IT?

 

  1. a) Privacy
  2. b) Accuracy
  3. c) Accountability
  4. d) Property (such as intellectual property)
  5. e) Accessibility to information

 

Answer: d

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Evaluation

 

 

46) Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn’t Shelli pleased?

 

  1. a) She didn’t like hearing anything negative about her store.
  2. b) People are free to say what they wish.
  3. c) She thought he should ask her before he deleted them.
  4. d) He wasn’t supposed to be checking Facebook.
  5. e) All of these are reasons for Shelli’s not being pleased.

 

Answer: b

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Reflective Thinking

Bloomcode: Synthesis

 

 

47) Which of the following statements is correct?

 

  1. a) An individual’s right to privacy is absolute.
  2. b) Determining and enforcing privacy regulations can be difficult.
  3. c) An individual’s right to privacy supersedes the needs of society.
  4. d) Advances in information technologies have not affected individual privacy.
  5. e) The Internet has increased individuals’ privacy.

 

Answer: b

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Comprehension

 

 

48) The public’s right to know is ___________ to the individual’s right of privacy.

 

  1. a) equal
  2. b) inferior
  3. c) superior
  4. d) undecided

 

Answer: c

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Communication, Ethics, Analytic, Information Technology, Diversity, Reflective Thinking

Bloomcode: Knowledge, Comprehension, Application, Analysis, Synthesis, Evaluation

 

 

49) Privacy rights apply to ______________.

 

  1. a) groups
  2. b) individuals
  3. c) institutions
  4. d) all of the above

 

Answer: d

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

50) _____________ is the tracking of people’s activities, online or offline, with the aid of computers.

 

  1. a) Computer spying
  2. b) Data aggregation
  3. c) Electronic surveillance
  4. d) Profiling

 

Answer: c

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Reflective Thinking

Bloomcode: Knowledge

 

 

51) Customer intimacy is a(n) __________ outcome of profiling.

 

  1. a) positive
  2. b) negative
  3. c) neutral
  4. d) inevitable

 

Answer: a

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

52) The __________ permits the company to collect personal information until the customer specifically requests that the data not be collected.

 

  1. a) opt-in model
  2. b) opt-out model
  3. c) government
  4. d) privacy code

 

Answer: b

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

53) Which of the following is a correct argument on the pros and cons of conveniently sharing information and protecting privacy?

 

  1. a) We have quick and easy access to our contacts on social networking sites, but it is much easier for stalking to occur.
  2. b) Protecting our privacy is difficult and complicated, even if securing our information makes us feel more comfortable with using the Internet.
  3. c) We need to be careful about what we post online, particularly since it may be difficult to ensure the security of our information on the Internet.
  4. d) All of the above are correct.

 

Answer: d

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Evaluation

 

 

54) The process of profiling:

 

  1. a) Increases individual privacy.
  2. b) Decreases individual privacy.
  3. c) Has no effect on individual privacy.
  4. d) Is illegal in more than half of the states.
  5. e) Is legal but unethical.

 

Answer: b

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

55) What is the relationship between advances in information technology and the practice of profiling?

 

  1. a) Advances in IT make it more difficult to profile individuals.
  2. b) Advances in IT have no impact on profiling.
  3. c) Advances in IT make it more expensive to profile individuals.
  4. d) Advances in IT make it easier to profile individuals.

 

Answer: d

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

56) Which of the following statements is not correct?

 

  1. a) Employees have limited protection against surveillance by employers.
  2. b) The large majority of organizations monitor employee Internet usage.
  3. c) The large majority of organizations use URL filtering.
  4. d) As with normal first-class mail, employers cannot read employee e-mail.
  5. e) Employees should be aware that surveillance is legal.

 

Answer: d

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Analytic

Bloomcode: Evaluation

 

 

57) How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.

 

  1. a) The public, the individual
  2. b) The public, ethics
  3. c) Freedom of speech, privacy
  4. d) The individual, freedom of speech
  5. e) Ethics, security

 

Answer: c

 

Difficulty: Hard

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

58) Privacy advocates prefer which model of informed consent?

