Wednesday, October 30, 2019

Promised land Movie Review Example | Topics and Well Written Essays - 250 words

Promised land - Movie Review Example The atmosphere of realism is created by the environmental issues addressed in the film. The town people are introduced to the idea of mining of natural gas, without being given the precise details by a salesperson. The role of the soft spoken but self-driven sales-person Steve Butler is played by Matt Damon. Steve is employed by the oil company in a bid to convince the country folk to sell the drilling rights they hold in their own lands (Vant). The town is rich in oil but highly polluted making it a hazardous place to live in. A retired town scientist tries to educate the town folk on the dangers arising from natural gas mining. In his argument the scientist compels individuals to research on the oil mining method called fracking. Fracking poses a serious problem for everyone in the town, since chemicals and harmful gases get releases during the mining process. In the movie signs of dead cows are shown in protest of natural gas mining (Lemire). The cows are a representation of loss of life due to poisoning from chemicals released by the mining plant. The film is highly centered on an activist theme, since the issue of fracking is felt in America especially in Pennsylvania (Lemire). All in all , the film tries to educate Americans on the dangers of natural gas mining on both plant and animal life. The film is a clear statement against environmental pollution and corporate greed

Monday, October 28, 2019

Implications of Day Care in Young Children Essay Example for Free

Implications of Day Care in Young Children Essay Within this assignment I will be discussing the implications of day care for young children and giving both the positive and the negative aspects of this. A study was done in the united states by Kagen (1978), the study was done on children whose mothers worked, in which case the children were put into day care centres compared to home –reared children. Kagen found little difference between the children placed in day care centres and those raised at home either in the amount of protest or seeking closeness to their mothers when upset. From the findings it appears that it doesn’t matter if a child is in day-care or raised at home or the amount of hours spent with its mothers, there is a special bond between mother and child. Bee (1974) Concluded that there are no negative effects when a child is cared for in a day care centre, provided these are run by trained professionals and only a small number of children. However, Bee (1997) also suggests â€Å"The crucial issue is the discrepancy between the level of stimulation that the child would receive at home and the quality of day care. When the day care setting for the child provides more enrichment than the child would normally receive at home, we see some beneficial cognitive effects. When day care is less stimulating than the child’s home care would have been, it has negative effects.† Psychologists disagree about the developmental effects of day care on young children. Some agree with Bowlby’s prediction that long to medium term separation from the mother could have far-reaching consequences. Others claim that, provided day care is high quality day care has no adverse effects on intellectual development and does not disrupt the child’s attachments. Some psychologists believe that it might even make a positive contribution to the child’s development. The type and quality of care can influence many aspects of development—including memory, language development, school readiness, math and reading achievement, the nature of relationships with parents and teachers, social skills, work habits, and behavioural adjustments Below I have tried to outline the positive and negative aspects of day care: Positives * When children attend nursery or playschool it’s clear that peer relationships take on increasing importance but peer relationship importance  is important before this . Early as 6 months old babies smile and are more vocal to other infants. * Intellectual stimulation * Helps develop some social skills- building relationship with peers and other trusted adults other than those within the family. * Psychologists have shown there is no affect on the mother-child attachment * Children receive Adequate and nutritious meals Negatives * Putting a child into day care can cause the child stress ( i.e upset from being away from its mother)as can any situation in which the mother isn’t with the child. * If a day care doesn’t have the correct form of attachment for adults and the children as mentioned above ( conclusion raised by Barbara Tizard) this will not have as greater benefits as a quality day care that has this attachment and familiarity etc. * Some research in the US argue that day care can cause the child to grow up to be aggressive and disruptive once they reach school age (research taken from -NICHD national child care study)

Saturday, October 26, 2019

Windows versus Linux Essay examples -- Computer Technology Operating S

Windows vs. LINUX Both Windows and Linux come in many different forms. All the different forms of Windows come from Microsoft, the various distributions of Linux come from different companies (ex. Red Hat, SuSE, Linspire, Ubuntu, Mandriva, Knoppix, etc). Windows has two main lines: â€Å"Win9x†, which is consists of Windows 95, 98, 98SecondEdition and ME, and â€Å"NT class† which consists of Windows NT, 200 and XP. On a side note, Windows first had version 3.x which was made before Windows 95 by a couple of years. The various types of Linux are called distributions. All the Linux distributions released around the same time frame will use the same kernel, which are the guts of the OS. They will differ with the add-on software provided, install process, GUI, documentation, technical support, and price. Linux is a whole lot more customizable in a way that Windows cannot and is not. There are a lot of special purpose versions of Linux as well. If you were going for desktop use, Linux is free or very cheap, and Windows is expensive. For servers, again, Linux is very cheap compared to Windows. Microsoft only allows one computer per copy of Windows. On the other hand, once you purchase Linux you can run it on any number computers at no extra charge. As of January 2005, Windows XP Professional sold for about $200, and the â€Å"full† version of XP sold for around $300, and Windows Server 2003 with 10 client licenses was about $1,100. You can download Linux for free from each of the Linux vendors. In order to run Windows it has to be installed onto the hard disk first. Linux can run just from a CD. Normally Linux also runs off of the hard disk, but there a quite a few versions of Linux which run entirely from a CD without bei... ...d due to the security and cost concerns. There are virtually no viruses for Linux, while there are millions for Windows. In the end, Microsoft will fight the spread of Linux. When Thailand wanted to use Linux based computers available throughout the country, Microsoft then stepped in and made a deal with the Thai Information, Communication and Technology Ministry. You can buy Windows products along with Windows XP and Office XP already on the computer, ready to run and activated for the very low price of the equivalent to $37. When there is a company who is willing to go through these lengths to keep their competitors down in the gutter, there is no way that a non main-stream product can become successful when they are competing with a company such as Microsoft. In the end I think that you should choose which ever operating system fits your personal needs the best.

