Tuesday, December 31, 2019

Benefits Of Genetically Modified Organisms - 1199 Words

Introduction Genetically modified organisms come to be through genetic engineering where their genetic material is artificially altered in a laboratory to suit certain specifications. Genetic engineering is a new technology which gives rise to unstable animals, bacteria, and plants which are not naturally occurring and do not come into being through the normal crossbreeding methods as other traditional crops. Virtually every genetically modified crop produced commercially are made in such a way that they can produce their own insecticides and can withstand the application of herbicides directly. Some arguments have been put forth to oppose the biotech industry claims that these genetically modified organisms produce a higher yield than†¦show more content†¦As a result, there is controversy regarding the right of the consumer to be informed about the product that they are purchasing. Even in countries where it is mandatory to label GMOs, the risk of consumer choice violation is posed by c ontamination and cross-pollination which can render traditional foods not entirely so. Genetic engineering has also been associated with health risks (Nelson, 2001). This is because the process can render some foods which were at some point safe to consume hazardous to those consumers with allergies. The process of genetic engineering cannot be entirely predictable, and foreign substances can develop in these genetically modified foods. This is a fact that is known to the FDA as it does some testing of the final product (Ahmed, 2004). However, there can be no guarantees as to the purity of these genetically modified foods. Besides, introducing new genes to animals and plants can result in the already existing genes to react in a certain way that can include changes in the quality of the organism and reduction of the organism’s nutritional value. Other viewpoints have been brought forth to oppose the production of GMOs such as the arguments that these organisms give rise to ecological risks, upsets the natural balance, hence posing a danger to biodiversity, and t hat suggesting that genetic engineering is a tool for the corporate to control agriculture (Ahmed, 2004).

Monday, December 23, 2019

Leadership For A Company Leadership - 2280 Words

Running Head: LEADERSHIP FOR A COMPANY 1 Leadership For a Company Sarah Hickman Ashford University Leadership in the business world is the art of outfitting the vitality and endeavors of leading people so that their standpoint is progressed from terrible to great, moderate to quick, between which procedure, Leadership shows in anticipating your skills in a way that picks up the certainty of others. Qualities of a leader Here is the things that leadership professionals consider to be qualities that make up a decent leader for the organization: 1. Honesty. Continuously do the genuine thing. It makes representatives feel like they know where they remain with you at all times. 2. Focus. Know where you re going†¦show more content†¦New pioneers fall flat when they attempt to end up all things to all individuals, or attempt to do a lot out of their zone of incredibleness. Clarity offers you some assistance with saying yes to the right things - and no to others. 3. Care. The most grounded, best pioneers I ve met think about the business, as well as about the general population in it and the general population affected by it. Additionally, they indicate they mind through their words and activities, notwithstanding demonstrating how they administer to themselves and their family by taking unplugged relaxes and proceeding with their own particular expert advancement. Consideration shouldn t be a four-letter word in our work environment today - and the best pioneers know it. How the leader should behave during recruiting process 1. Integrity. They are individuals who are regarded and worth listening to. I find as a rule because of the majority of the monetary challenges, representatives organize and look for pioneers and associations that are straightforward and meet their responsibilities. 2. Compassion. An excess of pioneers nowadays deal with the monetary record, generally to the detriment of their representatives and long haul client connections. Capable individuals need to work for pioneers and associations that really think about their representatives and the groups in which they work. 3. Shared vision and actions. Individuals create genuine businessShow MoreRelatedThe Leadership Of A Company1180 Words   |  5 PagesVarious stakeholder groups may possess the power to impact the success of a company. This is why it’s extremely important for business leaders to consider the company’s stakeholders during the decision making process, and to fully understand how a decision may impact the stakeholder’s value in the company. A stakeholder’s value is defined differently amongst the various stakeholder groups, and will depend upon what they are willing to sacrifice in the pursuit of the value they seek. For example,Read MoreLeadership and Company Essay3482 Words   |  14 Pagesselect the paragraph, and on the Tools menu click Word Count. Critical Thinking Assignment Cliffside Holding Company of Massapequa (CHCM) is a company that has been run for over 50 years. This company has compiled and thought of a bigger plan to help the company in its growth to help the company become more successful in the future years. An idea was proposed to start a leadership education course for the junior executives so that they may grow in to higher position. A memo was created by theRead MoreThe Leadership Of The Sandwich Company1678 Words   |  7 Pagesmodern leadership theories (hereafter, theories) recognise the importance of followers in the leadership process. These theories view leadership as an interaction between leaders and follower. They focus on the relationship between a leader and follower and view this relationship as the core to the success of any organisation. Kirsty’s leadership may be seen as reflective of all the path-goal theory, leader-member exchange theory (hereafter, LMX theory) and the transformational leadership theoryRead MoreLe adership Is The Capacity Of A Company3045 Words   |  13 Pages Leadership has nothing to do with seniority or one’s position in the hierarchy of a company. Too many talk about a company’s leadership referring to the senior most executives in the organization. They are just that, senior executives. Leadership doesn’t automatically happen when you reach a certain pay grade. Peter Drucker: â€Å"The only definition of a leader is someone who has followers.† Warren Bennis: â€Å"Leadership is the capacity to translate vision into reality.† Bill Gates: â€Å"As we look aheadRead MoreLeadership Style Of The Company Essay1986 Words   |  8 Pages Most companies and organizations have members of their senior executives that take on more than their role as an executive but are also the organizational leader for the company. They are the type of person that works to mold the company into the image that they want for it by being a role model for the behaviors and characteristics that will help achieve organizational goals. Leadership styles are different, and many of the best leaders have their own unique style that they use to inspire othersRead MoreLeadership Style Of A New Company1314 Words   |  6 PagesWhen a new executive or manager takes charge of an existing company it is common for them to inherit a business that is established but encountering lack luster performance because of the lack of leadership or the wrong style of leadership. The leader is the most significant role within an organization that drives the success or failure of the company. Their own particular leadership style may produce positive results or hamper productivity. No two leaders are alike and no two employees are exactlyRead MoreCommunication And Leadership Skills For A Company789 Words   |  4 PagesFor a company to operate effectively, they must have great communication and leadership skills. In order to do so, the company must invest in group training and development to improve the communication between the workers. Being able to use the proper communication channels, feedback, as well as being open in communications will enhance those skills in the workplace. Communication in Leadership Communication is necessary in any organization. A simple definition is sharing information with otherRead MoreCompany History And Top Leadership1111 Words   |  5 Pages Company History and Top Leadership â€Å"Our mission is to inspire and nurture the human spirit – one person, one cup, and one neighborhood at a time† (â€Å"Company Information, 2015). Starbucks’ mission statement exemplifies their ambition to ensure that each customer has an individualized experience when they enter into their coffeehouse. Starbucks was founded in 1971 and opened their first location in Seattle’s Pike Place Market (â€Å"Company Information,† 2015). Although the company’s website did notRead MoreCreative Leadership in a Company Essay1365 Words   |  6 Pageseffective leadership helps to defend their country and at the same time extend national boundaries. In these days leadership makes a business company successful, allows a non-profitmaking organizations to achieve its mission. Thus, every company, organization and, of course, countries have a leaders, who decied wht is the best for them company, employees and etc. Furthermore, „The absence of leadership is equally dramatic in its effectsâ€Å". (D. Quinn Mills, 2005) Due to, without leadership companies, organizationsRead MoreLeadership Of A Company Defines Strategy797 Words   |  4 PagesWhen a company defines strategy, its leaders determine the path or roadmap for achieving its goals. According to Collis and Rukstad (2008), the strategy is conveying the essence of carefully designed choices for an operational level efficiency and a competitive game plan. According to SNHU (2015), a company defines its current goals in a mission statement as well as defined in its vision, what it hopes to become. A stated mission of a company is why it exists, and its core values are what the company

Sunday, December 15, 2019

Unethical Free Essays

Unethical Research Arnuang Bullie RES/351 Jeff Duncan November 9, 2012 In this paper I will try and discuss the unethical business research conduct that has resulted in individuals or a firm being convicted, or at least tried for, this conduct. Some questions will be what were the inappropriate questions, what were the research results, and who was involved in the maintaining of the participants’ confidential information, and were there any acts involving the use of participant information for unintended purposes such as selling goods or services. What unethical research behavior was involved? The company I have researched is DynCorp. We will write a custom essay sample on Unethical or any similar topic only for you Order Now There was an article on this company earlier this year about DynCorp and Sex trafficking. DynCorp is a Private Military Company who gets paid by governments to protect areas, and is likely to take on the same roles as soldiers. Many times these companies are looked at lightly and not really researched. * Who were the injured parties? While working in Bosnia middle aged men were having sex with 12-15 year old children, and sold them to each other as slaves. According to the Racketeer Influenced Corrupt Organization Act (RICO) lawsuit filed in Texas on behalf of a former DynCorp aircraft mechanic, â€Å"in the latter part of 1999 Johnston learned that employees and supervisors from DynCorp were engaging in perverse, illegal and inhumane behavior [and] were purchasing illegal weapons, women, forged passports and [participating in other immoral acts. Johnston witnessed coworkers and supervisors literally buying and selling women for their own personal enjoyment, and employees would brag about the various ages and talents of the individual slaves they had purchased† (O’Meara, 2002). How has the unethical behavior affected the organization, the individual, and society? In the summer of 2005, the United States Defense department drafted a proposal to prohibit defense contractor involvement in human trafficking for forced prostitution and labor. Several defense contractors, among others, DynCorp, stalled the establishment of a fi nal proposal that would formally prohibit defense contractor involvement in these activities. On June 2, 2000, members of the 48th Military Police Detachment conducted a sting on the DynCorp hangar at Comanche Base Camp, one of two U. S. bases in Bosnia, and all DynCorp personnel were detained for questioning. (O’Meara, 2002). * How could the unethical behavior be avoided or resolved? Since these allegations were raised more than a decade ago, the Company has changed ownership and leadership; developed a strict Code of Ethics and Business Conduct, which includes a zero tolerance policy on human trafficking; created the position of Chief Compliance Officer; introduced global training programs; and has taken a number of steps to ensure a compliant, ethical, successful workplace. It is both good and commendable that DynCorp has taken steps since those days to ensure such things never happen again (Isenberg, 2012). These situations are hard to know if they are going to happen but, by putting the strict Code of Ethics and Business Conduct in place should help regulate what else goes on. References Isenberg, D. (2012, February 10). The DynCorp â€Å"See no Evil† Monkey. Huffington Post, p. . O’Meara, K. P. (2002, January). US: DynCorp Disgrace. Insight Magazine, (). How to cite Unethical, Essay examples

