Answered step by step
Verified Expert Solution
Question
1 Approved Answer
33) Which of the options below are important components of effective data storytelling? A) Consider the audience. B) Remembering the question that initiated the analytics
33) Which of the options below are important components of effective data storytelling? A) Consider the audience. B) Remembering the question that initiated the analytics process. C) Use data visualizations. D) All of the above. 34) For most companies, what data structure typically holds the most to the least amount of data? A) Data warehouse, data mart, data lake B) Data lake, data mart, data warehouse C) Data warehouse, data lake, data mart D) Data lake, data warehouse, data mart 35) Which technique would assist in estimating the number of violated attribute dependency issues in a dataset of 4 million records? A) Visual inspection B) Basic statistical tests. C) Auditing a sample. D) Advanced testing techniques. 36) An update log file contains the following information: Login Old. Name Old.Phone Old City New.Name New.Phone New.City UpdateTimeStamp 15 Steve 212 834 Brooklyn Steven 212 834- NJ 01/21/22 07:02:09 Gleason 2345 Gleason 12345 UTC 16 Mabel 315 332 Morristown Mabel Lee 315 332 Camden 01/21/22 07:02:29 Zurich 3833 3833 UTC 17 Juan 646 257- Bronx Juan 646 257 Long Jan. 21 2022 Moroni 7455 Moroni 7455 Island 07:03:02 UTC For LogID 16 which of the following data structure issues are present? A) Data parsing. B) Cryptic data values. C) Misfielded values. D) Data consistency. E) Data concatenation 37) A company visualizes how employee happiness changes each quarter. What is the purpose of this type of viz? A) Comparison B) Correlation C) Distribution D) Trend Evaluation 38) Select all that apply. Which of the following techniques will increase an object's visual weight? A) Size: using smaller items. B) Color: using more saturated and darker colors. C) Goldilocks principle: presenting just the right amount of data. D) Density: presenting items close together. 39) Insiders are frequently the ones who commit fraud because A) they need money more than outsiders. B) they are less likely to get caught than outsiders. C) they know more about the system and its weaknesses than outsiders. D) they are more dishonest than outsiders. 40) Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called A) piggybacking. B) hijacking. C) pretexting. D) vishing. 41) A document that shows all projects that must be completed and the related IT needs in order to achieve long-range company goals is known as a A) performance evaluation. B) strategic master plan. C) project development plan. D) data processing schedule. 42) The process of maintaining a table listing all established connections between the organization's computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as A) deep packet inspection B) access control list. C) packet filtering. D) access control matrix 43) An analytic that answers the question "what happened?" is an example of which type of analytic? A) Descriptive analytic B) Diagnostic analytic C) Predictive analytic D) Prescriptive analytic 44) Incentive programs were introduced to sales staff to decrease the amount of time spent on each order. This incentive program is likely to increase which type of error? A) Data threshold values. B) Data imputation. C) Data input. D) Violated attribute dependency. E) Data de-duplication. 45) A vice president in the organization believes that employees working in cubicles will not perform better if they use augmented reality headsets. Her expectation that augmented reality headsets will not improve performance is an example of which of the following? A) Hypothesis stated in the alternative form. B) Hypothesis stated in the null form. A type I error. D) A type Il error. 46) Lauren wants to open a floral shop in a downtown business district. She doesn't have funds enough to purchase inventory and pay six months' rent up front. Lauren approaches a good friend, Jamie, to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business. After a lengthy discussion, Jamie agrees to invest. Eight months later, Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation. In order for Jamie to sue Lauren for fraud, all the following must be true except A) Jamie trusted and relied on Lauren's representation of the business financial operation. B) Jamie found Lauren dishonest because she does not always reconcile the business cash account on a timely basis. C) Jamie has suffered a substantial loss in her investment because of Lauren's deception. D) Jamie's decision to invest was primarily based on Lauren's assertion that she had prior floral retail experience. 47) A set of unauthorized computer instructions in an otherwise properly functioning program is known as a A) spyware. B) trap door. C) Trojan horse. D) logic bomb. 48) The organization chart for Renata Corporation includes a controller and an information processing manager, both of whom report to the vice president of finance. Which of the following would be a control weakness? A) Periodically rotating assignment of application processing among machine operators, who all report to the information processing manager B) Assigning the programming and operating of the computer system to an independent control group which reports to the controller C) Providing for review and distribution of system-generated reports by an independent control group which reports to the controller D) Providing for maintenance of input data controls by an independent control group which reports to the controller 49) This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination. A) Internet protocol B) transmission control protocol C) packet switching protocol D) access control list 50) A company wants to store information about inventory including quantities, prices, cost, photos, and social media reviews. What type of data repository should be used? A) Data warehouse B) Data swamp C) Data lake D) Data mart 33) Which of the options below are important components of effective data storytelling? A) Consider the audience. B) Remembering the question that initiated the analytics process. C) Use data visualizations. D) All of the above. 