1. What are the different processes used to analyze patterns, trends, and relationships in data mining?
Discuss the advantages and drawbacks of direct implementation.
What is utilitarianism and how is it different from natural laws and rights?
Mid-level decisions undertaken by managers by drawing upon business intelligence to implement marketing plans and product development are made at the tactical level.
Explicit knowledge can be documented and codified, whereas tacit knowledge encompasses insights, judgment, creative processes, and wisdom that come from learning through several trials and errors.
Which of the following should a project manager ideally do to efficiently manage a project?
commit to delivering features that stakeholders are expecting even if timelines are narrow
allow end-users to learn from their mistakes instead of hand-holding after launch
avoid making unpopular decisions that might dismay the sponsor or clients
communicate the time, cost, and scope constraints clearly as the project unfolds
In the week 3 Discussion Board, I shared a story about how one company used statistical analysis techniques to increase sales. That company was:
2 points (Extra Credit)
________ is a simulation model, often constructed using Excel, which calculates the relationships between many variables; users can change some variables to see how others are affected.
Goal seeking analysis
Market basket analysis
Which of the following is a feature of human capital?
It represents the knowledge that a company's customers have about its products.
It refers to the knowledge stored as documentation about patents, contracts, and policies.
It consists of competencies and knowledge possessed by an organization's employees.
It refers to the number and quality of all the relationships an organization's employees
Which of the following is a difference between the Internet and intranet?
The Internet relies on the TCP/IP suite, while intranets are protocol-independent.
The Internet can be accessed through web browsers, but intranets need specialized software to access.
The Internet supports multimedia and document formats unlike intranets.
The Internet is publicly accessible, while access to intranets is protected with passwords known to authorized individuals.
Discuss social engineering and explain why humans are soft targets for social engineers.
Discuss the three main types of intellectual capital.
The ________ phase is a technical blueprint for the whole system which captures all aspects of how a system's components will function together to accomplish goals, using descriptions and models.
What is artificial intelligence and how is it an integral part of the decision support system?
Which of the following is used to handle increased Web site visits?
new hard drives
extended hard drives
When a person tries to judge what action would create the greatest good for the greatest number, he or she is using a utilitarian scheme.
Which of the following is true of the triple constraint in projects?
The time constraint is the most critical of the three constraints in projects.
The three fundamentals that are known to constrain projects are insulated from each other.
Changes in one fundamental constraint force changes in the other constraints as well.
Cost constraints take precedence over time and scope constraints in all projects.
What does the Family Educational Rights and Privacy Act stipulate?
protecting privacy rights of European students outside the continent
establishing privacy rights over educational records
prohibiting educational institutes from sending misleading or deceptive commercial emails to prospective students
permitting transfer of private data to third parties to contribute toward educational processes
Discuss the differences between processes and project.
Which of the following would be an example of intellectual property owned by an IT firm?