Saturday, December 7, 2019

Good CSR Practices Samples for Students †MyAssignmenthelp.com

Question: Discuss about the Good CSR Practices. Answer: Introduction The report is based on the good corporate social responsibility practices that are conducted by every company for the welfare of society. CSR (Corporate Social Responsibility) is a form of corporate self-regulation combined into a business model. The examples related to the good practice are presented in the report which might include demonstrations of environmental, responsibility, good governance practice and ethical or community-oriented behaviors (Tai Chuang, 2014). Examples of the companies with good CSR practices: Google The worlds most popular search engine company Google is also one of the companies who perform the good corporate social responsibility practice. The company has made some of the aggressive moves on the multiple fronts towards the good citizenship. Some of the examples of companys efforts are Google Green. Google Green is one of the corporate effort to generate the awareness regarding the efficient use of resources and to support renewable power. Apart from this, the company is working effectively so that they can reduce its carbon footprint and make their products safe and better for the environment of the society (Moreno, 2015). The company provides the facilitating green commuting to decrease the energy use at their data centers to recycling old equipment. The company inspects the each and every part of their business with an environmental lens. Xerox Xerox Corporation is one of the American global corporations that sell digital document and print along with the document technology products in approximately more than 160 countries. A well-known leading printing giant Xerox provides many such programs that support the corporate social responsibility. The community involvement program encourages welfare of society by involving the employees was introduces by company (Vertigans Idowu, 2017). Since the year 1974, approximately million of employees participated in the program initiated by the company. The company earmarked over $1.3 million to facilitate the 13,000 employees to contribute to the community-focused causes in the year 2013 (Moreno, 2015). The company got the acknowledgment from the community but along with this the company also got the support from their employees. Xerox Company is involved in various CSR initiatives from the Green World Alliance to contribution in the Electronic Industry Citizen Coalition. TOMS shoes TOMS is one of the companies which are not well known in the market but the charity work done by the company is impressive. The company came into the existence with the idea of giving back. TOMS corporate social responsibility practice is towards the needs of the children that is essential for society. After selling every pair of shoes the company donates the pair of shoes to a child who needs it. This initiate shows the caring attitude of the company towards the kids and now the current vision of the company is care for kids. The company has already donated more than 10 million pairs of shoes to the kids. The company keeps launching new initiatives after acknowledging the problems faced by the communities across the world (Espenson, 2014). For instance; TOMS Eyewear helped 400,000 people to restore the eyesight by providing them eyewear treatment. TOMS Roasting Co. offered more than 335,000 weeks of fresh and safe water in almost 6 countries. Along with this TOMS, bag collection is providing the support to the pregnant women for safe delivery. For this approach, the company is providing training for skilled birth attendants and distributing birth kits containing items (Al-Bender, 2017). Ben Jerrys The company came into existence in the year 1985 by Ben Cohen and Jerry Greenfield. Since its foundation company is focused towards the corporate social responsibility and they were also aware of the fact of connecting the employees with the company. To accomplish the goals associated with the CSR practice the company created Ben Jerry foundation". The company decided to give 7.5% of its pretax profits to the charitable organization across the world. Ben Jerry always presented its deep respect for the human being irrespective they are working for a company or not. Due to this, the company donated approximately 2 million dollar to a different organization with the motive that this amount will create the positive impact on the society (Murray, 2015). Currently, the foundation awards more than $1.8 million every year to fund community action, sustainability, social change, and some other initiatives in the home state and around the world. BMW BMW is a German multinational company which currently manufactures automobiles and motorcycles. The company established in the year 1916 and has its headquarters in Munich, Bavaria. BMW grasps the pride of being one of the most socially responsible companys within the industry. The company has set the goal of helping more than one million people by the year 2020. To accomplish the goal the company has the plan to form programs like The Schools Environmental Education Development as this program help to generate the social and environmental issues. The key success of the CSR of BMW is the alignment and the balance of the company between a good business model and the social causes (ArAs, 2016). The company has already finished 100 years in the business and along with that, the company is successful in maintaining sustainability index. Overall, the aspect of the company's operations is social responsibility program of the company which consists of education, wellness, inter-cultural und erstanding as a key tenet of an obligation to the stable economic development and social peace. Conclusion It can be concluded from the report that there are numerous companies who like to bring changes in the society and for that, these companies take the responsibility to bring the welfare of the society. The report reflects the details related to the examples of companies who understand their responsibility towards the society due to which they initiate different programs for the welfare. Bibliography Al-Bender, I. (2017). 10 Examples of exemplary CSR initiatives. Retrieved February 14, 2018, from https://www.prezly.com/academy/relationships/csr/10-examples-of-exemplary-csr-initiatives ArAs, G. (2016). A handbook of corporate governance and social responsibility. CRC Press. Espenson, A. (2014). 5 Companies Doing Corporate Social Responsibility Right. Retrieved February 14, 2018, from https://www.business2community.com/social-business/5-companies-corporate-social-responsibility-right-0951534 Moreno, C. (2015). Doing Their Part: 3 Excellent Examples of Corporate Social Responsibility. Retrieved February 14, 2018, from https://www.autodesk.com/redshift/doing-their-part-3-excellent-examples-of-corporate-social-responsibility/ Murray, J. (2015). Ben Jerry's Struggles with Corporate Social Responsibility in an International Context. Journal of Legal Studies Education, 32(2), 287-312. Tai, F. M., Chuang, S. H. (2014). Corporate Social Responsibility. Ibusiness, 6(03), 117. Vertigans, S., Idowu, S. O. (2017). Corporate Social Responsibility . Springer International Publishing.

Friday, November 29, 2019

Take Off That Mask Essays - English-language Films, Boxing Films

Take Off That Mask Take Off That Mask As sad as it seem first impressions often dictate the way people feel about one another. In most cases the way a person looks doesn't at all reflect on their personality. This stigma of the way a person looks goes far beyond being pretty and ugly. All to often people are assumed mentally retarded because of a facial deformity when in fact that person is as able or in many cases more then able to perform and task they are asked to perform. Ironically in this modern society where such stigmas exist, some movies are able change our thinking if not remove the stigmas altogether. The film Mask is a perfect example. This movie shows the stigmas for what they are and at the same time changes our impression of facial deformity. This movie enables anyone who views it look at a person and see them for who they are and not what they look like. The film Mask we see the story of Rocky Denis, played by Eric Stoltz, is a teenage boy dealing with the effects of craniodiaphyseal dysplasia. Craniodiaphyseal Dysplasia also known as Lionitis, is a life shortening disease that causes calcium to accumulate in the skull. The calcium make the head grow to twice the normal size. Rocky obviously does not look like the average teenager. This is an observation we can see right away. Outside of the way Rocky looks his lifestyle is also slightly different from most teens. His mother Rusty, played by Cher, is affiliated with a gang of bikers. She drinks and uses drugs, and although she seems to try and hide these things from Rocky he is well aware of what his mother is doing. The movie is quick to bring some of the stigmas about Rocky's disorder to our attention. In two scenes we see how people outside of Rocky's immediate family treat his disorder. First we see how the principal of the local public junior high school views Rocky. He tells Rocky and Rusty that, ?There are special schools for children like Rocky,? the principal upon looking at Rocky immediately thinks he is mentally retarded. Rusty shows him this is far from the truth by giving the principal his grades from lower levels of schooling. She then threatens to sue the school if he does not enroll Rocky. Rocky shows the principal a thing or two when he goes on to graduate with awards for excellence in almost every academic subject. The principal also shows Rocky a little surprise when he offers him a job at a summer camp for blind children. The second scene is particularly disturbing because it takes place in a hospital. In this scene a doctor that is not familiar with Rocky's case tries to explain to Rocky and Rusty the unfortunate truth of his life expectancy. Rocky and Rusty deal with the situation by pretty much brushing off everything the young doctor says. The reason this scene is disturbing is because the doctor inadvertently makes himself no better then a common person misjudging Rocky. The one place you would think Rocky can be free from these stigmas seems to be worse then the outside world when a doctor gives off the emotions of a person seeing Rocky for the first time. The film again captures the view of Rocky's face and the first impression people have when Rocky goes to his first day of school. At the junior high school the students see him and make their impression and Rocky carries on as he always has. The students seem to overlook the fact that a biker from the gang dropped Rocky off at the school. In most junior high schools a student that is dropped off by a biker would get the full attention of bystanders. In this case all they notice is Rocky's facial deformity. As time passes the students like the principal accept Rocky for who he is. The acceptance of ?who he is? is a very important theme that constantly comes up in the movie. At one point Rocky gets in an argument with his mother in which he asks her ?Don't you get it, it's girls

