Saturday, November 16, 2019
Analysis and Review of Andrew Niccols Film Gattaca Essay Example for Free
Analysis and Review of Andrew Niccols Film Gattaca Essay Man has already landed on the moon, and Sputnik has enabled research on other solar planets. Lives have become healthier, longer, with modern hygiene, sanitation, medicine, and surgery, conquering more physical and mental illnesses by the month. Science has also presented a means of cloning and genetically modifying organisms and food, and shows little to slow itââ¬â¢s pace of evolution. I belonged to a new underclass, no longer determined by social status or the color of your skin. No, we now have discrimination down to a science. Vincent Gattaca, directed by Andrew Niccol, gives a perspective of what the future of discrimination is to evolve into: no longer determined by skin color, gender, or social status, but scientific DNA. The civilization portrayed is a discriminatory one, in which status and quality of lifestyle is determined solely by a DNA profile. Children are created by DNA manipulation to produce an impeccable genetic composition, with parents able to buy whatever traits are deemed fanciable for their child. The movie hypothesizes this as a potential practice in the not too distant future, as one where technologyââ¬â¢s influence in everyday life is at peak. True or False? It is impossible for our society to become like the one in the movie, ââ¬ËGattacaââ¬â¢, because we donââ¬â¢t have the technology or the capacity to discriminate that way. This essay will argue false, that it is possible that our society is able to become that of Gattaca (sterile, genetically enhanced, and derogatory) although itââ¬â¢s morality is questionable in regards to pros and cons, due to various reasons such as the development of genetic engineering and IVF babies, as well as examples of genetic discrimination in the past presented. * * Recently scientists have made rapid advances in our knowledge of the human genome, as well as our abilities to modify genes. Nowadays, society is able to determine the gender of their child, just like that of Gattaca. An example of an advanced reproductive technique endorsed by society is the InVitro Fertilization (IVF), in which eggs are fertilized with sperm in test tubes to allow parents to reduce the chance of gen etic disorder in the child ââ¬â with the worldââ¬â¢s first IVF child Louise Brown turning 30 this Friday 25th. Parents are now able to choose the type of sperm that will fertilize an egg, which determines the gender and genes of the baby, and allow Pre-Implantation Genetic Diagnosis (PGD) to screen embryos for potential disease. ââ¬Å"We might see a move towards artificial chromosomes and genetic cassettes that can be inserted at the embryonic stage to correct particular diseases, including Huntingtonââ¬â¢sâ⬠, wrote Prof. Trounsen in the scientific journal nature. One day we may be able to choose cosmetic or desirable characteristics and cure genetic diseases, just like we can modify embryos and undergo surgery to change eye color successfully today. * * Make the child perfect in the test tube, and save money in the future, is a testimonial presented in Gattaca. The current technology of society is quite competent, especially in regards to future development. In essence, genetic engineering may be defined as the manipulation or alteration of the genetic structure of a cell or organis m in medical, industrial, and agricultural fields. It has enabled the successful cloning of Dolly (1996 ââ¬â 2003) the sheep by Ian Wilmut using a cell from a mammary gland, which is a revolutionary example of the windows opened due to genetic engineering; a hint at what the future could bring. In fact, the successful cloning of many animals (including CC the kitten, Idaho the colt, and Snuppy the dog) will most certainly one day evolve into human gene manipulation at birth; due to this the foundation of Gattaca as humans artificially perfected is theoretically possible. * * * The main character, Vincent (Ethan Hawke) is discriminated against due to his ââ¬Ëin-validââ¬â¢ genetic makeup; he doesnââ¬â¢t have a chance in the society of Gattaca because potential employees were not tested for skills or knowledge, rather, their physical and mental possibilities. This form of discrimination refers to treatment or consideration based on genetic status or category, rather than individual merit, and occurs when employers/insurance companies treat people differently because they have a gene ââ¬Ëmutationââ¬â¢. Many examples in the past depicting this theory include a 1995 survey of people with a known genetic condition in family history found that 22% quoted being denied health insurance due to genetic status, regardless of whether they were already sick. Another case of genetic discrimination is Terri Seargentââ¬â¢s, who, having Alpha-1 antitrypsin deficiency, was abruptly fired after her employer received a bill for preventive treatment, despite having consistently referred to her job performance as exemplary. Furthermore, if society didnââ¬â¢t have the capability to discriminate genetically, the Genetic Information Nondiscrimination Act (2008) would need not be introduced. To the question of lacking the capacity to discriminate this way, it is justifiable to conclude that society is capable of such derogatory action. * * In conclusion, the genetically modified world presented in Gattaca is possible due to competent and developing technology in the fields of genetic engineering. Scientific advances like the IVF baby and successful cloning techniques have huge implications for future human reproductive technology: genetic diseases such as Huntingtonââ¬â¢s could be corrected using artificial chromosomes, and the production of replacement organs from a personââ¬â¢s cells made a reality. In addition, we are also capable of genetic discrimination, as is consistent with Gattacan society.
Thursday, November 14, 2019
The Epidemic of Steroid Abuse in America Essay -- Athletic Athletes Sp
The Epidemic of Steroid Abuse in America We as a people are preoccupied with the notion of greatness. Our role models are athletes, actors and actresses, and other figures in the public eye. Many of us often desire to be better off than our current state; to look better, to be in better shape, etcâ⬠¦ We compete with each other for jobs, for mates, for grades, for parking spots, and in sporting activities. This competitive nature is a way of life, especially in sporting activities, often learned as a child and built upon throughout adulthood. But where do you draw the line? At what point do the ââ¬Å"costsâ⬠of winning or being ââ¬Å"betterâ⬠outweigh the benefits? Maybe itââ¬â¢s too much when you start putting your own health in serious jeopardy just to look better or run faster. The use of steroids, other than for medical purposes, has extremely negative effects on oneââ¬â¢s health. Nonetheless the use of steroids, to enhance athletic performance and increase muscle mass, is on the rise. There needs to be mandatory steroid testing in all professional, and where applicable, amateur sports. Steroid testing is a good as start as any to help curb steroid abuse. Anabolic-Androgenic steroids, often solely called anabolic steroids, are: ââ¬Å"chemicals that act like hormones--substances normally in your body that regulate bodily functionsâ⬠(Kowalski 1). They are synthetic substances, meaning man-made, which have two functions: the anabolic effect which causes an increase in the growth of muscle mass and the androgenic effect which causes, or increases, the development of male sexual characteristics. Itââ¬â¢s the anobolic effect that most steroid users, or abusers, are after. Steroid abusers take steroids for a couple of different reasons.... ...pac.library.csupomona.edu/>. Sherman, William. ââ¬Å"Growing Nightmare of Steroid Abuse: Athletesââ¬â¢ Cocktail Big in Nationââ¬â¢sGyms.â⬠Daily News (New York). 28 July 2002, Sports Final ed.: p. 4. Lexis Nexis 4 Nov. 2002. . United States. Consumer Affairs, Tourism and Foreign Commerce Subcommittee of the Senate Commerce, Science and Transportation Committee. Hearing. Washington D.C.: Senate Office Building, 2002. Lexis Nexis 4 Nov. 2002. . Verducci, Tom. ââ¬Å"Totally Juiced.â⬠Sports Illustrated. 3 June 2002, V. 26: No. 93. Wilson Web Article Index 4 Nov. 2002. . Yesalis, Charles E., and Virginia S. Cowart. The Steroids Game. Illinois: Human Kinetics, 1998.