34) For most companies, what data structure typically holds the most to the least amount of data? A) Data warehouse, data mart, data lake B) Data lake, data mart, data warehouse C) Data warehouse, data lake, data mart D) Data lake, data warehouse, data mart 35) Which technique would assist in estimating the number of violated attribute dependency issues in a dataset of 4 million records? A) Visual inspection B) Basic statistical tests. C) Auditing a sample. D) Advanced testing techniques. 36) An update log file contains the following information: Login Old. Name Old.Phone Old City New.Name New.Phone New.City UpdateTimeStamp 15 Steve 212 834 Brooklyn Steven 212 834- NJ 01/21/22 07:02:09 Gleason 2345 Gleason 12345 UTC 16 Mabel 315 332 Morristown Mabel Lee 315 332 Camden 01/21/22 07:02:29 Zurich 3833 3833 UTC 17 Juan 646 257- Bronx Juan 646 257 Long Jan. 21 2022 Moroni 7455 Moroni 7455 Island 07:03:02 UTC For LogID 16 which of the following data structure issues are present? A) Data parsing. B) Cryptic data values. C) Misfielded values. D) Data consistency. E) Data concatenation 37) A company visualizes how employee happiness changes each quarter. What is the purpose of this type of viz? A) Comparison B) Correlation C) Distribution D) Trend Evaluation 38) Select all that apply. Which of the following techniques will increase an object's visual weight? A) Size: using smaller items. B) Color: using more saturated and darker colors. C) Goldilocks principle: presenting just the right amount of data. D) Density: presenting items close together. 39) Insiders are frequently the ones who commit fraud because A) they need money more than outsiders. B) they are less likely to get caught than outsiders. C) they know more about the system and its weaknesses than outsiders. D) they are more dishonest than outsiders. 40) Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called A) piggybacking. B) hijacking. C) pretexting. D) vishing. 41) A document that shows all projects that must be completed and the related IT needs in order to achieve long-range company goals is known as a A) performance evaluation. B) strategic master plan. C) project development plan. D) data processing schedule. 42) The process of maintaining a table listing all established connections between the organization's computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as A) deep packet inspection B) access control list. C) packet filtering. D) access control matrix 43) An analytic that answers the question "what happened?" is an example of which type of analytic? A) Descriptive analytic B) Diagnostic analytic C) Predictive analytic D) Prescriptive analytic 44) Incentive programs were introduced to sales staff to decrease the amount of time spent on each order. This incentive program is likely to increase which type of error? A) Data threshold values. B) Data imputation. C) Data input. D) Violated attribute dependency. E) Data de-duplication. 45) A vice president in the organization believes that employees working in cubicles will not perform better if they use augmented reality headsets. Her expectation that augmented reality headsets will not improve performance is an example of which of the following? A) Hypothesis stated in the alternative form. B) Hypothesis stated in the null form. A type I error. D) A type Il error. 46) Lauren wants to open a floral shop in a downtown business district. She doesn't have funds enough to purchase inventory and pay six months' rent up front. Lauren approaches a good friend, Jamie, to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business. After a lengthy discussion, Jamie agrees to invest. Eight months later, Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation. In order for Jamie to sue Lauren for fraud, all the following must be true except A) Jamie trusted and relied on Lauren's representation of the business financial operation. B) Jamie found Lauren dishonest because she does not always reconcile the business cash account on a timely basis. C) Jamie has suffered a substantial loss in her investment because of Lauren's deception. D) Jamie's decision to invest was primarily based on Lauren's assertion that she had prior floral retail experience. 47) A set of unauthorized computer instructions in an otherwise properly functioning program is known as a A) spyware. B) trap door. C) Trojan horse. D) logic bomb. 48) The organization chart for Renata Corporation includes a controller and an information processing manager, both of whom report to the vice president of finance. Which of the following would be a control weakness? A) Periodically rotating assignment of application processing among machine operators, who all report to the information processing manager B) Assigning the programming and operating of the computer system to an independent control group which reports to the controller C) Providing for review and distribution of system-generated reports by an independent control group which reports to the controller D) Providing for maintenance of input data controls by an independent control group which reports to the controller 49) This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination. A) Internet protocol B) transmission control protocol C) packet switching protocol D) access control list 50) A company wants to store information about inventory including quantities, prices, cost, photos, and social media reviews. What type of data repository should be used? A) Data warehouse B) Data swamp C) Data lake D) Data mart
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started