Monday, November 25, 2019

buy custom Typhoons essay

buy custom Typhoons essay This is a research report on Typhoons. The researcher attempted to find out the mechanism by which typhoon occur, effects of typhoons and effectiveness of human activities in response to typhoons. He used both primary and secondary sources to collect data. These included interviews, questionnaires, and documented materials. The finding revealed that three mechanisms are responsible for the formation and development of typhoons. These includes is monsoon troughs, Tropical Upper Tropospheric Trough (TUTT), and a font. Effects of typhoons include heavy rains, storms, strong winds, and tornadoes, which lead to deaths and destruction of the environment. The researcher also found out that typhoons are predictable. People receive warnings prior to typhoon occurrence. Introduction Typhoons develop in Northwestern area of Pacific Ocean. A typhoon can be defined as a tropical cyclone, which is mature that occurs between 180 degrees and 100 degrees East of the Pacific Ocean. Official seasons for Typhoons have not been identified as the clones form all year round. Six conditions must be fulfilled, for Typhoon to form and develop. The sea surface temperatures ought to be warm and sufficient. There must be instability of the atmospheric conditions. The troposphere must have high humidity at the middle and lower levels. Coriolis force is also a requirement for low-pressure centre to develop. There must be pre-existing disturbance of low level, and finally, there must be wind shear at lower vertical (Sharkov, 2000, p. 67). Most of the storms occur in June and November. They are at their minimum around May and December. The most affected countries by Typhoon include Philippines, China, and Japan. The deadliest typhoons usually occur in China, especially Southern China. The wettest typhoon occurred in Taiwan. The researcher, therefore, decided to carry out a research regarding Typhoons to determine how they occur, their impact, and the effectiveness of human resource response to such events. Methodology The researcher carried out his research between April and June 2011 to determine typhoon types, their effects, and effectiveness of human response. He used both secondary and primary methods of data collection. Under primary source of data, the researcher used interviews and questionnaires, which included questions of interest. He then administered them to Philippines who witnessed the recent Philippine Typhoon. These included six men and four women who answered the interview questions and who filled in the questionnaires. He ensured that he remained within the scope, to avoid irrelevant data. Secondary sources included documented data from Typhoon Research Department. Other sources included geography textbook, newspapers, Journals, and the internet. He compared the data from the various sources. These sources gave the researcher relevant data, which he later analyzed to help him make a research report (Dineen, 2006, p. 87). Results The researcher was able to collect data using the two main methods; primary and secondary data collection. Primary sources helped the researcher to obtain data regarding the occurrence of typhoons and its effects. Effects included heavy rains, strong winds, tornadoes and large storms. All these would lead to deaths of both human beings and animals. Plants are destroyed leading to famine afterwards. Secondary sources showed that typhoons occur through three main mechanisms. These included monsoon trough, Tropical Upper Tropospheric Trough, and fonts. Six preconditions must also be fulfilled, for a typhoon to form and develop. Typhoon research department was most helpful in giving this information. Textbooks, journal and other sources gave information regarding the effects of typhoons and human activities in response to typhoons. The researcher found out those typhoons can be predicted and that warnings come 18-24 hours before their occurrence. Citizens get advice on how to behave in case a typhoon occurs. The researcher was also able to identify the countries, commonly affected by typhoons. These included Philippines, Japan, and China. Discussion Formation mechanism The researcher found that certain preconditions must be fulfilled for Typhoon formation. First, the sea surface temperatures ought to be warm and sufficient. There must be instability of the atmospheric conditions. The troposphere must have high humidity at the middle and lower levels. Coriolis force is also a requirement for low-pressure centre to develop. There must be pre-existing disturbance of low level, and finally, there must be wind shear at lower vertical. If the above preconditions happen, typhoon occurs. The most common mechanism of atmospheric disturbance is monsoon trough. This refers to Inter Tropical Convergence Zone (ITCZ) extension after the formation of cyclonic. ITCZ refers to low pressure trough, which occurs when Southeast and Northeast trade winds converge (Jakob Hungr, 2005, p. 91). Tropical Upper Tropospheric Trough (TUTT) is yet another cause for the formation of Typhoon. The upper air is low according to nature, as compared to the surrounding environment. The low-pressure starts at the low level when it is warm compared to the surrounding environment. When the low Tropical Upper Tropospheric Trough remains for several days over the seawater, it warms up, and it gets the characteristics of tropical. Once this happens, it gets down to the water surface and typhoon forms and develops. The other cause of typhoon formation and development is a front. A font comes over the tropical waters. Storms and showers occur when favorable winds and wind shear occur, bringing a typhoon. Monsoon trough, however, cause most typhoons in the Pacific Ocean (Davis, 2008, p. 79). Effects of typhoons Typhoons bring destructive impacts such as heavy rains, large storms, tornadoes, and strong winds. Human beings also are killed, lost or injured when typhoon occurr. Flooding can drown people. It also sweeps away property and destroys houses. The strong winds and heavy rains destroy crops. At the same time, they cause soil erosion. Mudslides also occur which can be destructive. This leads to shortage of food, lack of medical care, limited access to infrastructure, among other effects. Typhoons also affect animals in that they get drowned. The environment destruction leaves animals with nothing to feed on, hence death. The smaller animals disappear, and the large animals die of hunger. When houses are destroyed, animals suffer since they will have nobody to take care of them. Animals become exposed to strong winds and heavy rains, which are destructive (Dineen, 2006, p. 64). Effectiveness of human activities in response to typhoons Typhoons are natural disasters. Human being, however, need to take precautions to avoid severe destruction. At least people are lucky because typhoons are predictable. The department of Typhoon research can predetermine occurrence of a Typhoon. This helps people prepare both physically and psychologically. People should keep the windows and doors closed throughout when there is a typhoon/ hurricane. Typhoon specialists say that the difference in pressure between the room and outside the room cannot make the house blow out. Scientists announce warnings between 18- 24 hours. People living around the sea should, therefore, evacuate their houses as a safety measure. People ought to ensure that the water mains remain off after an aftermath of a typhoon. This is so because the water pressure becomes interfered with and another disaster could occur in the houses. It is also advisable to shift from the ground floor in case one cannot shift entirely. Nowadays, houses are being built in such a way that they can stand the strong winds and rains. All these human measures to tackle to typhoon issue prove to be quite effective though not in all situations. It is, therefore, crucial that people follow these precautions to prevent devastating effects of typhoons/ hurricanes (Hsieh, 2000, p. 71). Conclusion Typhoon form and develop in the Northeastern part of the Pacific Ocean. The strong ones occur in June and November. Three mechanisms exist that lead to the formation of typhoon. The first one is monsoon troughs, Tropical Upper Tropospheric Trough (TUTT), and a font. However, these occur after the preconditions for the formation of typhoons. Typhoons cause strong winds, heavy rains, tornadoes, and heavy storms. These, in turn, affect human being, animals, as well as plants. Deaths occur since people and animals get swept away by the strong winds and rains. Plants die and soil erosion occurs, which further leads to future calamities due to lack of food and vegetation. Human beings perform a number of activities to prevent the devastating effects of typhoons. Warnings come prior to the occurrence of typhoons, and people get advice on how to behave; the areas to avoid, and the expectations thereafter. This prepares them physically and psychologically (Murnane, 2004, p. 56). Buy custom Typhoons essay

Friday, November 22, 2019

Characteristics of Anthroponyms

Viktoriya Melnychuk; Khmelnyts’kyi regional MAN department; Shepetivka educational complex #1; form 11; Tarnavska Olena Myhaylivna, the candidate of philological sciences, associate professor of department of English philology of the Volynskiy national university named after Lesia Ukrainka. The purpose  of this paper  is to analyze anthroponyms, their semantic, social pragmatic and functional characteristics of  anthroponyms (based on the novel  John Updike  Ã¢â‚¬Å"The Centaur†). The full communication, that is correct perception, evaluation and interpretation of information, is impossible without knowing the specific set of anthroponyms and their functions in language and text. The names of famous personalities, literature characters make up a significant part of knowledge, necessary for understanding and assessment of the culture different people. Therefore, our research is relevant. The subject of the research is semantic, social pragmatic and functional characteristics of  anthroponyms (based on the novel  John Updike  Ã¢â‚¬Å"The Centaur†). Anthroponomastics  , a branch of  onomastics, is the study of  anthroponyms  , the names of  human beings. Anthroponyms often preserve lexical elements that have dropped out of the standard  lexicon  of a  language. The subdivisions of anthroponymy include: given names, surnames, clan names, matronyms, patronyms, teknonyms, nicknames, ethnonyms. Allusion is the main feature of the anthroponyms. Allusion is a brief reference to some to some literary or historical event commonly known. Allusion is a subtype of metaphor. Metaphor denotes expressing remaining on the basis of similarity of two objects: the real object of speech and the one whose name is actually used. But there is only affinity, no real connection between the two. Most of anthroponyms in the novel John Updike â€Å"The Centaur† are the individual, which expressed their own names, surnames, status names and perform the nominative function.