Monday, November 11, 2019
Drm Exma Ii
Chapter 6 1. Which of the following is a purpose of the SQL standard? A)To specify syntax and semantics of SQL data definition and manipulation B)To specify minimal and complete standards, which permit different degrees of adoption in products C)To define the data structures and basic operations for SQL databases D)All of the above Answer: D Level: ModeratePage Ref: 312 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 2. The benefits of a standardized relational language include: A)application longevity. B)reduced training costs. C)cross-system communication.D)All of the above Answer: D Level: ModeratePage Ref: 313 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 3. The _____ is the structure that contains descriptions of objects such as tables and views created by users. A)SQL B)schema C)catalog D)master view Answer: B Level: EasyPage Ref: 314 Topic: The SQL Environment AACSB Use of Information Technology, Ana lytic Skills 4. _____ is a set of commands used to control a database, which includes security. A)DML B)DDL C)DCL D)DPL Answer: C Level: EasyPage Ref:315 Topic: The SQL Environment AACSB Use of Information Technology . _____ is a set of commands used to update and query a database. A)DML B)DDL C)DCL D)DPL Answer: A Level: EasyPage Ref: 315 Topic: The SQL Environment AACSB Use of Information Technology 6. DDL is typically used during which phases of the development process? A)Implementation B)Physical design C)Analysis D)All of the above Answer: B Level: DifficultPage Ref: 314, 315 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 7. The SQL command _____ defines a logical table from one or more tables or views. A)create table B)alter table C)create view D)create relationshipAnswer: C Level: EasyPage Ref:319 Topic: Defining A Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology 8. Any create command may be rev ersed by using a ________ command. A)truncate B)drop C)delete D)unpack Answer: B Level: EasyPage Ref: 319 Topic: Defining a Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology, Analytic Skills 9. The first in a series of steps to follow when creating a table is to: A)identify columns that must be unique. B)identify each attribute and its characteristics. C)create an index.D)identify columns that must be null. Answer: B Level: ModeratePage Ref: 319 Topic: Defining a Database in SQL Subtopic: Creating Tables AACSB Use of Information Technology, Analytic Skills 10. The SQL command _____ adds one or more new columns to a table. A)create table B)alter table C)create view D)create relationship Answer: B Level: EasyPage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology, Analytic Skills 11. What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A) Alters the Customer_T table to accept Type 2 VarcharsB)Alters the Customer_T table to be a Type 2 Varchar C)Alters the Customer_T table, and adds a field called ââ¬Å"Typeâ⬠D)Alters the Customer_T table by adding a 2-byte field called ââ¬Å"Varcharâ⬠Answer: C Level: ModeratePage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology 12. What does the following SQL statement do? Delete from Customer_T where state = ââ¬ËHIââ¬â¢; A)Deletes all records from customer_t where the state is equal to HI B)Removes the customer_t table from the database C)Deletes all records from the customer_t table D)None of the aboveAnswer: A Level: ModeratePage Ref: 326 Topic: Inserting, Updating, and Deleting Data Subtopic: Deleting Database Contents AACSB Use of Information Technology, Analytic Skills 13. What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A)Changes the price of a unit called Product_T to 7 B)Changes the unit price of Product 7 to 775 C)Changes the length of the Unit_Price field to 775 D)Updates the Product_T table to have a unit price of 775 Answer: B Level: ModeratePage Ref: 327 Topic: Inserting, Updating, and Deleting Data Subtopic: Updating Database ContentsAACSB Use of Information Technology, Analytic Skills 14. Which of the following is a technique for optimizing the internal performance of the relational data model? A)Avoiding indexes on secondary keys B)Clustering data C)Not reporting statistics to save machine resources D)Using random index organizations Answer: B Level: ModeratePage Ref: 327 Topic: Internal Schema Definitions in RDBMSs AACSB Use of Information Technology 15. Indexes are created in most RDBMSs to: A)provide a quicker way to store data. B)decrease the amount of disk space utilized. C)provide rapid random and sequential access to base-table data.D)increase the cost of implementation. Answer: C Level: ModeratePage Ref: 328 Topic: Internal Schema Definition in RDBMSs Subtopic: Creating Indexes AACSB Use of Information Technology 16. In an SQL statement, which of the following parts states the conditions for row selection? A)Select B)From C)Where D)Group By Answer: C Level: EasyPage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 17. What does the following SQL statement do? Select * From Customer Where Cust_Type = ââ¬Å"Bestâ⬠A)Selects all the fields from the Customer table for each row with a customer labeled ââ¬Å"bestâ⬠B)Selects the ââ¬Å"*â⬠field from the Customer table for each row with a customer labeled ââ¬Å"bestâ⬠C)Selects fields with a ââ¬Å"*â⬠in them from the Customer table D)Selects all the fields from the Customer table for each row with a customer labeled ââ¬Å"*â⬠Answer: A Level: ModeratePage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 18. What result will the following SQL statement produce? Select Avg(standard_price) as average from product_v;A)The average of all products in product_v B)The average standard_price of all products in product_v C)The average price of all products D)None of the above Answer: B Level: ModeratePage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 19. Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A)How many products are in the Product Table? B)How many products have product descriptions in the Product Table? C)How many characters are in the field name ââ¬Å"Product_Descriptionâ⬠?D)How many different columns named ââ¬Å"product Descriptionâ⬠are there in table Product_T? Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: U sing Functions AACSB Use of Information Technology, Analytic Skills 20. What results will be produced by the following SQL query? Select sum(standard_price) as total_price from product_v where product_type = ââ¬ËWOODââ¬â¢; A)The total price of all products that are of type wood B)The total price of all products C)The standard_price of the first wood product in the table D)The standard_price of any wood product in the table Answer: A Level: DifficultPage Ref: 331Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 21. Which of the following counts ONLY rows that contain a value? A)Count B)Count(*) C)Tally(*) D)Checknum Answer: A Level: ModeratePage Ref: 331,332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 22. Which of the following will produce the minimum of all standard prices? A)Select standard_price from product_v where standard_price = min; B)Select min(standard_price) from product_v; C)Select standard_price from min(product_v);D)Select min(standard_price) from product_v where standard_price = min(standard_price); Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 23. What will result from the following SQL Select statement? Select min(product_description) from product_v; A)The minimum value of product_description will be displayed. B)An error message will be generated. C)The first product description alphabetically in product_v will be shown. D)None of the above. Answer: C Level: DifficultPage Ref: 331, 332 Topic: Processing Single TablesSubtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 24. Which of the following is the wildcard operator in SQL statements? A) B) * C) = D) & Answer: B Level: EasyPage Ref: 332, 333 Topic: Processing Single Tables Subtopic: Using Wildcards AACSB Use of Information Technology, Analytic Skills 25. What result set will the following query return? Select item_no from order_v where quantity > 10; A)The item_no of all orders that had more than 10 items B)The order_id of all orders that had more than one item C)The order_id of all orders that had more than 10 itemsD)The item_no of all orders that had 10 or more items Answer: A Level: ModeratePage Ref: 333 Topic: Processing Single Tables Subtopic: Using Comparison Operators AACSB Use of Information Technology, Analytic Skills 26. Which of the following is true about the SQL statement? Select * From Product Where Quantity = 1 Or Quantity = 2; A)All fields will be selected from the Product table for products that have a quantity of 1. B)All fields will be selected from the Product table for products that have a quantity of only 2. C)All fields will be selected from the Product table for products that have a quantity of 1 or 2.D)None of the above. Answer: C Level: ModeratePage Ref: 333-336 Topic: Proces sing Single Tables Subtopic: Using Boolean Operators AACSB Use of Information Technology, Analytic Skills 27. What result set will the following query return? Select item_no, description from item where weight > 100 and weight < 200; A)The item_no and description for all items weighing less than 100 B)The item_no for all items weighing between 101 and 199 C)The item_no and description for all items weighing between 101 and 199 D)The item_no for all items weighing more than 200 Answer: C Level: ModeratePage Ref: 336, 337Topic: Processing Single Tables Subtopic: Using Ranges for Qualification AACSB Use of Information Technology, Analytic Skills 28. To eliminate duplicate rows in a query, the _____ qualifier is used in the SQL Select command. A)alter B)distinct C)check D)specific Answer: B Level: EasyPage Ref: 337, 338 Topic: Processing Single Tables Subtopic: Using Distinct Values AACSB Use of Information Technology 29. What result set is returned from the following query? Select cust omer_name, telephone from customers where city in (ââ¬ËBostonââ¬â¢,ââ¬â¢New Yorkââ¬â¢,ââ¬â¢Denverââ¬â¢); A)The customer_name and telephone of all customersB)The customer_name and telephone