MGMT 220 - Exam 2

1. According to the laws passed in accordance with the Internet Tax Freedom Act, companies are required to collect sales tax on internet sales
a. if they have sales over $100,000 per year.
b. if the company was created after 2004.
c. only from customers who reside in a state in which the company has a presence.
d. according to the laws of the state in which the customer lives
Click the card to flip 👆
1 / 56
Terms in this set (56)
1. According to the laws passed in accordance with the Internet Tax Freedom Act, companies are required to collect sales tax on internet sales
a. if they have sales over $100,000 per year.
b. if the company was created after 2004.
c. only from customers who reside in a state in which the company has a presence.
d. according to the laws of the state in which the customer lives
11. SEO is managed well by using appropriate and relevant keywords on your web site. Other concerns such as backlinks are not relevant. a. True b. Falseb. False12. The phenomenon of cutting out the middleman in transactions is referred to as a. disintermediation b. e-tailing c. group buying d. showrooming e. net neutralitya. disintermediation13. Which of the following are visual indicators that a web site is being accessed over a secure connection. Select all that apply. a. The web site text states that it is secure. b. The URL begins with "https". c. The web site asks for personal information. d. An image of a locked or green padlock is displayed in the address barb. The URL begins with "https". d. An image of a locked or green padlock is displayed in the address bar14. The definition of E-Commerce includes internet transactions only. a. true b. falseb. false15. The term _____ refers to technologies in innovative ways to support the financial sector a. E-finance b. electronic bill pay c. online brokerage d. Fintechd. FintechIn order to minimize fraud, E-traders look for anomalies in: a. email addresses b. shipping and billing addresses c. transaction patterns d. all possible answers providedd. all possible answers provided1. Select the true statement below. a. A file with the extension .csv can be read only by spreadsheets, mathmatical and statistical analysis software applications. b. The file extension .csv stands for Common Standard Values c. In using a .csv file in Excel, saving it as a .csv file again converts all formulas and functions to the displayed values in the saved filec. In using a .csv file in Excel, saving it as a .csv file again converts all formulas and functions to the displayed values in the saved file2. Match each of the following terms with the best example. a. Descriptive analytics . b. Predictive Analytics c. Prescriptive analytics Estimating the expected sales of the coming week based upon last week's sales. Reviewing reports of restaurant sales from each of night of the prior week Scheduling the correct number of employees for the coming week based upon last weeks sales reportsa. Descriptive analytics - Reviewing reports of restaurant sales from each of night of the prior week. b. Predictive Analytics - Estimating the expected sales of the coming week based upon last week's sales. c. Prescriptive analytics - Scheduling the correct number of employees for the coming week based upon last weeks sales reports.3. Data integrity can be protected by human means and by use of technological means a. True b. Falsea. True4. To truncate data means to remove characters from the end of a data element, often to save space. For example, to truncate the word "computer" at 4 characters produces "comp". a. True b. Falsea. True5. Technological methods used to protect data integrity and enforce business rules are called: a. integrity contraints b. integrity assurance c. validation d. error messagesa. integrity contraints6. Select the common errors that compromise data integrity. Select all that apply. a. files overwritten b. viruses c. sorting incorrectly d. failure to backup files e. errors in formulas f. truncated data g. power failuresa. files overwritten c. sorting incorrectly e. errors in formulas f. truncated dataWhich of the following are tips for businesses to be prepared in case of a crisis with social media? Select all that apply.a. Monitor your social media environment b. Act fast c. Identify a crisis team d. Identify your social media nightmareThe phrase "amateurization of journalism" is often used in reference to which of the following Web 2.0 applications?BlogsWhich of the following statements is true about tagging?It is the process of adding metadata to digital information such as files or photosWhich statements below are benefits of using a CMS? Select all that apply.-Allows collaboration by many users on files -Allows different users to have differing levels of access -Allows users to publish or edit filesSuccess using applications in the consumer environment usually indicates the application will be successful in the corporate environment.FalseA wiki: -Allows users to add content -Allows users to revert edits -Allows anyone to read content -Allows all of the aboveAllows all of the abovePeople meeting at the same time, whether in person or virtually is ________ communicationSynchronousA set of standards for sharing updated web content such as news, across sites is ______. Access to these updates often requires a user to sign-up or subscribe.Real simple syndicationChanges in technology that enabled dynamic web applications, allowing people to collaborate and share content online is referred to as Web 1.0.FalseCrowdsourcing Collective Intelligence Meta dataCrowdsourcing: The use of the contributions of others as free labor to complete a task. Example: Wikipedia Collective Intelligence: A concept which uses people with a divergent range of skills and expertise to outperform that capabilities of an individual expert. Example might be an online journal about brain surgery Metadata: data about data, which may describe a digital file in terms of when it was created and by whom, etcIntranets are most often used by ____ of an organizationEmployeesAdding information about the location a file was created is called ______. An example would be adding the longitude and latitude to a photograph.GeotaggingWhich of the following statements concerning the management of master data are true? Select all that apply- The information presented by master data is typically shared among units in an organization as "one version of the truth." - The format and rules of use of master data must be agreed upon by all units in the organization who collect, store or use the data. - Master data are considered the most important in the operation of a business.Finding the right technology to manage knowledge assets is often easier than determining what knowledge needs to be captured and who has this knowledgeTrueA primary key isa unique identifier for a recordA(n) _________________ emulates human capabilities such as reasoning or sensing.intelligent agent systemWhich of the following characteristics are associated with Big Data? Select all that apply.- velocity - variety - volumeWhich of the following statements is true about hard data?- It includes facts and numbersKnowledge management systems often store _______ knowledge assets that reflect processes or procedures that are known, yet difficult to explain to others.TacitThe term which refers to perform a search or retrieval of information from a database isqueryMethods used to discover previously unknown, or hidden, predictive relationships in data isdata mining_______ refers to tools and techniques for analyzing past data.business intelligenceAs explained in the text, in database design redundant data should be avoided for which of the following reasons? Select all that apply.- redundant data is not well organized (a change to a phone number could make it necessary to change many instances of that phone number.) - Redundant data wastes file storage space.In a database storing data about customers, which of the following would be the best choice to be used as a primary key?customer ID numberIn a relational database design, each column is a(n)attributeThe most common language used to work with databases and perform queries is called:SQLScheduled reportsproduced at predefined intervals or days/timesKey-indicator reportsprovide a summary of critical information on a recurring scheduleDrill-down reportsgive greater detail to help analyze information on a prior reportAd hoc queriesunplanned; created to support non-routine decisionsIn a database storing records about employees and the department to which they are assigned, which type of association would be most appropriate?one-to-manyA database is simply a collection of related data organized in a way that makes searches possible. Therefore, a small database could even be stored as an Excel spreadsheet.TrueA ________ is a special purpose information system designed to support organizational decision making.Decision support systemIn data analysis, _____________ is used when records ( or data) are segmented based on grouping known beforehand.classification