 

  1. a) Opt-in
  2. b) Opt-out
  3. c) Either A or B
  4. d) Neither A nor B

 

Answer: a

 

Difficulty: Easy

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

59) Which of the following statements is correct?

 

  1. a) International privacy and security laws are very consistent.
  2. b) Consistent international privacy and security laws help companies with their regulatory requirements from country to country.
  3. c) Consistent international privacy and security laws enable information to flow freely among countries.
  4. d) The absence of consistent international privacy and security laws has led to a complex global legal framework.
  5. e) Consistent international privacy and security laws are followed by all countries.

 

Answer: d

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

60) Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.

 

  1. a) Customer relationships
  2. b) Customer profiling
  3. c) Customer intimacy
  4. d) Customer knowledge
  5. e) Spying

 

Answer: c

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

61) Which of the following tracks the same consumer across multiple devices as he/she changes devices continuously?

 

  1. a) Wickr
  2. b) Burn Note
  3. c) Tapad
  4. d) TigerText
  5. e) Disconnect

 

Answer: c

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: Case 3.2 Protecting Your Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

62) Which of the following allows users to send military-grade encrypted texts, photos, and videos to other users?

 

  1. a) Wickr
  2. b) Burn Note
  3. c) Tapad
  4. d) TigerText
  5. e) Disconnect

 

Answer: a

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: Case 3.2 Protecting Your Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

63) Which of the following allows users to send encrypted notes that self-destruct after a set amount of time?

 

  1. a) Wickr
  2. b) Burn Note
  3. c) Tapad
  4. d) TigerText
  5. e) Disconnect

 

Answer: b

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: Case 3.2 Protecting Your Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

64) Which of the following allows senders to retrieve messages that they have already sent?

 

  1. a) Wickr
  2. b) Burn Note
  3. c) Tapad
  4. d) TigerText
  5. e) Disconnect

 

Answer: d

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: Case 3.2 Protecting Your Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

65) Which of the following provides a secure messaging service?

 

  1. a) Wickr
  2. b) Burn Note
  3. c) Tapad
  4. d) TigerText
  5. e) Disconnect

 

Answer: d

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: Case 3.2 Protecting Your Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

66) Which of the following can speedup web surfing ability by blocking any web site that requests for your personal data?

 

  1. a) Wickr
  2. b) Burn Note
  3. c) Tapad
  4. d) TigerText
  5. e) Disconnect

 

Answer: e

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: Case 3.2 Protecting Your Privacy

AACSB: Information Technology

Bloomcode: Knowledge

 

 

Question type: Essay

 

 

67) Identify and analyze the fundamental ethical issues involved with information technology.

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

68) Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Analytic

Bloomcode: Knowledge

 

 

69) Explain why something that is unethical might not necessarily be illegal.

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Comprehension

 

 

70) Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to know supersedes the individual’s right to privacy.

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Comprehension

 

 

71) Compare and contrast the two informed consent models: opt-in and opt-out. Why do companies prefer one over the other? Why do privacy advocates prefer one over the other?

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Ethics

Bloomcode: Knowledge

 

 

72) Discuss the relationship between surveillance and privacy.

 

Difficulty: Hard

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

73) Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and common good.

 

Difficulty: Medium

Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

Section Reference: 3.1 Ethical Issues

AACSB: Ethics

Bloomcode: Knowledge

 

 

74) Discuss the international aspects of privacy. How do these aspects impact transborder data flows?

 

Difficulty: Medium

Learning Objective: Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Section Reference: 3.2 Privacy

AACSB: Analytic

Bloomcode: Comprehension

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Legal Notice

 

 

 

 

Copyright © 2016 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

 

 

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence.

 

The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.

 

 

 

Chapter 5

Data and Knowledge Management

 

Question type: True/False

 

 

1) Managing the massive amounts of data that are critical to organizational success comes at a huge cost.