of all customers living in either Boston, New York or Denver C)The customer_name and telephone of all customers living in Boston and New York and Denver D)The customer_name of all customers living in Boston, New York or Denver Answer: B Level: ModeratePage Ref: 339 Topic: Processing Single Tables Subtopic: IN and NOT IN with Lists AACSB Use of Information Technology, Analytic Skills 30. To get all the customers from Hawaii sorted together, which of the following would be used? A)Order By B)Group By C)Having D)Sort Answer: A Level: EasyPage Ref: 339, 340 Topic: Processing Single TablesSubtopic: Sorting Results: The ORDER BY Clause AACSB Use of Information Technology, Analytic Skills 31. A single value returned from an SQL query that includes an aggregate function is called a(n): A )agate. B)scalar aggregate. C)vector aggregate. D)summation. Answer: B Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 32. Multiple values returned from an SQL query that includes an aggregate function are called: A)vector aggregates. B)scalar aggregates. C)agates. D)summations. Answer: A Level: EasyPage Ref: 340, 341Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 33. Which of the following can produce scalar and vector aggregates? A)Order By B)Group By C)Having D)Sort Answer: B Level: ModeratePage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 34. What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries gr oup by driver_no; A)A listing of all drivers, sorted by driver numberB)A listing of each driver as well as the number of deliveries that he or she has made C)A count of all of the deliveries made by all drivers D)None of the above Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 35. What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = ââ¬ËMAââ¬â¢ group by driver_no; A)A listing of all drivers who made deliveries to state = ââ¬ËMAââ¬â¢, sorted by driver number.B)A listing of each driver who made deliveries to state = ââ¬ËMA as well as the number of deliveries that each driver has made to that state. C)A count of all of the deliveries made to state = ââ¬ËMAââ¬â¢ by all drivers. D)None of the above. Answer: B Difficulty: DifficultPage Ref: 3 40, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 36. Which of the following finds all groups meeting stated conditions? A)Select B)Where C)Having D)Find Answer: C Level: EasyPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 37. What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2; A)A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B)A listing of all drivers C)A listing of the number of deliveries greater than 2 D)A listing of all drivers who made more than 2 deliveries Answer: A Level: DifficultPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 38. Which of the following is true of the order in which SQL statements are evaluated? A)The select clause is always processed first. B)The select clause is always processed last. C)The select clause is processed before the order by clause. D)The group by clause is processed before the where clause. Answer: C Level: DifficultPage Ref: 329 Topic: Processing Single Tables AACSB Use of Information Technology 39. A _______________ view is materialized when referenced. A)virtual B)dynamic C)materialized D)base Answer: BLevel: ModeratePage Ref: 342 Topic: Using and Defining Views AACSB Use of Information Technology 40. A view may not be updated directly iF it contains: A)the distinct keyword. B)derived columns and expressions in the select clause. C)uses the group by or having clause. D)all of the above. Answer: D Level: EasyPage Ref: 345 Topic: Using and Defining Views AACSB Use of Information Technology Chapter 7 1. A join operation: A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view.D) is used to combine indexing operations. Answer: B Level: EasyPage Ref: 358 Topic: Processing Multiple Tables AACSB Use of Information Technology 2. A join in which the joining condition is based on equality between values in the common columns is called a(n): E) equi-join. F) uni-lateral join. G) natural join. H) both A and C. Answer: D Level: EasyPage Ref: 358 Topic: Processing Multiple Tables Subtopic: Equi-join AACSB Use of Information Technology 3. A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): I) equi-join.J) natural join. K) multivariate join. L) inner join. Answer: B Level: EasyPage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 4. The most common ly used form of join operation is the: M) outer join. N) union join. O) equi-join. P) natural join. Answer: D Level: ModeratePage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 5. A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): Q) natural join. R) equi-join. S) outer join. T) union join. Answer: CLevel: EasyPage Ref: 361 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 6. In which of the following situations would one have to use an outer join in order to obtain the desired results? U) A report is desired that lists all customers who placed an order. V) A report is desired that lists all customers and the total of their orders. W) A report is desired that lists all customers, the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). X) There is never a situation that requires only an outer join.Answer: C Level: DifficultPage Ref: 361,362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology, Analytic Skills 7. One major advantage of the outer join is that: Y) information is easily accessible. Z) information is not lost. [) the query is easier to write. ) All of the above. Answer: B Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 8. A type of join implemented in SQL-1999 and by extension SQL-2003 that returns all of the data from each table that is joined is called a(n): ]) outer join. ^) inner join. ) union join. `) intersect join. Answer: C Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Union Join AACSB Use of Information Technology 9. A type of query that is placed within a WHERE or HAVING clause of another query is called a: a) master query. b) subquery. c) sup erquery. d) multi-query. Answer: B Level: EasyPage Ref: 340 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 10. _________ takes a value of true if a subquery returns an intermediate results table which contains one or more rows. e) In f) Having g) Exists h) Extents Answer: CLevel: ModeratePage Ref: 367 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 11. In SQL, a _____________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. i) correlated j) paired k) natural l) inner Answer: A Level: ModeratePage Ref: 368 Topic: Processing Multiple Tables Subtopic: Correlated Subqueries AACSB Use of Information Technology 12. A ______________ ____________ is a temporary table used in the FROM clause of an SQL query. m) correlated subquery n) derived table o) view table p) None of the above. Answer: BLevel: ModeratePage Ref: 369 Topic: Processing Multiple Tabl es Subtopic: Using Derived Tables AACSB Use of Information Technology 13. The UNION clause is used to: q) combine the output from multiple queries into a single result table. r) join two tables together to form one table. s) find all rows that do not match in two tables. t) None of the above. Answer: A Level: EasyPage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 14. In order for two queries to be UNION-compatible, they must: u) both have the same number of lines in their SQL statements. ) both output compatible data types for each column and return the same number of rows. w) both return at least one row. x) All of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 15. Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: y) using the if-then-else construct. z) using the immediate if stat ement. {) using the CASE keyword in a statement. |) using a subquery. Answer: C Level: ModeratePage Ref: 372 Topic: Processing Multiple Tables Subtopic: Conditional ExpressionsAACSB Use of Information Technology 16. Explicit commands to manage transactions are needed when: }) a transaction consists of just one SQL command. ~) multiple SQL commands must be run as part of a transaction. ) autocommit is set to off. ) None of the above. Answer: B Level: DifficultPage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 17. User-defined transactions can improve system performance because: ) transactions are processed as sets, reducing system overhead. ) transactions are mapped to SQL statements. ) speed is improved due to query optimization. ) All of the above.Answer: A Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 18. An interactive command that can be used to dynamically control a user session for a ppropriate integrity measures is: ) rollback. ) rollforward. ) set autocommit. ) expunge. Answer: C Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology, Analytic Skills 19. If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? ) dba_tab_privs ) dba_tab_comments ) dba_table_label ) dba_tables Answer: DLevel: ModeratePage Ref: 378 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 20. What results would the following SQL statement produce? select owner, table_name from dba_tables where table_name = ââ¬ËCUSTOMERââ¬â¢; ) A listing of all customers in the customer table ) A listing of the owner of the customer table ) A listing of the owner of the customer table as well as customers ) An error message Answer: B Level: ModeratePage Ref: 379 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 21. User-de fined data types: ) can be a subclass of a standard type. can behave as an object. ) can have defined functions and methods. ) can have all of the above. Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL AACSB Use of Information Technology 22. A new set of analytical functions added in SQL:200n are referred to as: ) OLAF Functions ) MOLAP Functions ) Average Functions ) OLAP Functions Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology 23. RANK and DENSE-RANK are examples of: ) Ceilings ) Door Functions ) Window Functions ) Moving FunctionsAnswer: C Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology, Analytic Skills 24. All of the following are new data types added in SQL:200n EXCEPT: ) BIGINT ) BIT ) MULTISET ) XML Answer: B Level: ModeratePa ge Ref: 381 Topic: SQL: 2003 Enhancements and Extensions to SQL Subtopic: New Data Types AACSB Use of Information Technology, Analytic Skills 25. The MERGE command: ) Allows one to combine the INSERT and UPDATE operations ) Allows one to combine the INSERT and DELETE operations ) Joins 2 tables together None of the above. Answer: A Level: ModeratePage Ref: 382 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Other Enhancements AACSB Use of Information Technology, Analytic Skills 26. Extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions are called: ) stored procedures. ) Persistent Stored Modules. ) flow control modules. ) None of the above. Answer: B Level: ModeratePage Ref: 383 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Programming Extensions AACSB Use of Information Technology 27.A named set of SQL statements that are considered when a data modification occurs a re called: ) stored procedures. ) treatments. ) triggers. ) trapdoors. Answer: C Level: EasyPage Ref: 384 Topic: Triggers and Routines AACSB Use of Information Technology 28. While triggers run automatically, ______________ do not and have to be called. ) trapdoors ) routines ) selects ) updates Answer: B Level: ModeratePage Ref: 386 Topic: Triggers and Routines AACSB Use of Information Technology 29. SQL-invoked routines can be: ) procedures. ) functions. ) All of the above. ) None of the above. Answer: C Level: EasyPage Ref: 386Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 30. All of the following are advantages of SQL-invoked routines EXCEPT: ) flexibility. ) efficiency. ) sharability. ) security. Answer: D Level: ModeratePage Ref: 387 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 31. A procedure is: ) stored within the database. ) given a unique name. ) called by name. ) All of the above. Answer: D Level : ModeratePage Ref: 387, 388 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 32. Embedded SQL consists of: hard-coded SQL statements included in a program written in another language. ) SQL encapsulated inside of other SQL statements. ) SQL written into a front-end application. ) SQL translated to a lower-level language. Answer: A and C are both plausible answers. Level: EasyPage Ref: 389 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 33. In order to embed SQL inside of another language, the ________ _______ statement must be placed before the SQL in the host language. ) GET SQL ) EXEC SQL ) RUN SQL ) SQL SQL Answer: B Level: ModeratePage Ref: 390 Topic: Embedded SQL and Dynamic SQLAACSB Use of Information Technology, Analytic Skills 34. Dynamic SQL: ) is used to generate appropriate SQL code on the fly, as an application is processing. ) is quite volatile. ) is not used widely on the Internet. ) creates a less flexible ap plication. Answer: A Level: EasyPage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 35. On-line transaction processing is: ) A system used for reporting only. ) A system used in transaction-oriented applications that involves real-time processing of SQL transactions. ) A set of tools that provides users with a graphical view of data. ) None of the above.Answer: B Level: EasyPage Ref: 391 Topic: OLAP SQL AACSB Use of Information Technology 36. OLAP systems differ from OLTP systems in several ways except: ) Size ) Processing ) Queries ) Physical Storage Answer: B Level: EasyPage Ref: 392 Topic: OLAP SQL AACSB Use of Information Technology Chapter 8 1. Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace? A)GUI evolutions B)Networking advances C)Communication changes D)All of the above. Answer: D Level: ModeratePage Ref: 403 Topic: Introduction AACSB Use of Information Technolog y 2.Which of the following is a component of processing logic? A)Input B)Output C)Retrieval D)Business rules Answer: D Level: EasyPage Ref: 404 Topic: Client/Server Architectures AACSB Use of Information Technology 3. A device that manages file operations and is shared by each client PC on a LAN is called a: A)file server. B)file processor. C)database server. D)fat client. Answer: A Level: EasyPage Ref: 405 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 4. In a file server architecture, which of the following is performed by a client? A)Provides significant LAN trafficB)File storage C)User interface processing D)All of the above. Answer: C Level: ModeratePage Ref: 404 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 5. Which of the following is true about file servers on a LAN? A)Each client must devote memory to a full version of its DBMS. B)Not much data movement i s generated. C)The DBMS copy has little responsibility. D)Application programmers need little knowledge about DBMSs. Answer: A Level: ModeratePage Ref: 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology . Which of the following is NOT a limitation to using file servers on local area networks? A)Considerable data movement is generated across the network. B)Each client workstation must devote memory to a full version of the DBMS. C)Stored procedures can be run on the file server. D)The DBMS copy in each workstation must manage the shared database integrity. Answer: C Level: ModeratePage Ref: 405, 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 7. A(n) _____ is a module of code written in SQL or some proprietary language to run business rules on a server.A)SQL program B)select module C)select procedure D)stored procedure Answer: D Level: EasyPage Ref: 407 Topic: Cl ient/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 8. Which of the following is an advantage of stored procedures? A)Data integrity improves when fewer applications access the procedure. B)The layers get cleaner. C)Stored procedures result in fatter clients. D)Performance improves for compiled SQL statements. Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 9.Which of the following is not a disadvantage of stored procedures? A)Writing stored procedures takes more time than writing an application in Visual Basic or PowerBuilder. B)Decreases in network traffic are realized. C)Stored procedures are proprietary and not easy to move from one RDBMS to another. D)Each client must be loaded with the application to be used at that location. Answer: B Level: ModeratePage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Archite ctures AACSB Use of Information Technology 10. A PC configured to handle user interface with little or no local storage is called a: A)server.B)fat client. C)thin client. D)workstation. Answer: C Level: EasyPage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 11. Which of the following is true about three-tier architectures? A)Less scalable than two-tier B)Increased risk C)More technological flexibility D)All of the above Answer: C Level: ModeratePage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 12. _____ is the process of assigning pieces of application code to clients or servers. A)Application partitioning B)Modularizing programs C)Code distribution D)Program breakup Answer: A Level: EasyPage Ref: 410Topic: Partitioning an Application AACSB Use of Information Technology 13. Which of the following is not a common distribution logic for two-tiered server environments: A)Fat Client B)Tall Client C)Thin Client D)Distributed Answer: A Level: ModeratePage Ref: 411 Topic: Partitioning an Application AACSB Use of Information Technology 14. Which of the following is true of mainframes in the client/server environment? A)Managers have a difficult time moving between platforms. B)Supporting distributed environments is easier than mainframe support. C)Migrating from mainframes to client/server is a relatively simple process.D)All of the above. Answer: A Level: ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 15. Moving mission critical applications to client/server environments is likely to cause serious problems in the transition from the pilot phase to production unless: A)Developers rewrite all code for the system. B)Brand new hardware is purchased. C)Developers anticipate scalability issues and address them as they develop code D)None of the above. Answer: C Level; ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 16. ____ is any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A)User interface enhancers B)Middleware C)Interface managers D)MPP Answer: B Level: EasyPage Ref: 413 Topic: Using Middleware AACSB Use of Information Technology 17. Which of the following does not connect applications to databases over networks? A)Asynchronous RPC middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)SMP Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 18.Which of the following could send and receive email, while the client works on other things? A)ORBs middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)MOM Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 19. Microsoftââ¬â¢s Transaction Server and IBMââ¬â¢s CICS are examples of: A)Asynchronous Remote Procedure Call (RPC) B)Synch ronous RPC C)MOM D)ORB Answer: B Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 20. ______________ makes it possible for applications to send objects and request services in an object-oriented system.A)MOM B)RPC C)ORB D)API Answer: C Level: EasyPage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 21. A(n) _____ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system. A)API B)MOM C)RPC D)LAN Answer: A Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 22. Which of the following is true of moving to client/server environments? A)Functionality must be delivered all at once. B)There are no hidden costs. C)Services can be placed appropriately. D)None of the above. Answer: C Level: EasyPage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 23. Which of the following is NOT a benefit of moving to cli ent/server environments? A)Functionality can be delivered in stages to end users. B)Business process reengineering is facilitated. C)Network traffic and response times are increased. D)Users are encouraged to utilize the applicationââ¬â¢s functionality. Answer: C Level: ModeratePage Ref: 