Wednesday, November 20, 2019

The Hunger Games Essay Example | Topics and Well Written Essays - 1000 words

The Hunger Games - Essay Example The young characters have been depicted as heroes and heroines when some of them are seen reflecting on happier moments in the past, a good example being the main character, Katniss. This essay will critically analyze the book, giving a breakdown of the main ideas found in each of the chapters. In the first chapter, the author introduces Katniss Everdeen, the narrator and the main character. The teenage girl sets out on a gathering and hunting expedition with her friend Gale as they await for the reaping in the afternoon. Katniss has been forced to take part in a fighting tournament against other teenagers. The government has forced children to fight each other to death on TV, the winner taking home prizes. The fights are usually broadcasted to the entire world. Katniss does not enjoy the fights, but she kills with a lot of professionalism and finesse, just to stay alive. From the story in the book, it can be analytically noted that the author has used Katniss to show a transformatio n from a difficult life to one where she experiences pleasure. Katniss lived a life that was full of poverty and suffering. Due to her efforts in hunting and gathering, she used her skills to later enjoy her life by experiencing pleasures which she never knew of before. These pleasures include pretty clothes, food and warmth. However, it is important to note that the author has not in any way depicted sexual pleasure. This shows that the book is very chaste and non-erotic, making it very appropriate for its target audience, young adults (Grossman 1). The story also focuses on the life of a teenage girl who gets stung to death by a mutant swarm of hornets. The author has used violence in a very hypnotic way, unlike other books on violence which tend to be very repellent. This is because violence has been used amidst a fairy tale, making the book very unique. The violence is not merely a cheap thrill. It is something deeper in the sense that the author condemns violence and the action s that take place in the arena but invites readers to enjoy the violence that has been narrated in the story (Sperling 1). ‘The Hunger Games’ exposes children readers to the violence against which society tries so hard to shield them. The author uses this strategy to show adults that they should not forget their experiences as children. They wanted to enjoy the same things against which they are shielding the children. The author supports the fact that children are not stupid, and they are physical creatures. This makes them aware of the fact that violence raw emotions, power and violence exist. The author is really saddened by the fact that adults choose to pretend that these things are not in existence and that children should not know about them (Grossman 1). The book is a bloody, horrifying and chilling one because of the violence depicted through the actions of the characters. The author shows a lot of bloodshed and ruthless killing, especially among children. The setting of ‘The Hunger Games’ is an unspecified time in the future, where such violence seems to be the order of the day (Grossman 1). This shows just how bad the author thinks things will be for humanity in the future. The world that the author has depicted is one whereby a ruling caste dominates the people. In the story, this ruling caste lives in a city known as Capitol (Sperling 1). The rest of the vulnerable population that is being dominated by

Monday, November 18, 2019

(Critical Analysis) Essay Example | Topics and Well Written Essays - 750 words

(Critical Analysis) - Essay Example She goes to the extent of looting to ensure that her sick brother gets daily medicine for his survival. The film shows some religious institutions, such as church, and they way they help suffering neighbors and members. Good neighbors, like Madea and Pastor Brian, take the responsibility of taking care of these young children by giving them food and ensuring they find their relatives in town. One of the relatives is the woman named April, who is the children’s aunty. She is a nightclub singer and an alcohol addict living with a married man who has ran away from the responsibility of taking care of his family. At the end of the film, she transforms from her past lifestyle into a loving and caring aunty and later gets married to Sandino; an immigrant who she accommodated in her basement. According to IMBd website, the film, cast actors and actress have been nominated and won several awards. Some of the awards include Bet Awards, Black Reel Awards and Image Awards in 2010. For ex ample, in 2010, Adams Rodriguez (Sandino in the film) won the Image Awards under â€Å"the Outstanding Character in a Motion Picture.† The film can be classified into three theories of communication namely inclusion, need for control and need for affection. The theory of inclusion applies in this film where Sandino a middle aged immigrant in search of work and a place to settle in a foreign country approaches church leaders for help. The church leader requests April to accommodate him, she allows her to stay in the basement. Sandino fits well in this theory as he seeks to be liked and loved by Jennifer and her little brothers. He goes to the extent of buying them the syringes and medicine for Jennifer’s younger brother. Jennifer wonders why he is concerned and good to them; according to her the world is unfair and presents a tough face to all the people in it. Sandino fights to be loved by all; April included, as he repairs one of the rooms and ensures that everything is in place for the comfort of the young ones. At the end, he comes out to defend Jennifer as he was about of be raped by April’s boy friend. Sandino makes April to transform her past behavior of mistreating her niece and nephews and addiction to alcohol. Sandino ends up to be loved by all in April’s family and church members, who end up organizing a nice wedding between him and April. The theory of need for control is also found in this film. One of the funny characters in this film is Madea, who is firm, in control and wants to be recognized as one in charge of the activities going on in her house and that of anyone she comes in contact with. The film introduces Madea from on set. She wakes up after Jennifer and her brothers try to loot her house. She firmly disrupts her husband’s sleep, she show her power of control when she invites Jennifer and her brothers to have a meal with them. She wants them to refer to her as ‘madam’ whenever they answer her questions. She shows the control in her by driving the children to April’s house. She orders one of them to knock the door as loud as he can until April wakes up. Madea commands April to take her niece and nephews, which she accepts without further argument. Although Madea may be seen as controlling freak, Jennifer goes to her to figure out how to pray. Though she did not understand the Biblical stories, she agreed to teach Jennifer. She extended her generosity by advising her how she could manage all her

Saturday, November 16, 2019

Analysis and Review of Andrew Niccols Film Gattaca Essay Example for Free

Analysis and Review of Andrew Niccols Film Gattaca Essay Man has already landed on the moon, and Sputnik has enabled research on other solar planets. Lives have become healthier, longer, with modern hygiene, sanitation, medicine, and surgery, conquering more physical and mental illnesses by the month. Science has also presented a means of cloning and genetically modifying organisms and food, and shows little to slow it’s pace of evolution. I belonged to a new underclass, no longer determined by social status or the color of your skin. No, we now have discrimination down to a science. Vincent Gattaca, directed by Andrew Niccol, gives a perspective of what the future of discrimination is to evolve into: no longer determined by skin color, gender, or social status, but scientific DNA. The civilization portrayed is a discriminatory one, in which status and quality of lifestyle is determined solely by a DNA profile. Children are created by DNA manipulation to produce an impeccable genetic composition, with parents able to buy whatever traits are deemed fanciable for their child. The movie hypothesizes this as a potential practice in the not too distant future, as one where technology’s influence in everyday life is at peak. True or False? It is impossible for our society to become like the one in the movie, ‘Gattaca’, because we don’t have the technology or the capacity to discriminate that way. This essay will argue false, that it is possible that our society is able to become that of Gattaca (sterile, genetically enhanced, and derogatory) although it’s morality is questionable in regards to pros and cons, due to various reasons such as the development of genetic engineering and IVF babies, as well as examples of genetic discrimination in the past presented. * * Recently scientists have made rapid advances in our knowledge of the human genome, as well as our abilities to modify genes. Nowadays, society is able to determine the gender of their child, just like that of Gattaca. An example of an advanced reproductive technique endorsed by society is the InVitro Fertilization (IVF), in which eggs are fertilized with sperm in test tubes to allow parents to reduce the chance of gen etic disorder in the child – with the world’s first IVF child Louise Brown turning 30 this Friday 25th. Parents are now able to choose the type of sperm that will fertilize an egg, which determines the gender and genes of the baby, and allow Pre-Implantation Genetic Diagnosis (PGD) to screen embryos for potential disease. â€Å"We might see a move towards artificial chromosomes and genetic cassettes that can be inserted at the embryonic stage to correct particular diseases, including Huntington’s†, wrote Prof. Trounsen in the scientific journal nature. One day we may be able to choose cosmetic or desirable characteristics and cure genetic diseases, just like we can modify embryos and undergo surgery to change eye color successfully today. * * Make the child perfect in the test tube, and save money in the future, is a testimonial presented in Gattaca. The current technology of society is quite competent, especially in regards to future development. In essence, genetic engineering may be defined as the manipulation or alteration of the genetic structure of a cell or organis m in medical, industrial, and agricultural fields. It has enabled the successful cloning of Dolly (1996 – 2003) the sheep by Ian Wilmut using a cell from a mammary gland, which is a revolutionary example of the windows opened due to genetic engineering; a hint at what the future could bring. In fact, the successful cloning of many animals (including CC the kitten, Idaho the colt, and Snuppy the dog) will most certainly one day evolve into human gene manipulation at birth; due to this the foundation of Gattaca as humans artificially perfected is theoretically possible. * * * The main character, Vincent (Ethan Hawke) is discriminated against due to his ‘in-valid’ genetic makeup; he doesn’t have a chance in the society of Gattaca because potential employees were not tested for skills or knowledge, rather, their physical and mental possibilities. This form of discrimination refers to treatment or consideration based on genetic status or category, rather than individual merit, and occurs when employers/insurance companies treat people differently because they have a gene ‘mutation’. Many examples in the past depicting this theory include a 1995 survey of people with a known genetic condition in family history found that 22% quoted being denied health insurance due to genetic status, regardless of whether they were already sick. Another case of genetic discrimination is Terri Seargent’s, who, having Alpha-1 antitrypsin deficiency, was abruptly fired after her employer received a bill for preventive treatment, despite having consistently referred to her job performance as exemplary. Furthermore, if society didn’t have the capability to discriminate genetically, the Genetic Information Nondiscrimination Act (2008) would need not be introduced. To the question of lacking the capacity to discriminate this way, it is justifiable to conclude that society is capable of such derogatory action. * * In conclusion, the genetically modified world presented in Gattaca is possible due to competent and developing technology in the fields of genetic engineering. Scientific advances like the IVF baby and successful cloning techniques have huge implications for future human reproductive technology: genetic diseases such as Huntington’s could be corrected using artificial chromosomes, and the production of replacement organs from a person’s cells made a reality. In addition, we are also capable of genetic discrimination, as is consistent with Gattacan society.