 

Answer: True

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

2) Information technologies and systems support organizations in managing data, when this data is managed properly; it becomes information and then knowledge.

 

Answer: True

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

3) After the data is stored in your organization’s databases, it must be accessible to users in a data warehouse in order to help your organization to make decisions.

 

Answer: True

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

4) The biggest problem today is gathering data and then using it properly.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Define Big Data and discuss its basic characteristics.

Section Reference: 5.3 Big Data

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

5) Data governance is an approach to managing functional area information systems.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

6) Managing data is easier nowadays since there is so much of it.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

7)  Data rot refers to the quality of the data itself.

 

Answer: False

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

8) Master data are a set of core data that span all of an enterprise’s information systems.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

9) It is important for applications and data to be dependent on each other.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

10) Secondary keys have some identifying information but do not identify a file with complete accuracy.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

11) A negative value for a student’s grade point average is an example of a data integrity problem.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

12) For the following entity-relationship diagram, the Student entity would have the foreign key.

 

Computer

Answer: False

 

Difficulty: Easy

Learning Objective: Name six problems that can be minimized by using the database approach.

Section Reference: 5.2 The Database Approach: Designing the Database

AACSB: Use of Information Technology

Bloomcode: Application

 

 

13) An entity is a person, place, thing, or event about which information is maintained.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach: Designing the Database

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

14) An attribute is any characteristic or quality that describes a particular entity.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach: Designing the Database

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

15) Modality is the minimum number of times an instance of one entity can be associated with an instance of a related entity.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach: Designing the Database

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

16) The secondary key is a field that identifies a record with complete uniqueness.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach: Designing the Database

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

17) Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

18) You would be an instance of your university’s STUDENT class.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Application

 

 

19) The relational database model is based on the concept of three-dimensional tables.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

20) A relational database is one big table that contains all the company’s records.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

21) Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

22) When data are normalized, attributes in the table depend on the primary key and any secondary keys.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

23) In a data warehouse, existing data are constantly purged as new data come in.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

24) An organization’s data warehouse generally maintains its operational data.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

25) Online analytical processing (OLAP) involves the analysis of accumulated data by end users.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

26) A data mart can be implemented more quickly than a data warehouse.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

27) Data marts are designed for the end-user needs in a strategic business unit or department.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

28) Master data are generated and captured by operational systems.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

29) A data mart is a low-cost, scaled-down version of a data warehouse.

Answer: True

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts: Governance

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

30) Tacit knowledge is the more objective, rational, and technical types of knowledge.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

31) Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.

 

Answer: False

 

Difficulty: Easy

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

32) Knowledge is information in action.

 

Answer: True

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

33) When you start a job, you are given an employee handbook which contains the company’s tacit knowledge.

 

Answer: False

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Application

 

 

34) When you start a job, you watch what other employees are doing and ask them to explain why they do it in a particular way. They are sharing their tacit knowledge.

 

Answer: True

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Application

 

 

35) The data dictionary stores definitions of data elements, business functions that use the data elements, formats of the data elements, information on each attribute of an element and how the attribute should be updated.

 

Answer: True

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

Question type: Multiple Choice

 

 

36) Which of the following is NOT a problem with Big Data?

 

  1. a) Gathering data
  2. b) Privacy
  3. c) Security
  4. d) Decision-making

 

Answer: a

 

Difficulty: Medium

Learning Objective: Define Big Data and discuss its basic characteristics.

Section Reference: 5.3 Big Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

37) Refer to Case 5.1 Data Problems at Target Canada. In order for SAP ERP system to work properly, data needs to be:

 

  1. a) accurate.
  2. b) managed properly.
  3. c) contain RFID information.
  4. d) reenginered.
  5. e) All of the above.

 

Answer: a

 

Difficulty: Medium

Learning Objective: Identify three common challenges in managing data, and describe one way organizations can address each challenge using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

38) Which of the following has (have) the broadest impact on an organization?