416, 417 Topic: Client/Server Issues AACSB Use of Information Technology 24. The most common bottleneck in a client/server environment is the: A)users B)software C)network D)company politics Answer: C Level: ModeratePage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 25. In order to establish client/server security: A)Network security must be established B)Biometric authentication must be used C)Server security must be established D)Both A and C Answer: D Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 26. Multi-tier make sense if all of the following environments except: A) More than 100 users B)High-volume transaction process ing C)Workgroups D)Real-time processing Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 27.Which of the following is not a parameter that must be specified in order to establish an ODBC connection? A)Specific ODBC driver needed B)Back-end server name to connect to C)JDK version D)Database name to connect to Answer: C Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 28. Which of the following is a distinguishing characteristic of Level-2 API capabilities? A)Send and receive partial results B)Call a translation library C)Commit or rollback transactions D)Prepare and execute SQL statements Answer: B Level: ModeratePage Ref: 417Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 29. An application programming interface that enables an application program to process RDBMS databases meets the: A)objec t linking and embedding standard. B)open database connectivity standard. C)multi-platform connectivity standard. D)open source standard. Answer: B Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 30. Which of the following parameters must be defined in order to establish an ODBC connection? A)ODBC driver B)Back-end server nameC)Database name to connect to D)All of the above Answer: D Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology. Analytic Skills 31. The ability to call a translation library is a distinguishing characteristic of: A)Core-API ODBC conformance. B)Level-1 API ODBC conformance. C)Level-2 API ODBC conformance. D)Level-3 API ODBC conformance. Answer: C Level: DifficultPage Ref: 418 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 32. JDBC is similar to ODBC EXCEPT: A)ODBC is language independent and JDBC is not.B)ODBC can be used to execute SQL queries on a server while JDBC does not have this capability. C)ODBC can run on multiple platforms, while JDBC is platform specific. D)None of the above. Answer: A Level: ModeratePage Ref: 385 Topic: Using JDBC to Link External Tables Stored on a Database Server AACSB Use of Information Technology, Analytic Skills Chapter 9 1. The analysis of summarized data to support decision making is called: A)operational processing. B)informational processing. C)artificial intelligence. D)data scrubbing. Answer: B Level: EasyPage Ref: 461 Topic: Introduction AACSB Use of Information Technology 2.The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is: A)subject-oriented. B)integrated. C)time-variant. D)nonvolatile. Answer: A Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology 3. Wh en we consider data in the data warehouse to be time-variant, we mean: A)that the time of storage varies. B)data in the warehouse contain a time dimension so that they may be used to study trends and changes. C)that there is a time delay between when data are posted and when we report on the data. D)none of the above.Answer: B Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology, Analytic Skills 4. Which of the following advances in information systems contributed to the emergence of data warehousing? A)Improvements in database technology, particularly the relational data model B)Advances in computer hardware, especially affordable mass storage and parallel computer architectures C)Advances in middleware products that enabled enterprise database connectivity across heterogeneous platforms D)All of the above Answer: D Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data WarehousingSubtopic: A Brief History AACSB Use of Infor mation Technology 5. Which of the following factors drive the need for data warehousing? A)Businesses need an integrated view of company information. B)Informational data must be kept together with operational data. C)Data warehouses generally have better security. D)None of the above Answer: A Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: The Need for Data Warehousing AACSB Use of Information Technology 6. Which of the following organizational trends does not encourage the need for data warehousing? A)Multiple, nonsynchronized systemsB)Focus on customer relationship management C)Downsizing D)Focus on supplier relationship management Answer: C Level: ModeratePage Ref: 463ââ¬â464 Topic: Basic Concepts of Data Warehousing Subtopic: Need for a Companywide View AACSB Use of Information Technology 7. Informational systems are designed for all of the following EXCEPT: A)running a business in real time. B)supporting decision making. C)complex queries. D)data mining. Answer: A Level: ModeratePage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 8.Operational and informational systems are generally separated because of which of the following factors? A)A data warehouse centralizes data that are scattered throughout disparate operational systems and makes them readily available for decision support applications. B)A properly designed data warehouse adds value to data by improving their quality and consistency. C)A separate data warehouse eliminates contention for resources that results when informational applications are confounded with operational processing. D)All of the above Answer: D Level: EasyPage Ref: 466 Topic: Basic Concepts of Data WarehousingSubtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 9. A data mart is a(n): A)enterprisewide data warehouse. B)smaller system built upon file processing technology. C)data warehouse that is limited in scope. D)generic on-line shopping site. Answer: C Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 10. One characteristic of independent data marts is complexity for end users when they need to access data in separate data marts.This complexity is caused by not only having to access data from separate databases, but also from: A)the possibility of a new generation of inconsistent data systems, the data marts themselves. B)lack of user training. C)denormalized data. D)incongruent data formats. Answer: A Level: DifficultPage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 11. All of the following are limitations of the independent data mart EXCEPT: A)separate extraction, transformation, and loading processes are developed for each data mart.B)data marts may not be consistent with one another. C)there is no capability to drill down into greater detail in other data marts. D)it is often more expedient to build a data mart than a data warehouse. Answer: D Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology, Reflective Thinking 12. A dependent data mart: A)is filled with data extracted directly from the operational system. B)is filled exclusively from the enterprise data warehouse with reconciled data.C)is dependent upon an operational system. D)participates in a relationship with an entity. Answer: B Level: ModeratePage Ref: 470 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 13. An operational data store (ODS) is a(n): A)place to store all unreconciled data. B)represen tation of the operational data. C)integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users.D)small-scale data mart. Answer: C Level: EasyPage Ref: 471 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 14. A logical data mart is a(n): A)data mart consisting of only logical data. B)data mart created by a relational view of a slightly denormalized data warehouse. C)integrated, subject-oriented, detailed database designed to serve operational users. D)centralized, integrated data warehouse. Answer: B Level: ModeratePage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 15. All of the following are unique characteristics of a logical data mart EXCEPT: A)logical data marts are not physically s eparate databases, but rather a relational view of a data warehouse. B)the data mart is always up-to-date since data in a view is created when the view is referenced. C)the process of creating a logical data mart is lengthy. D)data are moved into the data warehouse rather than a separate staging area. Answer: C Level: EasyPage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 16. The real-time data warehouse is characterized by which of the following? A)It accepts near-real time feeds of transaction data. B)Data are immediately transformed and loaded into the warehouse. C)It provides near-real-time access for the transaction processing systems to an enterprise data warehouse. D)All of the above Answer: D Level: EasyPage Ref: 473-474 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 7. Data that are detailed, current, and intended to be the single, authoritative source of all decision support applications are called _____ data. A)reconciled B)subject C)derived D)detailed Answer: A Level: EasyPage Ref: 475 Topic: Data Warehouse Architectures Subtopic: Three-Layer Data Architectures AACSB Use of Information Technology 18. A database action that results from a transaction is called a(n): A)transition. B)event. C)log entry. D)journal happening. Answer: B Level: EasyPage Ref: 476 Topic: Some Characteristics of Data Warehouse Data Subtopic: Status Versus Event DataAACSB Use of Information Technology, Analytic Skills 19. Data that are never physically altered once they are added to the store are called _____ data. A)transient B)override C)periodic D)complete Answer: C Level: EasyPage Ref: 477 Topic: Some Characteristics of Data Warehouse Data Subtopic: Transient Versus Periodic Data AACSB Use of Information Technology 20. Which of the following is an objective of derived data? A) Ease of use for decision support systems B)Faster response time for user queries C)Support data mining applications D)All of the above Answer: D Level: EasyPage Ref: 