Latest Update 2025/2026 | Graded A+.
Some organizations choose to practice a form of Internet censorship by installing Internet
filters on their employees computers to prevent them from viewing sites containing
pornography or other objectionable material. T/F - ANSWER True
Which is a true statement regarding self-service BI and analytics? - ANSWER A well-
managed program allows technology professionals to retain ultimate data governance
High quality data can increase sales by facilitating cross-selling which involves - ANSWER
Inviting customers to purchase an item related to what they are primarily interested in
What is Hadoop and what two primary components make up the Hadoop computing
environment? - ANSWER Hadoop There's an open source software framework including
several software modules that provide a means for storing and processing extremely large
data sets. Two primary components are a data processing component and a distributed file
system
While conducting a security self-assessment of his personal laptop use, van realizes that he's
putting himself at risk by - ANSWER Putting off installing available software updates that
he has been notified about
In which step of the ethical decision making process is it essential to communicate well with
all stakeholders and have someone they trust and respect explain why things are changing
and how this will benefit them? - ANSWER Implement the decision
A tier 3 or 4 Data Center would be most necessary for an organization with which
characteristic? - ANSWER Dependent on computers to manage manufacturing operations
Today due to security concerns most organizations avoid the database approach to data
management or multiple information systems share a pool of related data. T/F - ANSWER
False
The SQL query below will only return the product ID and the total inventory for any
product whose total on hand value is greater or equal to five. T/F
SELECT product_id
,total_on_hand + total_on_order
From retail.inventory
, WHERE total_on_hand <=5 - ANSWER False
Felicity who works at a bank opens multiple credit card accounts for customers without
their authorization in order to improve her customer sales and thus her a parent job
performance. This behavior is explicitly for bidden by bank policies and instructions for
manager gave her which statement is true in this situation? - ANSWER The bank can be
held responsible for Felicity's behavior despite its ethical policies
A type of memory who's contents or not lost if the power is turned off or interrupted is said
to be - ANSWER Non-volatile
Which component of Levitt's diamond defines roles Responsibilities and lines of authority
among members of the organization which must be understood and excepted for the
organization to operate successfully? - ANSWER Structure
An employee who is about to be laid off by his organization since threatening emails to his
boss stating he he is going to delete sensitive data. This employee can be charged under the
computer fraud and abuse act. T/F - ANSWER True
A slight majority 52% of 700 CIOs surveyed reported that there I S organization is viewed
as a a - ANSWER Business partner or peer
Describe the electronic product environmental assessment tool (EPEAT) - ANSWER A
system that enables purchasers to evaluate compare and select electronic products based on
a total of 51 environmental criteria.
Define Internet censorship and explain how it can be imposed at several different points
between the speaker and his or her audience. - ANSWER The control or suppression of the
publishing or accessing of information on the Internet. Government entities may pressure
upstream Internet service providers to limit access to certain websites. Websites reject the
use of certain keywords and search engine searches and track and monitor the Internet
activities of individuals.
Americans rights to freedom of religion, freedom of expression, and freedom to assemble
peacefully are protected by the - ANSWER First amendment
It is possible to restrict access to data depending on the database users privileges.
T/F - ANSWER True
Hailey needs to query her firm's Database, Jeff needs to generate a report for his next
project status meeting, and Karen needs to make some modifications to update the data in
the database. Which of the following tools can they all used to complete their assigned task?
- ANSWER Data manipulation language
Is/are considered to be the most important element in computer-based information systems
- ANSWER People