 

  1. a) Decisions about hardware.
  2. b) Decisions about software.
  3. c) Decisions about data.
  4. d) Both “decisions about hardware” and “decisions about software.”
  5. e) All of these have an equal impact.

 

Answer: c

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

39) It is difficult to manage data. For example, it is common for customers to move and for companies to go out of business. This is an example of ___________.

 

  1. a) Data degradation
  2. b) Data rot
  3. c) Data security
  4. d) Scattered data

 

Answer: a

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

40) Which of the following is not a source for external data?

 

  1. a) Commercial databases
  2. b) Corporate databases
  3. c) Corporate websites
  4. d) Clickstream data
  5. e) Government reports

 

Answer: b

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

41) Which of the following is not a reason why managing data is difficult over time?

 

  1. a) New systems are developed.
  2. b) The media the data are stored on becomes problematic.
  3. c) New sources of data are created.
  4. d) The amount of data increases exponentially.
  5. e) All of these are reasons why managing data is difficult over time.

 

Answer: e

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

42) The amount of data we collect is ____________ over time, making it ________ difficult to manage data.

 

  1. a) Decreasing, less
  2. b) Decreasing, more
  3. c) Increasing, less
  4. d) Increasing, more

 

Answer: d

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

43) In Canada, Bill 198 legally mandates that public companies evaluate and disclose the effectiveness of their ________________.

 

  1. a) IT policies
  2. b) HR rules
  3. c) financial controls
  4. d) sales goals

 

Answer: c

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

44) Not including alphabetic characters in a Social Security Number field is an example of _____.

 

  1. a) Data isolation.
  2. b) Data integrity.
  3. c) Data consistency.
  4. d) Data redundancy.
  5. e) Application/data dependence.

 

Answer: b

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

45) For the following entity-relationship diagram, the attributes you would NOT expect to see in the Computer entity are:

 

Computer
Student
  1. a) manufacturer.
  2. b) type (laptop or desktop).
  3. c) memory size.
  4. d) disk size.
  5. e) student’s dorm room.

 

Answer: e

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

46) For the following entity-relationship diagram, what could the primary key be in the Grade entity?

 

  1. a) Primary key in Student entity
  2. b) Primary key in Course entity
  3. c) Its own primary key.
  4. d) Primary key made up of the primary keys in Student entity and Course entity
  5. e) It doesn’t need a primary key.

 

Answer: d

 

Difficulty: Medium

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

47) In a jewelry store, a customer places an order for a piece of jewelry (for example, a silver pin in the shape of a tulip). A customer could order more than one piece of jewelry on the same order.

 

Which of the following entity-relationships describes this situation?

  1. a) The entities Customer and Order have a one to many relationship.
  2. b) The entities Customer and Order have a many to many relationship.
  3. c) The entities Customer and Jewelry Item have a one to many relationship.
  4. d) The entities Order and Jewelry Item have a one to many relationship.
  5. e) The entities Order and Jewelry Item have a many to many relationship.

 

Answer: d

 

Difficulty: Medium

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Application

 

 

48) _____ occurs when applications cannot access data associated with other applications.

 

  1. a) Data isolation
  2. b) Data integrity
  3. c) Data consistency
  4. d) Data redundancy
  5. e) Application/Data dependence

 

Answer: a

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

49) _____ occurs when the same data are stored in many places.

 

  1. a) Data isolation
  2. b) Data integrity
  3. c) Data consistency
  4. d) Data redundancy
  5. e) Application/Data dependence

 

Answer: d

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

50) Data ___________ ensures applications cannot access data associated with other applications.

 

  1. a) Hermitting
  2. b) Inconsistency
  3. c) Isolation
  4. d) Redundancy

 

Answer: c

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

51) _____ occurs when various copies of the data agree.

 

  1. a) Data isolation
  2. b) Data integrity
  3. c) Data consistency
  4. d) Data redundancy
  5. e) Application/Data dependence

 

Answer: c

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

52) You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management?