481Topic: The Derived Data Layer Subtopic: Characteristics of Derived Data AACSB Use of Information Technology 21. .A star schema contains both fact and _______ tables. A)narrative B)cross functional C)dimension D)starter Answer: C Level: ModeratePage Ref: 481 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 22. The level of detail in a fact table determined by the intersection of all the components of the primary key, including all foreign keys and any other primary key elements, is called the: A)span. B)grain. C)selection. D)aggregation. Answer: BLevel: EasyPage Ref: 485 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 23. Conformed dimensions allow users to do the following: A)share nonkey dimension data. B)query across fact tables with consistency. C)work on facts and business subjects for which all users have the same meaning. D)all of the above. Answer: D Level: ModeratePage Ref: 488-489 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 24. An expanded version of a star schema in which all of the tables are fully normalized is called a(n): A)snowflake schema.B)operational schema. C)DSS schema. D)complete schema. Answer: A Level: EasyPage Ref: 492 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 25. All of the following are ways to handle changing dimensions EXCEPT: A)overwrite the current value with the new value. B)for each dimension attribute that changes, create a current value field and as many old value fields as we wish. C)create a new dimension table row each time the dimension object changes. D)create a snowflake schema. Answer: D Level: ModeratePage Ref: 494 Topic: The Derived Data LayerSubtopic: The Star Schema AA CSB Use of Information Technology 26. The use of a set of graphical tools that provides users with multidimensional views of their data is called: A)on-line geometrical processing (OGP). B)drill-down analysis. C)on-line analytical processing (OLAP). D)on-line datacube processing (ODP). Answer: C Level: EasyPage Ref: 500 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 27. OLAP tools that use the database as a traditional relational database are called: A)ROLAP tools. B)MOLAP tools. C)slice and dice.D)none of the above. Answer: A Level: ModeratePage Ref: 500-501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 28. Rotating the view of a multidimensional database for a particular data point is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: D Level: ModeratePage Ref: 501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 29. Going from a summary view to progressively lower levels of detail is called data: A)cubing. B)drill-down. C)dicing.D)pivoting. Answer: B Level: ModeratePage Ref: 502 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 30. Which of the following data mining techniques identifies clusters of observations with similar characteristics? A)Case reasoning B)Rule discovery C)Clustering and signal processing D)Neural nets Answer: C Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 31. Which of the following data-mining techniques searches for patterns and correlations in large data sets?A)Case reasoning B)Rule discovery C)Signal processing D)Neural nets Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 32. Which of the following dat a mining applications identifies customers for promotional activity? A)Population profiling B)Target marketing C)Usage analysis D)Product affinity Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 33. Which of the following is true of data visualization?A)It is easier to observe trends and patterns in data. B)Correlations and clusters in data can be easily identified. C)It is often used in conjunction with data mining. D)All of the above. Answer: D Level: ModeratePage Ref: 503 Topic: The User Interface Subtopic: Data Visualization AACSB Use of Information Technology, Analytic Skills Chapter 10 1. High quality data are data that are A) Accurate B)Consistent C)Available in a timely fashion D)All of the above Answer: D Level: EasyPage Ref: 524 Topic: Managing Quality Data AACSB Use of Information Technology, Analytic Skills
Saturday, November 9, 2019
Develop a Coherent Marketing Mix for a New Product or Service Essay
In this assignment, I am going to describe and explain how Apple uses the marketing mix for one of its latest product, a mini IPad. Marketing mix Marketing mix is commonly known as the 4Ps: product, price, place and promotion. These are controllable element and it importantly use when determined and adjusted until the right combination that serve the needs of the productââ¬â¢s consumers. Description of the product The product I have been chosen is one of the latest product of Apple which have been released during November 2012, the mini IPad. This new IPad is available in two models, one with Wi-Fi and another is Wi-Fi + cellular. The IPad mini has two colours which is black and white and the price range is from à £269 to à £529 Target market The target market that chosen for the mini IPad is male and female between the ages of 19 to 49, those that are currently in further education or in employment. Also, it is also targeting at Apple loyal customers. The reason for this market group is because, people between the ages of 19 to 49 are more likely to use high technology product. Especially with people who are in education and employment because they will need to use tablet for works purposes. Product life cycle When developing a product, Apple must consider factors such as, customersââ¬â¢ wants and needs, the physical appearance of the product, the quality and reliability of the product.à All products must go through a product life cycle which is an important concept in marketing. The product life cycle describes the stage that many products must go through. However, many products will not be able to reach to the final stages because of decrease in demand of product failure. The four stages of the product life cycle are; * Introduction ââ¬â researching, developing and then launching the product * Growth ââ¬â when sales are increasing at their fastest rate * Maturity ââ¬â sales are near their highest, but the rate of growth is slowing down, e.g. new competitors in market or saturation * Decline ââ¬â final stage of the cycle, when salesà begin to fall Reason for chosen product The reason that I have chosen the mini IPad is because; the mini IPad is one of the latest technologies available in the market at the moment. Moreover, it is also because, all the applications are available and easily to download from the Apple store that have been built in with the mini IPad. Plus, the mini IPad is light in weight and with the Wi-Fi and cellular connection available it is very easy to carry along. Therefore, this mini IPad has been designed to meet many of customersââ¬â¢ requirements of an ideal table which are; efficient, portable and easy to use. Another reason that made me to select out this product is because of its attractive appearance. Apple has designed this product to meet both genders as the mini IPad is available in two colours; black and white. Normally, the attractive classic black is an option for male while the stylist shinny white is for female. The appearance and packaging of the product is important because the consumers must look at the appearance first before knowing the quality of product. So, if the mini IPad is badly presented its may not be able to catch customersââ¬â¢ eyes. Moreover, one of another important reason for chosen the mini IPad is because, Apple is popular for developing quality and high performance product that can last for long time therefore, it is very likely that the mini IPad are also to have a high quality performance. Pricing Out of the 4Ps, price is the only element which creates sales revenue for Apple while all the others Ps are costs. . The price of an item is clearly an important determinant of the value of sales made. Researching consumersââ¬â¢ opinions about pricing is important as it indicates how they value what they are looking for as well as what they want to pay Pricing strategies is not an easy for business including Apple, to determine because the price must be reasonable and appeal to the target market. Within pricing strategies, there are three factors to its; cost based pricing, customer based pricing and competitor based pricing. Cost based pricing is when price is determined by adding a profit element on top of the cost of making the product. Customer based pricing is where prices are determined by what Apple believe customers will be prepared to pay. While competitor based pricing is where competitor prices are the main influence on the price set. Currently, the price range of the mini IPad is from à £269 to à £529. This price range is determined based on the combination of cost and customer based pricing. It is based on the cost based pricing because, people who are actually buying the mini IPad are not interested in the production cost of the product but instead, what they are interested in is the value which the mini IPad provides them. Moreover, it is also considered as customer based pricing because, the price range of the mini IPad is considered as a premium price for a tablet. However, demand for the mini IPad is still high because mini IPad are seen as quality product and people are obsessing about it so they are willing to pay at the high price, therefore the price for this product is seen as reasonable for the target market. Promotion Promotion is all about communication, the process where businesses tried to raise awareness of products to the customers. Therefore, the main aim of promotion is to ensure that customers are aware of the existence of the products and also, persuade and encourage customers to buy the products. Normally, business would use AIDA model for its promotion. AIDA stands for; * Attention : A process when Apple need to attract and grab the customersââ¬â¢ attention by having a standing out point. * Interest: A process where Apple need to create interest in the mini IPad by demonstrate its advantages * Desire: A process where Apple need to move from discussing benefits to