Thursday, November 14, 2019

The Epidemic of Steroid Abuse in America Essay -- Athletic Athletes Sp

The Epidemic of Steroid Abuse in America We as a people are preoccupied with the notion of greatness. Our role models are athletes, actors and actresses, and other figures in the public eye. Many of us often desire to be better off than our current state; to look better, to be in better shape, etc†¦ We compete with each other for jobs, for mates, for grades, for parking spots, and in sporting activities. This competitive nature is a way of life, especially in sporting activities, often learned as a child and built upon throughout adulthood. But where do you draw the line? At what point do the â€Å"costs† of winning or being â€Å"better† outweigh the benefits? Maybe it’s too much when you start putting your own health in serious jeopardy just to look better or run faster. The use of steroids, other than for medical purposes, has extremely negative effects on one’s health. Nonetheless the use of steroids, to enhance athletic performance and increase muscle mass, is on the rise. There needs to be mandatory steroid testing in all professional, and where applicable, amateur sports. Steroid testing is a good as start as any to help curb steroid abuse. Anabolic-Androgenic steroids, often solely called anabolic steroids, are: â€Å"chemicals that act like hormones--substances normally in your body that regulate bodily functions† (Kowalski 1). They are synthetic substances, meaning man-made, which have two functions: the anabolic effect which causes an increase in the growth of muscle mass and the androgenic effect which causes, or increases, the development of male sexual characteristics. It’s the anobolic effect that most steroid users, or abusers, are after. Steroid abusers take steroids for a couple of different reasons.... ...pac.library.csupomona.edu/>. Sherman, William. â€Å"Growing Nightmare of Steroid Abuse: Athletes’ Cocktail Big in Nation’sGyms.† Daily News (New York). 28 July 2002, Sports Final ed.: p. 4. Lexis Nexis 4 Nov. 2002. . United States. Consumer Affairs, Tourism and Foreign Commerce Subcommittee of the Senate Commerce, Science and Transportation Committee. Hearing. Washington D.C.: Senate Office Building, 2002. Lexis Nexis 4 Nov. 2002. . Verducci, Tom. â€Å"Totally Juiced.† Sports Illustrated. 3 June 2002, V. 26: No. 93. Wilson Web Article Index 4 Nov. 2002. . Yesalis, Charles E., and Virginia S. Cowart. The Steroids Game. Illinois: Human Kinetics, 1998.