 

  1. a) Data redundancy
  2. b) Data inconsistency
  3. c) Data isolation
  4. d) Data security
  5. e) Data dependence

 

Answer: b

 

Difficulty: Medium

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

53) Place the following members of the data hierarchy in their correct order:

 

  1. a) Bit – byte – field – record – database – file
  2. b) Bit – field – byte – record – file – database
  3. c) Byte – bit – record – field – database
  4. d) Bit – byte – field – record – file – database
  5. e) Bit – record – field – byte – file – database

 

Answer: d

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach: The Data Hierarchy

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

54) Data ___________ ensures data meets system constraints.

 

  1. a) Consistency
  2. b) Independence
  3. c) Integrity
  4. d) Security

 

Answer: c

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

55) Data __________ is a problem minimized by databases.

 

  1. a) Independence
  2. b) Integrity
  3. c) Isolation
  4. d) Security

 

Answer: c

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram

Section Reference: 5.2 The Database Approach: The Data Hierarchy

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

56) In the data hierarchy, the smallest element is the _____.

 

  1. a) Record
  2. b) Bit
  3. c) Byte
  4. d) Character
  5. e) File

 

Answer: b

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram

Section Reference: 5.2 The Database Approach: The Data Hierarchy

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

57) A _______ is eight ________.

 

  1. a) bit, digits
  2. b) Byte, characters
  3. c) Bit, bytes
  4. d) Byte, bits

 

Answer: d

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

58) A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number.

 

  1. a) Byte
  2. b) Field
  3. c) Record
  4. d) File
  5. e) Database

 

Answer: b

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram

Section Reference: 5.2 The Database Approach: The Data Hierarchy

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

59) A(n) _____ is a logical grouping of related fields.

 

  1. a) Byte
  2. b) Field
  3. c) Record
  4. d) File
  5. e) Database

 

Answer: c

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

60) A(n) _____ is a logical grouping of related records.

 

  1. a) Byte
  2. b) Field
  3. c) Record
  4. d) File
  5. e) Database

 

Answer: d

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach: The Data Hierarchy

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

61) A(n) _____ represents a single character, such as a letter, number, or symbol.

 

  1. a) Byte
  2. b) Field
  3. c) Record
  4. d) File
  5. e) Database

 

Answer: a

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

62) In a database, the primary key field is used to _____.

 

  1. a) Specify an entity
  2. b) Create linked lists
  3. c) Identify duplicated data
  4. d) Uniquely identify a record
  5. e) Uniquely identify an attribute

 

Answer: d

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

63) _____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy.

 

  1. a) Primary keys
  2. b) Secondary keys
  3. c) Duplicate keys
  4. d) Attribute keys
  5. e) Record keys

 

Answer: b

 

Difficulty: Easy

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

64) As an individual student in your university’s student database, you are a(n) _____ of the STUDENT class.

 

  1. a) Instance
  2. b) Individual
  3. c) Representative
  4. d) Entity
  5. e) Relationship

 

Answer: a

 

Difficulty: Medium

Learning Objective: Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Application

 

 

65) At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship?

 

  1. a) One-to-one
  2. b) One-to-many
  3. c) Many-to-one
  4. d) Many-to-many
  5. e) Some-to-many

 

Answer: d

 

Difficulty: Easy

Learning Objective: Name six problems that can be minimized by using the database approach.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Application

 

 

66) In a university’s relational database, the student record contains information regarding the student’s last name. The last name is a(n):

 

  1. a) Attribute.
  2. b) Entity.
  3. c) Primary key.
  4. d) Object.
  5. e) File.

 

Answer: a

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

67) A database management system is primarily a(n) _____.

 

  1. a) File-handling program
  2. b) Data-modeling program
  3. c) Interface between applications and a database
  4. d) Interface between data and a database
  5. e) Interface between queries and a database

 

Answer: c

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

68) In the relational database model, related tables can be joined when they contain common _____.