specifically how those benefits will help that customer. * Action ââ¬â A process of getting the customer to buy the mini IPad. Promotional mix Furthermore, there are many types of promotional mix which is promotional methods for Apple to choose from. Example of promotional mix are includes; advertising, personal selling, public relations, direct marketing andà special promotion. Not all businesses are using the same types of promotional mix so in term of Apple, because the mini IPad is a premium product, Apple is less likely to do a special promotion such as buy one get one free. But instead, promotional mix, that Apple would be using are like advertising. Because Apple is a large global business with high profits figures therefore, they are more likely to use expensive type of advertisement. For instance, a television adverts during a prime time slot, electronic billboard and whole page print advertisement on Guardian newspaper. Similarly, Apple are also likely to use direct marketing which is a channel agnostic form of advertising that allows Apple to communicate straight to customers via text message, website and email. As evidences, if people are to visit Apple webpage and sign up for newspaper, they will definitely find information about all new products of Apple including the mini IPad. Place Place in marketing is also known as distribution channel, a location or methods where customers can buy what the businesses is offered. So, the main objective of place in marketing mix is to make products available in the right place, at the right time. So for example, if there are no Apple stores in London, many consumers would not bother to go all the trouble to buy the mini IPad. Distribution channel can be direct transaction between Apple to consumers but, it is can also be from Apple to retailers like Tesco then to consumers. Moreover, there are many distribution methods that business can choose from and each one of the business choose a different way to approach it to their customers. For example, market stalls, online, and stores. When Apple are to consider to select their distribution channel, they are certain factors that they must aware of. The first factor is market segment, so a place that must be familiar with the target market. Second factor is changes during the product life cycle as different channels can exploited at the different point. The third factor is the amount of training and support the distributor requires. In term of Apple, because they are a global business so, they are currently having many channels to distribute its mini IPad. The most common channel is through the Apple store that available to visit across many cities. However,à because demand for Appleââ¬â¢s product is too high, many consumers now prefer to pre-order and buy the product online which is much quicker and efficient. Conclusion In conclusion, all of the 4Ps elements of the marketing are to have a major impact on the mini IPad, therefore it is recommend that Apple must always careful with it.
Thursday, November 7, 2019
Lifespan Development and Personality Essays
Lifespan Development and Personality Essays Lifespan Development and Personality Essay Lifespan Development and Personality Essay Lifespan Development and Personality By Denise Isaac Carroll Lytch Psych 103 April 28, 2010 Developmental psychology seeks to address various aspects of human development, including physical, cognitive, social, moral, and personality development. In developmental psychology the debate about nature versus nurture, continuity versus stages, and stability versus change are still ongoing. According to the nature position, human behavior and development are governed by automatic, genetically predetermined signals in a process known as maturation. Humans crawl before we walk and walk before we run. One of several critical periods during our lifetime is, when an organism is especially sensitive to certain experiences that shape the capacity for future development. On the other side of the debate, those who hold an extreme nuturist position argue that development occurs by learning through personal experience and observation of others. Continuity proponents believe that development is continuous, with new abilities, skills, and knowledge being gradually added at a relatively uniform pace. Therefore, the continuity model suggests that adult thinking and intelligence differ quantitatively from a childs. Stage theorists, on the other hand, believe that development occurs at different rates, alternating between periods of little change and periods of abrupt, rapid change. Psychologists who emphasize stability in development hold that measurements of personality taken during childhood are important predictors of adult personality. Of course, psychologists who emphasize change disagree. Like the nature versus nurture debate, the debates about continuity versus stages and stability versus change are not a matter of ââ¬Å"either-or. Physical development and motor skills, for example, are believed to be primarily continuous in nature, whereas cognitive skills usually develop in discrete stages. Similarly, some traits are stable, whereas others vary greatly across the life span. The physical development in childhood is rapid, the brain and other parts of the nervous system grows faster than any other part of the body. By age 6, the childââ¬â¢s brain is 9/10 its full adult weight. Rapid brain growth during early childhood slows down in later childhood. Further brain development and learning occur primarily because neurons grow in size and because the number of axons and dendrites, as well as the extent of their connections, increases. Adolescence is the loosely defined psychological period of development between childhood and adulthood. We consider it to be the teenage years. The concept of adolescence and its meaning varies greatly across cultures. Cognitive development for childhood age 2 ââ¬â 7 is known as preoperational and has the ability for significant language and thinks symbolically. Piaget labeled this period ââ¬Å"preoperationalâ⬠because the child lacks operations, or reversible mental processes. Children at this stage have difficulty understanding that there are points of view other than their own. Egocentrism refers to the preoperational childs limited ability to distinguish between his or her own perspective and someone elses. It does not mean ââ¬Å"selfishnessâ⬠in the ordinary sense of the word. The preschooler who moves in front of you to get a better view of the TV or repeatedly asks questions while you are talking on the telephone is demonstrating egocentrism. They assume that others see, hear, feel, and think exactly as they do. Children in the preoperational stage believe that objects such as the sun, trees, clouds, and bars of soap have motives, feelings, and intentions. From age 7 ââ¬â 11 it is known as concrete operational and has the ability to perform operation on concrete objects and understands conservation. Because they understand the concept of reversibility, they recognize that certain physical attributes such as volume remain unchanged when the outward appearance of an object is altered, a process known as conservation. The final stage in Piagets theory is the formal operational stage, which typically begins around age 11. In this stage, children begin to apply their operations to abstract concepts in addition to concrete objects. They also become capable of hypothetical thinking ââ¬Å"What if? â⬠which allows systematic formulation and testing of concepts. Along with the benefits of this cognitive style come several problems. Adolescents in the early stages of the formal operational period demonstrate a type of egocentrism different from that of the preoperational child. Although adolescents recognize that others have unique thoughts and perspectives, they often fail to differentiate between what they are thinking and what others are thinking. Social behavior becomes more evident in childhood, and research shows that children raised in impersonal surroundings such as in institutions that do not provide the stimulation and love of a regular caregiver or under abusive conditions suffer from a number of problems. They become rigid when picked up; and they have few language skills. They also tend to form shallow or anxious relationships. Some appear forlorn, withdrawn, and uninterested in their caretakers, whereas others seem insatiable in their need for affection. They also tend to show intellectual, physical, and perceptual retardation; increased susceptibility to infection; and neurotic ââ¬Å"rockingâ⬠and isolation behaviors. In some cases, they die from lack of attachment. Morals at the childhood stage are considered to be a focus on self-interest, obedience to authority and avoidance of punishment. Because they also have difficulty considering anothers point of view, they ignore peoples intentions in their moral judgments. Children in their childhood also become aware of others perspectives, but their morality is based on reciprocity, an equal exchange of favors. Preschoolers learn to initiate activities and enjoy their accomplishments. Caregivers who are supportive and encouraging promote feelings of power and self-confidence versus guilt. Elementary school-aged children develop a sense of industry and learn productive skills that their culture requires, such as reading, writing, and counting; if not, they feel inferior. Personality describes you as a person, how you are different from other people, and what patterns of behavior are typical of you. There are five basic personality traits. These five major dimensions of personality are often dubbed the Big Five. To remember the five factors is to note that the first letters of each of the five-factor model spell the word ocean. Oà à | Openness. People who rate high in this factor are original, imaginative, curious, open to new ideas, artistic, and interested in cultural pursuits. Low scorers tend to be conventional, down-to-earth, narrower in their interests, and not artistic. Interestingly, critical thinkers tend to score higher than others on this factor (Clifford, Boufal, Kurtz, 12. 