Monday, November 11, 2019

Drm Exma Ii

Chapter 6 1. Which of the following is a purpose of the SQL standard? A)To specify syntax and semantics of SQL data definition and manipulation B)To specify minimal and complete standards, which permit different degrees of adoption in products C)To define the data structures and basic operations for SQL databases D)All of the above Answer: D Level: ModeratePage Ref: 312 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 2. The benefits of a standardized relational language include: A)application longevity. B)reduced training costs. C)cross-system communication.D)All of the above Answer: D Level: ModeratePage Ref: 313 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 3. The _____ is the structure that contains descriptions of objects such as tables and views created by users. A)SQL B)schema C)catalog D)master view Answer: B Level: EasyPage Ref: 314 Topic: The SQL Environment AACSB Use of Information Technology, Ana lytic Skills 4. _____ is a set of commands used to control a database, which includes security. A)DML B)DDL C)DCL D)DPL Answer: C Level: EasyPage Ref:315 Topic: The SQL Environment AACSB Use of Information Technology . _____ is a set of commands used to update and query a database. A)DML B)DDL C)DCL D)DPL Answer: A Level: EasyPage Ref: 315 Topic: The SQL Environment AACSB Use of Information Technology 6. DDL is typically used during which phases of the development process? A)Implementation B)Physical design C)Analysis D)All of the above Answer: B Level: DifficultPage Ref: 314, 315 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 7. The SQL command _____ defines a logical table from one or more tables or views. A)create table B)alter table C)create view D)create relationshipAnswer: C Level: EasyPage Ref:319 Topic: Defining A Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology 8. Any create command may be rev ersed by using a ________ command. A)truncate B)drop C)delete D)unpack Answer: B Level: EasyPage Ref: 319 Topic: Defining a Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology, Analytic Skills 9. The first in a series of steps to follow when creating a table is to: A)identify columns that must be unique. B)identify each attribute and its characteristics. C)create an index.D)identify columns that must be null. Answer: B Level: ModeratePage Ref: 319 Topic: Defining a Database in SQL Subtopic: Creating Tables AACSB Use of Information Technology, Analytic Skills 10. The SQL command _____ adds one or more new columns to a table. A)create table B)alter table C)create view D)create relationship Answer: B Level: EasyPage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology, Analytic Skills 11. What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A) Alters the Customer_T table to accept Type 2 VarcharsB)Alters the Customer_T table to be a Type 2 Varchar C)Alters the Customer_T table, and adds a field called â€Å"Type† D)Alters the Customer_T table by adding a 2-byte field called â€Å"Varchar† Answer: C Level: ModeratePage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology 12. What does the following SQL statement do? Delete from Customer_T where state = ‘HI’; A)Deletes all records from customer_t where the state is equal to HI B)Removes the customer_t table from the database C)Deletes all records from the customer_t table D)None of the aboveAnswer: A Level: ModeratePage Ref: 326 Topic: Inserting, Updating, and Deleting Data Subtopic: Deleting Database Contents AACSB Use of Information Technology, Analytic Skills 13. What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A)Changes the price of a unit called Product_T to 7 B)Changes the unit price of Product 7 to 775 C)Changes the length of the Unit_Price field to 775 D)Updates the Product_T table to have a unit price of 775 Answer: B Level: ModeratePage Ref: 327 Topic: Inserting, Updating, and Deleting Data Subtopic: Updating Database ContentsAACSB Use of Information Technology, Analytic Skills 14. Which of the following is a technique for optimizing the internal performance of the relational data model? A)Avoiding indexes on secondary keys B)Clustering data C)Not reporting statistics to save machine resources D)Using random index organizations Answer: B Level: ModeratePage Ref: 327 Topic: Internal Schema Definitions in RDBMSs AACSB Use of Information Technology 15. Indexes are created in most RDBMSs to: A)provide a quicker way to store data. B)decrease the amount of disk space utilized. C)provide rapid random and sequential access to base-table data.D)increase the cost of implementation. Answer: C Level: ModeratePage Ref: 328 Topic: Internal Schema Definition in RDBMSs Subtopic: Creating Indexes AACSB Use of Information Technology 16. In an SQL statement, which of the following parts states the conditions for row selection? A)Select B)From C)Where D)Group By Answer: C Level: EasyPage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 17. What does the following SQL statement do? Select * From Customer Where Cust_Type = â€Å"Best†A)Selects all the fields from the Customer table for each row with a customer labeled â€Å"best† B)Selects the â€Å"*† field from the Customer table for each row with a customer labeled â€Å"best† C)Selects fields with a â€Å"*† in them from the Customer table D)Selects all the fields from the Customer table for each row with a customer labeled â€Å"*† Answer: A Level: ModeratePage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 18. What result will the following SQL statement produce? Select Avg(standard_price) as average from product_v;A)The average of all products in product_v B)The average standard_price of all products in product_v C)The average price of all products D)None of the above Answer: B Level: ModeratePage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 19. Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A)How many products are in the Product Table? B)How many products have product descriptions in the Product Table? C)How many characters are in the field name â€Å"Product_Description†?D)How many different columns named â€Å"product Description† are there in table Product_T? Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: U sing Functions AACSB Use of Information Technology, Analytic Skills 20. What results will be produced by the following SQL query? Select sum(standard_price) as total_price from product_v where product_type = ‘WOOD’; A)The total price of all products that are of type wood B)The total price of all products C)The standard_price of the first wood product in the table D)The standard_price of any wood product in the table Answer: A Level: DifficultPage Ref: 331Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 21. Which of the following counts ONLY rows that contain a value? A)Count B)Count(*) C)Tally(*) D)Checknum Answer: A Level: ModeratePage Ref: 331,332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 22. Which of the following will produce the minimum of all standard prices? A)Select standard_price from product_v where standard_price = min; B)Select min(standard_price) from product_v; C)Select standard_price from min(product_v);D)Select min(standard_price) from product_v where standard_price = min(standard_price); Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 23. What will result from the following SQL Select statement? Select min(product_description) from product_v; A)The minimum value of product_description will be displayed. B)An error message will be generated. C)The first product description alphabetically in product_v will be shown. D)None of the above. Answer: C Level: DifficultPage Ref: 331, 332 Topic: Processing Single TablesSubtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 24. Which of the following is the wildcard operator in SQL statements? A) B) * C) = D) & Answer: B Level: EasyPage Ref: 332, 333 Topic: Processing Single Tables Subtopic: Using Wildcards AACSB Use of Information Technology, Analytic Skills 25. What result set will the following query return? Select item_no from order_v where quantity > 10; A)The item_no of all orders that had more than 10 items B)The order_id of all orders that had more than one item C)The order_id of all orders that had more than 10 itemsD)The item_no of all orders that had 10 or more items Answer: A Level: ModeratePage Ref: 333 Topic: Processing Single Tables Subtopic: Using Comparison Operators AACSB Use of Information Technology, Analytic Skills 26. Which of the following is true about the SQL statement? Select * From Product Where Quantity = 1 Or Quantity = 2; A)All fields will be selected from the Product table for products that have a quantity of 1. B)All fields will be selected from the Product table for products that have a quantity of only 2. C)All fields will be selected from the Product table for products that have a quantity of 1 or 2.D)None of the above. Answer: C Level: ModeratePage Ref: 333-336 Topic: Proces sing Single Tables Subtopic: Using Boolean Operators AACSB Use of Information Technology, Analytic Skills 27. What result set will the following query return? Select item_no, description from item where weight > 100 and weight < 200; A)The item_no and description for all items weighing less than 100 B)The item_no for all items weighing between 101 and 199 C)The item_no and description for all items weighing between 101 and 199 D)The item_no for all items weighing more than 200 Answer: C Level: ModeratePage Ref: 336, 337Topic: Processing Single Tables Subtopic: Using Ranges for Qualification AACSB Use of Information Technology, Analytic Skills 28. To eliminate duplicate rows in a query, the _____ qualifier is used in the SQL Select command. A)alter B)distinct C)check D)specific Answer: B Level: EasyPage Ref: 337, 338 Topic: Processing Single Tables Subtopic: Using Distinct Values AACSB Use of Information Technology 29. What result set is returned from the following query? Select cust omer_name, telephone from customers where city in (‘Boston’,’New York’,’Denver’); A)The customer_name and telephone of all customersB)The customer_name and telephone of all customers living in either Boston, New York or Denver C)The customer_name and telephone of all customers living in Boston and New York and Denver D)The customer_name of all customers living in Boston, New York or Denver Answer: B Level: ModeratePage Ref: 339 Topic: Processing Single Tables Subtopic: IN and NOT IN with Lists AACSB Use of Information Technology, Analytic Skills 30. To get all the customers from Hawaii sorted together, which of the following would be used? A)Order By B)Group By C)Having D)Sort Answer: A Level: EasyPage Ref: 339, 340 Topic: Processing Single TablesSubtopic: Sorting Results: The ORDER BY Clause AACSB Use of Information Technology, Analytic Skills 31. A single value returned from an SQL query that includes an aggregate function is called a(n): A )agate. B)scalar aggregate. C)vector aggregate. D)summation. Answer: B Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 32. Multiple values returned from an SQL query that includes an aggregate function are called: A)vector aggregates. B)scalar aggregates. C)agates. D)summations. Answer: A Level: EasyPage Ref: 340, 341Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 33. Which of the following can produce scalar and vector aggregates? A)Order By B)Group By C)Having D)Sort Answer: B Level: ModeratePage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 34. What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries gr oup by driver_no; A)A listing of all drivers, sorted by driver numberB)A listing of each driver as well as the number of deliveries that he or she has made C)A count of all of the deliveries made by all drivers D)None of the above Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 35. What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = ‘MA’ group by driver_no; A)A listing of all drivers who made deliveries to state = ‘MA’, sorted by driver number.B)A listing of each driver who made deliveries to state = ‘MA as well as the number of deliveries that each driver has made to that state. C)A count of all of the deliveries made to state = ‘MA’ by all drivers. D)None of the above. Answer: B Difficulty: DifficultPage Ref: 3 40, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 36. Which of the following finds all groups meeting stated conditions? A)Select B)Where C)Having D)Find Answer: C Level: EasyPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 37. What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2; A)A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B)A listing of all drivers C)A listing of the number of deliveries greater than 2 D)A listing of all drivers who made more than 2 deliveries Answer: A Level: DifficultPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 38. Which of the following is true of the order in which SQL statements are evaluated? A)The select clause is always processed first. B)The select clause is always processed last. C)The select clause is processed before the order by clause. D)The group by clause is processed before the where clause. Answer: C Level: DifficultPage Ref: 329 Topic: Processing Single Tables AACSB Use of Information Technology 39. A _______________ view is materialized when referenced. A)virtual B)dynamic C)materialized D)base Answer: BLevel: ModeratePage Ref: 342 Topic: Using and Defining Views AACSB Use of Information Technology 40. A view may not be updated directly iF it contains: A)the distinct keyword. B)derived columns and expressions in the select clause. C)uses the group by or having clause. D)all of the above. Answer: D Level: EasyPage Ref: 345 Topic: Using and Defining Views AACSB Use of Information Technology Chapter 7 1. A join operation: A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view.D) is used to combine indexing operations. Answer: B Level: EasyPage Ref: 358 Topic: Processing Multiple Tables AACSB Use of Information Technology 2. A join in which the joining condition is based on equality between values in the common columns is called a(n): E) equi-join. F) uni-lateral join. G) natural join. H) both A and C. Answer: D Level: EasyPage Ref: 358 Topic: Processing Multiple Tables Subtopic: Equi-join AACSB Use of Information Technology 3. A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): I) equi-join.J) natural join. K) multivariate join. L) inner join. Answer: B Level: EasyPage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 4. The most common ly used form of join operation is the: M) outer join. N) union join. O) equi-join. P) natural join. Answer: D Level: ModeratePage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 5. A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): Q) natural join. R) equi-join. S) outer join. T) union join. Answer: CLevel: EasyPage Ref: 361 