 

  1. a) Primary keys
  2. b) Rows
  3. c) Records
  4. d) Columns
  5. e) Files

 

Answer: d

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

69) __________________ allows users to perform complicated searches by using relatively simple statements or keywords.

 

  1. a) DBMS
  2. b) QBE
  3. c) SQL
  4. d) SSK

 

Answer: c

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

70) _____ tell the database management system which records are joined with others in related tables.

 

  1. a) Primary keys
  2. b) Secondary keys
  3. c) Common attributes
  4. d) Common files
  5. e) Common fields

 

Answer: a

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

71) Data dictionaries perform all of the following functions except:

 

  1. a) Providing information on each record.
  2. b) Providing information on why attributes are needed in the database.
  3. c) Defining the format necessary to enter data into the database.
  4. d) Providing information on the name of each attribute.
  5. e) Providing information on how often attributes should be updated.

 

Answer: a

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

72) In a relational database, every row represents a(n) _____.

 

  1. a) File
  2. b) Record
  3. c) Attribute
  4. d) Primary key
  5. e) Secondary key

 

Answer: b

 

Difficulty: Easy

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 Database Approach

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

73) A standardized language used to search for data is _____.

 

  1. a) MS-Access
  2. b) Oracle
  3. c) Query-by-example language
  4. d) Structured query language
  5. e) Data-manipulation language

 

Answer: d

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

74) _______________ uses drag-and-drop features to search a database.

 

  1. a) DBMS
  2. b) QBE
  3. c) SQL
  4. d) DDF

 

Answer: b

 

Difficulty: Medium

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

75) Data dictionaries provide which of the following advantages to the organization?

 

  1. a) They reduce data inconsistency.
  2. b) They enable faster program development.
  3. c) They make it easier to modify data and information.
  4. d) Both “They enable faster program development.” and “They make it easier to modify data and information.”
  5. e) All of these

 

Answer: e

 

Difficulty: Medium

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

76) _____ is a method for analyzing and reducing a relational database to its most streamlined form.

 

  1. a) Structured query
  2. b) Normalization
  3. c) Query by example
  4. d) Joining
  5. e) Relational analysis

 

Answer: b

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

77) When data are normalized, attributes in the table depend only on the _____.

 

  1. a) Secondary key
  2. b) Common attribute
  3. c) Primary key
  4. d) Common row
  5. e) Common record

 

Answer: c

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

78) _____________ reduces a relational database to its most streamlined form.

 

  1. a) A data dictionary
  2. b) A database management system
  3. c) Normalization
  4. d) Streamlining

 

Answer: c

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

79) Normalized data occurs when attributes in the table depend only on the _______.

 

  1. a) Data dictionary
  2. b) Primary key
  3. c) Record information
  4. d) Secondary key

 

Answer: b

 

Difficulty: Easy

Learning Objective: Understand the processes of querying a relational database, entity–relationship modelling, normalization, and joins.

Section Reference: 5.6 Appendix: Fundamentals of Relational Database Operations

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

80) The data in a data warehouse have which of the following characteristics?

 

  1. a) They are organized by subject.
  2. b) They are coded in different formats.
  3. c) They are updated in real time.
  4. d) They are typically retained for a defined, but limited, period of time.
  5. e) They are organized in a hierarchical structure.

 

Answer: a

 

Difficulty: Medium

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

81) The data in a data warehouse:

 

  1. a) Are updated constantly in real time.
  2. b) Are updated in batch mode, approximately once per day.
  3. c) Are not updated.
  4. d) Are purged constantly as new data enter.
  5. e) Are available for MIS analysts, but not users.

 

Answer: c

 

Difficulty: Medium

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

82) The process of moving data from various sources into the data warehouse is called:

 

  1. a) Uploading.
  2. b) Extracting, transforming, and loading.
  3. c) Online transaction processing.
  4. d) Master data management.
  5. e) Online analytical processing.

 

Answer: b

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

83) A data warehouse is a repository of __________ data.