18). | | Cà à | Conscientiousness. This factor ranges from responsible, self-disciplined, organized, and achieving at the high end to irresponsible, careless, impulsive, lazy, and undependable at the other. | | Eà à | Extroversion. This factor contrasts people who are sociable, outgoing, talkative, fun loving, and affectionate at the high end with introverted individuals who tend to be withdrawn, quiet, passive, and reserved at the low end. | Aà à | Agreeableness. Individuals who score high in this factor are good-natured, warm, gentle, cooperative, trusting, and helpful, whereas low scorers are irritable, argumentative, ruthless, suspicious, uncooperative, and vindictive. | | Nà à | Neuroticism (or emotional stability). People who score high in neuroticism are emotionally unstable and prone to insecurity, anxiety, guilt, worry, and moodiness. People at the other end are emotionally stable, calm, even-tempered, easygoing, and relax. | The five-factor model is the first to achieve the major goal of trait theory, to describe and organize personality characteristics using the fewest number of traits. Critics argue, however, that the great variation seen in personalities cannot be accounted for by only five traits and that the Big Five model fails to offer causal explanations for these traits. Finally, trait theorists have been criticized for ignoring the importance of situational and environmental effects on personality. Numerous methods have been used over the decades to assess personality. Modern personality assessments are used by clinical and counseling psychologists, psychiatrists, and others for diagnosing psychotherapy patients and for assessing their progress in therapy. Personality assessment is also used for educational and vocational counseling and to aid businesses in making hiring decisions. Personality assessments can be grouped into a few broad categories: interviews, observations, objective tests, and projective tests. Objective personality tests, or inventories, are the most widely used method of assessing personality, for two reasons. They can be administered to a large number of people relatively quickly and the tests can be evaluated in a standardized fashion. Unlike objective tests, projective tests use unstructured stimuli that can be perceived in many ways. As the name implies, projective tests supposedly allow each person to project his or her own unconscious conflicts, psychological defenses, motives, and personality traits onto the test materials. Because respondents are unable or unwilling to express their true feelings if asked directly, the ambiguous stimuli reportedly provide an indirect ââ¬Å"psychological X-rayâ⬠of important unconscious processes. As you can see, each of these methods has its limits. Psychologists typically combine the results from various methods to create a full picture of an individuals personality. After all the tests and all the studies, are mind, body and soul will always be one step away from being a mystery. References http://e-courses. cerritos. edu writerscafe. org brainmass. com runet. edu
Monday, November 4, 2019
The importance of emotions and emotional quotient Article
The importance of emotions and emotional quotient - Article Example "A survey of the children's parents and teachers found that those who as four-year-olds had the fortitude to hold out for the second marshmallow generally grew up to be better adjusted, more popular, adventurous, confident and dependable teenagers. The children who gave in to temptation early on were more likely to be lonely, easily frustrated and stubborn." (Gibbs) Therefore, the author of the article has been very effective in providing evidences from the various studies in psychology to prove that emotions are more credible measures of intelligence than IQ. Nancy Gibbs also brings out the various misconceptions and misjudgments with regard to the measuring of intelligence. She maintains that the scientists have long worshipped the hardware of the brain and the software of the mind whereas the elements of emotions were completely ignored. Here, she makes out significance of the phrase 'emotional intelligence' which was coined by the Yale psychologist Peter Salovey and the contribut ions of Goleman are analyzed in detail, along with the studies by other scholars. Therefore, the article by Nancy Gibbs makes a central contribution to the study of psychology with regard to emotions and IQ in the measure of human intelligence. J. ... ich the author is trying to find a good explanation of why the cases of autism and closely related disorders like Asperger's are exploding in number with a seeming suddenness and the various arguments and opinions about the issue are thoroughly analyzed by the author. Significantly, the rise in autism and Asperger's is not confined to high-tech enclaves or to the children of computer programmers and software engineers and it occurs in every job category and socioeconomic class and in every state. The author provides alarming statistical data to prove that these disorders are fast becoming serious threat to the US society and one in one fifty kids below 10 years of age may be affected by autism or a related disorder. Considering the seriousness of the issue, the parents in the contemporary society are besieging the offices of psychologists and psychiatrists in their search for remedies whereas scientists are racing to identify the genes linked to autism and to examine environmental fa ctors contributing to the development of autism. In the next sections of the article, Nash deals in detail with the genetic roots of autism, a difference of mind, and a matter of misconnections and the author makes use of the rich new insights by the scientists into the baffling spectrum of disorders gained in the process of contemporary studies. Various factors contributing to the increase in autism and other disorders are analyzed in detail. "In the end," the author remarks, "it is not merely possible but likely that scientists will discover multiple routes--some rare, some common; some purely genetic, some not--that lead to similar end points. And when they do, new ideas for how to prevent or correct autism may quickly materialize. A decade from now there will almost certainly be more
Saturday, November 2, 2019
Whole Body Scanner Term Paper Example | Topics and Well Written Essays - 1750 words
Whole Body Scanner - Term Paper Example This paper looks to discuss these new machines and their impact and repercussions. Whole Body Scanner Airplane passenger screening had not changed for a long time but the events that occurred on 11th of September 2001 caused a drastic change in the airplane security planning. In the past screening were more focused on passengers entering the lounges and so on with detectors specified to detect metallic objects and x-ray machines used to scan the items for carry-on purposes (Elias, 2010). After the terrorist attacks taking place from time to time and after the recent attack in the Russian airport there has been a growing need to improve security. The Transportation Security Administration (TSA) under the U.S Department of Homeland Security has had to face a number of barriers in order to make their screening process more effective. Airport traffic has been on the increase for a long time and screening processes make it cumbersome for the passengers. There also needs to be a balance be tween the needs of the passengers and the security. Scares continue to take place even now as with the happening on 25th December 2009 when a Nigerian man attempted to ignite an explosive device while on board a plane heading to Detroit (Oââ¬â¢Connor & Schmitt, 2009). Airports across the world are looking towards new technology to help security staff catch suspicious people and detect object deemed illegal on flights now. The problems that arise out of these technological advancements in airports are many such as privacy concerns, health concerns and subjection of minors to the scanning. On the other hand such technology can prove helpful in foiling terrorist plans, so there needs to be a weighing of the harms and benefits. Imaging technology has been bought and installed in the various airports all across the United States. According to the TSA there are two types of imaging technology that is being used, the millimeter wave and the backscatter x-ray. As of now, according to the TSA, there are 486 of these imaging devices that are being used across 78 airports in the United States (Transportation Security Administration). The millimeter wave scanner is used to scan the whole body and is used in the detection of objects that may be concealed in or under a personââ¬â¢s clothing. The millimeter scanner is cylindrical in shape with panels which contain scanners in them that rotate around the individual and produces an image of the individual. The scanner emits radio waves that pass through an individuals clothingââ¬â¢s and then returns an image of what is beneath the clothes. The scanner comes back with a picture of the human body which is generally what the security personnel hope to see, however, if other items are seem on the scanner then this may well be a reason for unease. The scanner does not take up too much time to do its job. The millimeter scanner produces a 3D image of the person being scanned that can be rotated and zoomed if the need be. Th e other scanner in use is the backscatter scanner which is what passengers in the United States will see more often. This scanner consists of two boxes opposite to each other with enough space for a person to stand in between them. These boxes take x-rays of the person in a time of about twenty seconds. The electromagnetic waves that are being emitted by the boxes are absorbed by the body but if there are any foreign bodies present on the person then these will show on the scans. There are some concerns that the waves being emitted are a form of radiation and may be dangerous for a person. This scanner takes a 2D image of the scanned person (Cynthia, 2010). The use of
Subscribe to:
Comments (Atom)