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 6. In which of the following situations would one have to use an outer join in order to obtain the desired results? U) A report is desired that lists all customers who placed an order. V) A report is desired that lists all customers and the total of their orders. W) A report is desired that lists all customers, the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). X) There is never a situation that requires only an outer join.Answer: C Level: DifficultPage Ref: 361,362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology, Analytic Skills 7. One major advantage of the outer join is that: Y) information is easily accessible. Z) information is not lost. [) the query is easier to write. ) All of the above. Answer: B Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 8. A type of join implemented in SQL-1999 and by extension SQL-2003 that returns all of the data from each table that is joined is called a(n): ]) outer join. ^) inner join. ) union join. `) intersect join. Answer: C Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Union Join AACSB Use of Information Technology 9. A type of query that is placed within a WHERE or HAVING clause of another query is called a: a) master query. b) subquery. c) sup erquery. d) multi-query. Answer: B Level: EasyPage Ref: 340 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 10. _________ takes a value of true if a subquery returns an intermediate results table which contains one or more rows. e) In f) Having g) Exists h) Extents Answer: CLevel: ModeratePage Ref: 367 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 11. In SQL, a _____________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. i) correlated j) paired k) natural l) inner Answer: A Level: ModeratePage Ref: 368 Topic: Processing Multiple Tables Subtopic: Correlated Subqueries AACSB Use of Information Technology 12. A ______________ ____________ is a temporary table used in the FROM clause of an SQL query. m) correlated subquery n) derived table o) view table p) None of the above. Answer: BLevel: ModeratePage Ref: 369 Topic: Processing Multiple Tabl es Subtopic: Using Derived Tables AACSB Use of Information Technology 13. The UNION clause is used to: q) combine the output from multiple queries into a single result table. r) join two tables together to form one table. s) find all rows that do not match in two tables. t) None of the above. Answer: A Level: EasyPage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 14. In order for two queries to be UNION-compatible, they must: u) both have the same number of lines in their SQL statements. ) both output compatible data types for each column and return the same number of rows. w) both return at least one row. x) All of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 15. Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: y) using the if-then-else construct. z) using the immediate if stat ement. {) using the CASE keyword in a statement. |) using a subquery. Answer: C Level: ModeratePage Ref: 372 Topic: Processing Multiple Tables Subtopic: Conditional ExpressionsAACSB Use of Information Technology 16. Explicit commands to manage transactions are needed when: }) a transaction consists of just one SQL command. ~) multiple SQL commands must be run as part of a transaction. ) autocommit is set to off. ) None of the above. Answer: B Level: DifficultPage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 17. User-defined transactions can improve system performance because: ) transactions are processed as sets, reducing system overhead. ) transactions are mapped to SQL statements. ) speed is improved due to query optimization. ) All of the above.Answer: A Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 18. An interactive command that can be used to dynamically control a user session for a ppropriate integrity measures is: ) rollback. ) rollforward. ) set autocommit. ) expunge. Answer: C Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology, Analytic Skills 19. If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? ) dba_tab_privs ) dba_tab_comments ) dba_table_label ) dba_tables Answer: DLevel: ModeratePage Ref: 378 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 20. What results would the following SQL statement produce? select owner, table_name from dba_tables where table_name = ‘CUSTOMER’; ) A listing of all customers in the customer table ) A listing of the owner of the customer table ) A listing of the owner of the customer table as well as customers ) An error message Answer: B Level: ModeratePage Ref: 379 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 21. User-de fined data types: ) can be a subclass of a standard type. can behave as an object. ) can have defined functions and methods. ) can have all of the above. Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL AACSB Use of Information Technology 22. A new set of analytical functions added in SQL:200n are referred to as: ) OLAF Functions ) MOLAP Functions ) Average Functions ) OLAP Functions Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology 23. RANK and DENSE-RANK are examples of: ) Ceilings ) Door Functions ) Window Functions ) Moving FunctionsAnswer: C Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology, Analytic Skills 24. All of the following are new data types added in SQL:200n EXCEPT: ) BIGINT ) BIT ) MULTISET ) XML Answer: B Level: ModeratePa ge Ref: 381 Topic: SQL: 2003 Enhancements and Extensions to SQL Subtopic: New Data Types AACSB Use of Information Technology, Analytic Skills 25. The MERGE command: ) Allows one to combine the INSERT and UPDATE operations ) Allows one to combine the INSERT and DELETE operations ) Joins 2 tables together None of the above. Answer: A Level: ModeratePage Ref: 382 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Other Enhancements AACSB Use of Information Technology, Analytic Skills 26. Extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions are called: ) stored procedures. ) Persistent Stored Modules. ) flow control modules. ) None of the above. Answer: B Level: ModeratePage Ref: 383 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Programming Extensions AACSB Use of Information Technology 27.A named set of SQL statements that are considered when a data modification occurs a re called: ) stored procedures. ) treatments. ) triggers. ) trapdoors. Answer: C Level: EasyPage Ref: 384 Topic: Triggers and Routines AACSB Use of Information Technology 28. While triggers run automatically, ______________ do not and have to be called. ) trapdoors ) routines ) selects ) updates Answer: B Level: ModeratePage Ref: 386 Topic: Triggers and Routines AACSB Use of Information Technology 29. SQL-invoked routines can be: ) procedures. ) functions. ) All of the above. ) None of the above. Answer: C Level: EasyPage Ref: 386Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 30. All of the following are advantages of SQL-invoked routines EXCEPT: ) flexibility. ) efficiency. ) sharability. ) security. Answer: D Level: ModeratePage Ref: 387 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 31. A procedure is: ) stored within the database. ) given a unique name. ) called by name. ) All of the above. Answer: D Level : ModeratePage Ref: 387, 388 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 32. Embedded SQL consists of: hard-coded SQL statements included in a program written in another language. ) SQL encapsulated inside of other SQL statements. ) SQL written into a front-end application. ) SQL translated to a lower-level language. Answer: A and C are both plausible answers. Level: EasyPage Ref: 389 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 33. In order to embed SQL inside of another language, the ________ _______ statement must be placed before the SQL in the host language. ) GET SQL ) EXEC SQL ) RUN SQL ) SQL SQL Answer: B Level: ModeratePage Ref: 390 Topic: Embedded SQL and Dynamic SQLAACSB Use of Information Technology, Analytic Skills 34. Dynamic SQL: ) is used to generate appropriate SQL code on the fly, as an application is processing. ) is quite volatile. ) is not used widely on the Internet. ) creates a less flexible ap plication. Answer: A Level: EasyPage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 35. On-line transaction processing is: ) A system used for reporting only. ) A system used in transaction-oriented applications that involves real-time processing of SQL transactions. ) A set of tools that provides users with a graphical view of data. ) None of the above.Answer: B Level: EasyPage Ref: 391 Topic: OLAP SQL AACSB Use of Information Technology 36. OLAP systems differ from OLTP systems in several ways except: ) Size ) Processing ) Queries ) Physical Storage Answer: B Level: EasyPage Ref: 392 Topic: OLAP SQL AACSB Use of Information Technology Chapter 8 1. Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace? A)GUI evolutions B)Networking advances C)Communication changes D)All of the above. Answer: D Level: ModeratePage Ref: 403 Topic: Introduction AACSB Use of Information Technolog y 2.Which of the following is a component of processing logic? A)Input B)Output C)Retrieval D)Business rules Answer: D Level: EasyPage Ref: 404 Topic: Client/Server Architectures AACSB Use of Information Technology 3. A device that manages file operations and is shared by each client PC on a LAN is called a: A)file server. B)file processor. C)database server. D)fat client. Answer: A Level: EasyPage Ref: 405 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 4. In a file server architecture, which of the following is performed by a client? A)Provides significant LAN trafficB)File storage C)User interface processing D)All of the above. Answer: C Level: ModeratePage Ref: 404 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 5. Which of the following is true about file servers on a LAN? A)Each client must devote memory to a full version of its DBMS. B)Not much data movement i s generated. C)The DBMS copy has little responsibility. D)Application programmers need little knowledge about DBMSs. Answer: A Level: ModeratePage Ref: 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology . Which of the following is NOT a limitation to using file servers on local area networks? A)Considerable data movement is generated across the network. B)Each client workstation must devote memory to a full version of the DBMS. C)Stored procedures can be run on the file server. D)The DBMS copy in each workstation must manage the shared database integrity. Answer: C Level: ModeratePage Ref: 405, 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 7. A(n) _____ is a module of code written in SQL or some proprietary language to run business rules on a server.A)SQL program B)select module C)select procedure D)stored procedure Answer: D Level: EasyPage Ref: 407 Topic: Cl ient/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 8. Which of the following is an advantage of stored procedures? A)Data integrity improves when fewer applications access the procedure. B)The layers get cleaner. C)Stored procedures result in fatter clients. D)Performance improves for compiled SQL statements. Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 9.Which of the following is not a disadvantage of stored procedures? A)Writing stored procedures takes more time than writing an application in Visual Basic or PowerBuilder. B)Decreases in network traffic are realized. C)Stored procedures are proprietary and not easy to move from one RDBMS to another. D)Each client must be loaded with the application to be used at that location. Answer: B Level: ModeratePage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Archite ctures AACSB Use of Information Technology 10. A PC configured to handle user interface with little or no local storage is called a: A)server.B)fat client. C)thin client. D)workstation. Answer: C Level: EasyPage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 11. Which of the following is true about three-tier architectures? A)Less scalable than two-tier B)Increased risk C)More technological flexibility D)All of the above Answer: C Level: ModeratePage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 12. _____ is the process of assigning pieces of application code to clients or servers. A)Application partitioning B)Modularizing programs C)Code distribution D)Program breakup Answer: A Level: EasyPage Ref: 410Topic: Partitioning an Application AACSB Use of Information Technology 13. Which of the following is not a common distribution logic for two-tiered server environments: A)Fat Client B)Tall Client C)Thin Client D)Distributed Answer: A Level: ModeratePage Ref: 411 Topic: Partitioning an Application AACSB Use of Information Technology 14. Which of the following is true of mainframes in the client/server environment? A)Managers have a difficult time moving between platforms. B)Supporting distributed environments is easier than mainframe support. C)Migrating from mainframes to client/server is a relatively simple process.D)All of the above. Answer: A Level: ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 15. Moving mission critical applications to client/server environments is likely to cause serious problems in the transition from the pilot phase to production unless: A)Developers rewrite all code for the system. B)Brand new hardware is purchased. C)Developers anticipate scalability issues and address them as they develop code D)None of the above. Answer: C Level; ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 16. ____ is any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A)User interface enhancers B)Middleware C)Interface managers D)MPP Answer: B Level: EasyPage Ref: 413 Topic: Using Middleware AACSB Use of Information Technology 17. Which of the following does not connect applications to databases over networks? A)Asynchronous RPC middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)SMP Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 18.Which of the following could send and receive email, while the client works on other things? A)ORBs middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)MOM Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 19. Microsoft’s Transaction Server and IBM’s CICS are examples of: A)Asynchronous Remote Procedure Call (RPC) B)Synch ronous RPC C)MOM D)ORB Answer: B Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 20. ______________ makes it possible for applications to send objects and request services in an object-oriented system.A)MOM B)RPC C)ORB D)API Answer: C Level: EasyPage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 21. A(n) _____ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system. A)API B)MOM C)RPC D)LAN Answer: A Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 22. Which of