 

  1. a) Current
  2. b) Historical
  3. c) Queried
  4. d) Numbered

 

Answer: b

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

84) Compared to data warehouses, data marts have which one of the following characteristics?

 

  1. a) They cost less.
  2. b) They have longer lead times for implementation.
  3. c) They provide for central rather than local control.
  4. d) They contain more information.
  5. e) They are more difficult to navigate.

 

Answer: a

 

Difficulty: Medium

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

85) _____ is a formal approach to managing data consistently across an entire organization.

 

  1. a) Database management
  2. b) Enterprise information management
  3. c) Data warehousing
  4. d) Data governance
  5. e) Data mart

 

Answer: d

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

86) Which of the following statements is TRUE?

 

  1. a) Databases are organized to make queries very easy.
  2. b) Running queries in a data warehouse does not degrade database performance.
  3. c) Databases are well-suited for making comparisons between records.
  4. d) Querying databases is the most effective and efficient way of using data.

 

Answer: b

 

Difficulty: Hard

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

87) _____ provide(s) companies with a single version of the truth for their data.

 

  1. a) Data warehouses
  2. b) Data marts
  3. c) Databases
  4. d) Master data management
  5. e) Enterprise information management

 

Answer: d

 

Difficulty: Easy

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

88) In data warehouses and data marts, data are stored in a multidimensional structure which is sometimes visually represented as a 3-dimensional data cube. Figure 5.7 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart’s sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis?

 

  1. a) Customer, product, and month
  2. b) Customer, product, store
  3. c) Customer, product, store, and month
  4. d) Customer, product, store, and week
  5. e) Product, store, and week

 

Answer: e

 

Difficulty: Medium

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Application

 

 

89) Organizations are turning to data governance for which of the following reasons?

 

  1. a) They have too little data.
  2. b) They are responding to federal regulations.
  3. c) Their data are typically structured.
  4. d) Their data are usually located in the organization’s databases.
  5. e) Data across their organizations are generally consistent.

 

Answer: b

 

Difficulty: Hard

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Comprehension

 

 

90) __________ involves the analysis of accumulated data and involves a __________.

 

  1. a) OLAP, database
  2. b) OLAP, data warehouse
  3. c) OLTP, database
  4. d) OLTP, data warehouse

 

Answer: b

 

Difficulty: Easy

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

91) _____ describes the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization’s activities.

 

  1. a) Transaction data, master data
  2. b) Source data, transaction data
  3. c) Operational data, master data
  4. d) Master data, source data
  5. e) Business dimensional data, databases

 

Answer: a

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

92) Refer to the Nordea Bank case. The data warehouse enabled Nordea to: ____________.

 

  1. a) To meet the current regulatory requirements more quickly, accurately, and cheaply
  2. b) Find problems with their customers
  3. c) Be able to communicate faster with customers and suppliers
  4. d) All of the above

 

Answer: a

 

Difficulty: Medium

Learning Objective: Explain the elements necessary to successfully implement

and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloomcode: Application

 

 

93) Refer to the Braintree case. Knowledge management systems such as Confluence allows organizations to: ____________.

 

  1. a) create and distribute structured how-to and troubleshooting documents that are manually organized and easy to find
  2. b) create and distribute structured how-to and mining documents that are automatically organized and easy to find
  3. c) create and distribute structured who-is and troubleshooting documents that are automatically organized and easy to find
  4. d) create and distribute structured how-to and troubleshooting documents that are automatically organized and easy to find

 

Answer: d

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Application

 

 

94) _____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner.

 

  1. a) Discovery
  2. b) Knowledge management
  3. c) Decision support
  4. d) Online analytical processing
  5. e) Data mining

 

Answer: b

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

95)  _____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem.

 

  1. a) Knowledge, information
  2. b) Data, information
  3. c) Information, data
  4. d) Information, knowledge
  5. e) Data, knowledge

 

Answer: a

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

96) Explicit knowledge has which of the following characteristics?