the following is true of moving to client/server environments? A)Functionality must be delivered all at once. B)There are no hidden costs. C)Services can be placed appropriately. D)None of the above. Answer: C Level: EasyPage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 23. Which of the following is NOT a benefit of moving to cli ent/server environments? A)Functionality can be delivered in stages to end users. B)Business process reengineering is facilitated. C)Network traffic and response times are increased. D)Users are encouraged to utilize the application’s functionality. Answer: C Level: ModeratePage Ref: 416, 417 Topic: Client/Server Issues AACSB Use of Information Technology 24. The most common bottleneck in a client/server environment is the: A)users B)software C)network D)company politics Answer: C Level: ModeratePage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 25. In order to establish client/server security: A)Network security must be established B)Biometric authentication must be used C)Server security must be established D)Both A and C Answer: D Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 26. Multi-tier make sense if all of the following environments except: A) More than 100 users B)High-volume transaction process ing C)Workgroups D)Real-time processing Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 27.Which of the following is not a parameter that must be specified in order to establish an ODBC connection? A)Specific ODBC driver needed B)Back-end server name to connect to C)JDK version D)Database name to connect to Answer: C Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 28. Which of the following is a distinguishing characteristic of Level-2 API capabilities? A)Send and receive partial results B)Call a translation library C)Commit or rollback transactions D)Prepare and execute SQL statements Answer: B Level: ModeratePage Ref: 417Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 29. An application programming interface that enables an application program to process RDBMS databases meets the: A)objec t linking and embedding standard. B)open database connectivity standard. C)multi-platform connectivity standard. D)open source standard. Answer: B Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 30. Which of the following parameters must be defined in order to establish an ODBC connection? A)ODBC driver B)Back-end server nameC)Database name to connect to D)All of the above Answer: D Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology. Analytic Skills 31. The ability to call a translation library is a distinguishing characteristic of: A)Core-API ODBC conformance. B)Level-1 API ODBC conformance. C)Level-2 API ODBC conformance. D)Level-3 API ODBC conformance. Answer: C Level: DifficultPage Ref: 418 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 32. JDBC is similar to ODBC EXCEPT: A)ODBC is language independent and JDBC is not.B)ODBC can be used to execute SQL queries on a server while JDBC does not have this capability. C)ODBC can run on multiple platforms, while JDBC is platform specific. D)None of the above. Answer: A Level: ModeratePage Ref: 385 Topic: Using JDBC to Link External Tables Stored on a Database Server AACSB Use of Information Technology, Analytic Skills Chapter 9 1. The analysis of summarized data to support decision making is called: A)operational processing. B)informational processing. C)artificial intelligence. D)data scrubbing. Answer: B Level: EasyPage Ref: 461 Topic: Introduction AACSB Use of Information Technology 2.The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is: A)subject-oriented. B)integrated. C)time-variant. D)nonvolatile. Answer: A Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology 3. Wh en we consider data in the data warehouse to be time-variant, we mean: A)that the time of storage varies. B)data in the warehouse contain a time dimension so that they may be used to study trends and changes. C)that there is a time delay between when data are posted and when we report on the data. D)none of the above.Answer: B Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology, Analytic Skills 4. Which of the following advances in information systems contributed to the emergence of data warehousing? A)Improvements in database technology, particularly the relational data model B)Advances in computer hardware, especially affordable mass storage and parallel computer architectures C)Advances in middleware products that enabled enterprise database connectivity across heterogeneous platforms D)All of the above Answer: D Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data WarehousingSubtopic: A Brief History AACSB Use of Infor mation Technology 5. Which of the following factors drive the need for data warehousing? A)Businesses need an integrated view of company information. B)Informational data must be kept together with operational data. C)Data warehouses generally have better security. D)None of the above Answer: A Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: The Need for Data Warehousing AACSB Use of Information Technology 6. Which of the following organizational trends does not encourage the need for data warehousing? A)Multiple, nonsynchronized systemsB)Focus on customer relationship management C)Downsizing D)Focus on supplier relationship management Answer: C Level: ModeratePage Ref: 463–464 Topic: Basic Concepts of Data Warehousing Subtopic: Need for a Companywide View AACSB Use of Information Technology 7. Informational systems are designed for all of the following EXCEPT: A)running a business in real time. B)supporting decision making. C)complex queries. D)data mining. Answer: A Level: ModeratePage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 8.Operational and informational systems are generally separated because of which of the following factors? A)A data warehouse centralizes data that are scattered throughout disparate operational systems and makes them readily available for decision support applications. B)A properly designed data warehouse adds value to data by improving their quality and consistency. C)A separate data warehouse eliminates contention for resources that results when informational applications are confounded with operational processing. D)All of the above Answer: D Level: EasyPage Ref: 466 Topic: Basic Concepts of Data WarehousingSubtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 9. A data mart is a(n): A)enterprisewide data warehouse. B)smaller system built upon file processing technology. C)data warehouse that is limited in scope. D)generic on-line shopping site. Answer: C Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 10. One characteristic of independent data marts is complexity for end users when they need to access data in separate data marts.This complexity is caused by not only having to access data from separate databases, but also from: A)the possibility of a new generation of inconsistent data systems, the data marts themselves. B)lack of user training. C)denormalized data. D)incongruent data formats. Answer: A Level: DifficultPage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 11. All of the following are limitations of the independent data mart EXCEPT: A)separate extraction, transformation, and loading processes are developed for each data mart.B)data marts may not be consistent with one another. C)there is no capability to drill down into greater detail in other data marts. D)it is often more expedient to build a data mart than a data warehouse. Answer: D Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology, Reflective Thinking 12. A dependent data mart: A)is filled with data extracted directly from the operational system. B)is filled exclusively from the enterprise data warehouse with reconciled data.C)is dependent upon an operational system. D)participates in a relationship with an entity. Answer: B Level: ModeratePage Ref: 470 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 13. An operational data store (ODS) is a(n): A)place to store all unreconciled data. B)represen tation of the operational data. C)integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users.D)small-scale data mart. Answer: C Level: EasyPage Ref: 471 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 14. A logical data mart is a(n): A)data mart consisting of only logical data. B)data mart created by a relational view of a slightly denormalized data warehouse. C)integrated, subject-oriented, detailed database designed to serve operational users. D)centralized, integrated data warehouse. Answer: B Level: ModeratePage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 15. All of the following are unique characteristics of a logical data mart EXCEPT: A)logical data marts are not physically s eparate databases, but rather a relational view of a data warehouse. B)the data mart is always up-to-date since data in a view is created when the view is referenced. C)the process of creating a logical data mart is lengthy. D)data are moved into the data warehouse rather than a separate staging area. Answer: C Level: EasyPage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 16. The real-time data warehouse is characterized by which of the following? A)It accepts near-real time feeds of transaction data. B)Data are immediately transformed and loaded into the warehouse. C)It provides near-real-time access for the transaction processing systems to an enterprise data warehouse. D)All of the above Answer: D Level: EasyPage Ref: 473-474 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 7. Data that are detailed, current, and intended to be the single, authoritative source of all decision support applications are called _____ data. A)reconciled B)subject C)derived D)detailed Answer: A Level: EasyPage Ref: 475 Topic: Data Warehouse Architectures Subtopic: Three-Layer Data Architectures AACSB Use of Information Technology 18. A database action that results from a transaction is called a(n): A)transition. B)event. C)log entry. D)journal happening. Answer: B Level: EasyPage Ref: 476 Topic: Some Characteristics of Data Warehouse Data Subtopic: Status Versus Event DataAACSB Use of Information Technology, Analytic Skills 19. Data that are never physically altered once they are added to the store are called _____ data. A)transient B)override C)periodic D)complete Answer: C Level: EasyPage Ref: 477 Topic: Some Characteristics of Data Warehouse Data Subtopic: Transient Versus Periodic Data AACSB Use of Information Technology 20. Which of the following is an objective of derived data? A) Ease of use for decision support systems B)Faster response time for user queries C)Support data mining applications D)All of the above Answer: D Level: EasyPage Ref: 481Topic: The Derived Data Layer Subtopic: Characteristics of Derived Data AACSB Use of Information Technology 21. .A star schema contains both fact and _______ tables. A)narrative B)cross functional C)dimension D)starter Answer: C Level: ModeratePage Ref: 481 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 22. The level of detail in a fact table determined by the intersection of all the components of the primary key, including all foreign keys and any other primary key elements, is called the: A)span. B)grain. C)selection. D)aggregation. Answer: BLevel: EasyPage Ref: 485 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 23. Conformed dimensions allow users to do the following: A)share nonkey dimension data. B)query across fact tables with consistency. C)work on facts and business subjects for which all users have the same meaning. D)all of the above. Answer: D Level: ModeratePage Ref: 488-489 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 24. An expanded version of a star schema in which all of the tables are fully normalized is called a(n): A)snowflake schema.B)operational schema. C)DSS schema. D)complete schema. Answer: A Level: EasyPage Ref: 492 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 25. All of the following are ways to handle changing dimensions EXCEPT: A)overwrite the current value with the new value. B)for each dimension attribute that changes, create a current value field and as many old value fields as we wish. C)create a new dimension table row each time the dimension object changes. D)create a snowflake schema. Answer: D Level: ModeratePage Ref: 494 Topic: The Derived Data LayerSubtopic: The Star Schema AA CSB Use of Information Technology 26. The use of a set of graphical tools that provides users with multidimensional views of their data is called: A)on-line geometrical processing (OGP). B)drill-down analysis. C)on-line analytical processing (OLAP). D)on-line datacube processing (ODP). Answer: C Level: EasyPage Ref: 500 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 27. OLAP tools that use the database as a traditional relational database are called: A)ROLAP tools. B)MOLAP tools. C)slice and dice.D)none of the above. Answer: A Level: ModeratePage Ref: 500-501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 28. Rotating the view of a multidimensional database for a particular data point is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: D Level: ModeratePage Ref: 501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 29. Going from a summary view to progressively lower levels of detail is called data: A)cubing. B)drill-down. C)dicing.D)pivoting. Answer: B Level: ModeratePage Ref: 502 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 30. Which of the following data mining techniques identifies clusters of observations with similar characteristics? A)Case reasoning B)Rule discovery C)Clustering and signal processing D)Neural nets Answer: C Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 31. Which of the following data-mining techniques searches for patterns and correlations in large data sets?A)Case reasoning B)Rule discovery C)Signal processing D)Neural nets Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 32. Which of the following dat a mining applications identifies customers for promotional activity? A)Population profiling B)Target marketing C)Usage analysis D)Product affinity Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 33. Which of the following is true of data visualization?A)It is easier to observe trends and patterns in data. B)Correlations and clusters in data can be easily identified. C)It is often used in conjunction with data mining. D)All of the above. Answer: D Level: ModeratePage Ref: 503 Topic: The User Interface Subtopic: Data Visualization AACSB Use of Information Technology, Analytic Skills Chapter 10 1. High quality data are data that are A) Accurate B)Consistent C)Available in a timely fashion D)All of the above Answer: D Level: EasyPage Ref: 524 Topic: Managing Quality Data AACSB Use of Information Technology, Analytic Skills