 

  1. a) Objective
  2. b) Personal
  3. c) Slow
  4. d) Costly to transfer
  5. e) Ambiguous

 

Answer: a

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

97) _____________ knowledge can be easily documented.

 

  1. a) Complete
  2. b) Explicit
  3. c) Tacit
  4. d) Intellectual

 

Answer: b

 

Difficulty: Easy

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

98) Tacit knowledge has which of the following characteristics?

 

  1. a) Codified
  2. b) Objective
  3. c) Unstructured
  4. d) Rational
  5. e) Technical

 

Answer: c

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

99) ____________ knowledge is imprecise and costly to transfer.

 

  1. a) Complete
  2. b) Explicit
  3. c) Tacit
  4. d) Intellectual

 

Answer: c

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

100) Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge.

 

  1. a) Tacit
  2. b) Explicit
  3. c) Managerial
  4. d) Geographical
  5. e) Cultural

 

Answer: b

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

101) The most important benefit of knowledge management systems is:

 

  1. a) They improve customer service.
  2. b) They make best practices available to employees.
  3. c) They enable the organization to retain scarce knowledge when employees retire.
  4. d) They improve employee morale.
  5. e) They make product development more efficient.

 

Answer: b

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

102) Which of the following is a challenge for developing a knowledge management system?

 

  1. a) Employees must be willing to share their explicit knowledge.
  2. b) It must be continually maintained and updated.
  3. c) It makes human capital widely accessible.
  4. d) All of the above are challenges.

 

Answer: b

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloomcode: Knowledge

 

 

Question type: Short Answer

 

 

103) Discuss why decisions concerning data structure have a broader impact than decisions concerning hardware and software.

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloom: Comprehension

 

 

104) Discuss the difficulties involved in managing data.

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloom: Analysis

 

 

105) Define each element of the data hierarchy, in order from smallest to largest.

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloomcode: Analysis

 

 

106) Discuss the advantages of the database approach.

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloom: Analysis

 

 

107) Describe entity-relationship modeling.

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloom: Knowledge

 

 

108) Describe the relational database model.

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloom: Knowledge

 

 

109) Describe the characteristics of a data warehouse.

 

Difficulty: Medium

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloom: Knowledge

 

 

110) What are the advantages of a data mart?

 

Difficulty: Medium

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloom: Knowledge

 

 

111) Differentiate between explicit knowledge and tacit knowledge. Provide examples of each.

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloom: Analysis

 

 

112) Describe the six steps of the knowledge management system cycle.

 

Difficulty: Medium

Learning Objective: Describe the benefits and challenges of implementing knowledge management systems in organizations.

Section Reference: 5.5 Knowledge Management

AACSB: Use of Information Technology

Bloom: Knowledge

 

 

Question type: Essay

 

 

113) Describe the various multiple sources for data, and provide an example of each.

 

Difficulty: Hard

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloom: Comprehension

 

 

114) Explain the six problems that can be minimized using the database approach.

 

Difficulty: Medium

Learning Objective: Discuss the advantages and disadvantages of relational databases.

Section Reference: 5.2 The Database Approach

AACSB: Use of Information Technology

Bloom: Comprehension

 

 

115) Identify and explain the advantages of the six characteristics of data warehouses.

 

Difficulty: Medium

Learning Objective: Explain the elements necessary to successfully implement and maintain data warehouses.

Section Reference: 5.4 Data Warehouses and Data Marts

AACSB: Use of Information Technology

Bloom: Comprehension

 

 

116) Differentiate between master data and transaction data.

 

Difficulty: Medium

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloom: Knowledge

 

 

117) Why is data governance so important for organizations?

 

Difficulty: Hard

Learning Objective: Discuss ways that common challenges in managing data can be addressed using data governance.

Section Reference: 5.1 Managing Data

AACSB: Use of Information Technology

Bloom: Analysis

 

 

 

 

Legal Notice

 

 

 

 

Copyright © 2016 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

 

 

The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence.

 

The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.