Thursday, October 24, 2019

The Idea of the Hypersexual Black Male in the Invisible Man Essay

In the Invisible Man by Ralph Ellison, the narrator’s view of women is generally pessimistic. His negative view of women is also reflected by women, specifically of Caucasian ethnicity. Their societal depiction of black men considers them to be hypersexual objects and incapable of anything else. Emma, Brother Hubert’s wife, and Sybil, are three women in particular who possess negative character flaws that allow the narrator to deem them unworthy. Emma’s tremendous dominance give the impression of being unapproachable while Brother Hubert’s wife’s infidelity and ability to control confuses him and finally, Sybil’s decadence makes her appear sloppy. All of these flaws are used to reduce the narrator to a sexual tool at the expense of his intellect. The first woman seen is Emma, a Brotherhood employee, who is perceived to be very powerful and demeaning toward the narrator although physically attracted to him. She engages in limited dialog which, I believe is intended to paint her as diminutive; however she is described as â€Å"smartly dressed† with a â€Å"hard, handsome face† (300). Her...

Wednesday, October 23, 2019

Coping with Anxiety

Kathrina is a 20-something professional with dilemmas that disrupt her from being productive in her career. It also gives her inconsistent sleeping habits, which results from an uneasy feeling from the anxiety that she feels. Furthermore, she feels that her way of coping with such is not improving at all. Such predicaments hamper her career as a real estate agent, which she finds a big deterrent in producing sales. Kathrina’s biggest dilemma is that her parents expect a lot from her.She doesn’t want to leave home yet she already feels uneasy about her situation at home. With this in mind, she resorts to me, a behavioral psychiatrist. Kathrina opts to undergo a series of sessions that will give her the opportunity to deal with anxiety and stress. 1) As a behavioral therapist how would you proceed in therapy in the case of Kathrina? First, I would like the patient to describe her environment while she was growing up. This would help me ascertain what is it like to live in her environment during her childhood.It will allow me to determine how she generates feedbacks and how she behaves in this type of environment. As a behavioral therapist, I have to make her understand that her environment is responsible for her apparent behavior. The environment she thrives in conditions her to be behaving in such way. The environment includes all the people around her and the behavior of this people. She has to understand that her behavior does not deliberately stems from her. In behavioral psychology, it is suggested that behaviors are attained through the environment’s conditioning (Wagner, 2008).As the individual interacts with her environment more, the more she is conditioned to act accordingly to her environment’s standards. As the individual accommodates this conditioning into her system, the more she is influenced by her environment’s conditioning. As I proceed with the subject’s current situation, I learn that she really accommo dates and tolerates the behavioral standards of her situation. She does not have a hand in her apparent behavior at all. The stress from her work is not responsible as well.The environment which is her home is the primary stimulus that affects her behavior, and causes her numerous dilemmas. In a branch of behaviorism, classic conditioning is used to condition a subject to respond to a certain stimulus. Classic conditioning is a type of conditioning in behaviorism, which conditions a subject by instigating a stimulus in order to generate a favorable response (Van Wagner, 2008). In Kathrina’s case, her parents conditioned her in the most effective manner. This leads us to the speculation that Kathrina might not have received classical conditioning at all.Another type of conditioning, Operant conditioning can be suggested as the possible culprit for the apparent behavior of Kathrina. Operant conditioning takes place whenever the subject is conditioned through punishment and rewa rd reinforcements. In Kathrina’s case, she might have received more reward reinforcements than punishment reinforcements. Yet this brings to us the notion that she might have been conditioned by reward reinforcements even if her parents are wrong in giving her reward reinforcements.With this in mind, Kathrina’s case will remain unsolved, and I will suggest further therapy sessions for her to be able to cope up with stress and chronic anxiety. 2) How does behavioral therapy fit, or not fit, with your own personal style? The behavioral approach to therapy is not proper at all. It is very subjective and not objective at all. It is one-dimensional because it simply analyzes the environmental factors that contribute to the individual’s behavior. Both operant and classical conditioning are subjective in approach, and analyzes a subject’s behavior in a bias manner.In Kathrina’s case, her behavior is not really caused by her environment alone. She has also a hand in contributing to her mental tortures. With this in mind, she must shrug her dilemmas aside. Apt therapy can also aid her in this situation she faces. References Van Wagner,K. (2008). Behaviorism. Retrieved March 22, 2008, from http://psychology. about. com/od/behavioralpsychology/f/behaviorism. htm Watson,J. Behaviorism Explained. General Psychology. Published Diestro Ltd. 2000.

Tuesday, October 22, 2019

Free Essays on Motivations

Motivation INTRODUCTION A good first step towards understanding the best way to motivates people is to ask "What do people want from their jobs?" We might answer, "money" or "power" but really it is very difficult to judge because depending on our own individual values and beliefs, we are not all motivated by the same things to the same degree. Managers need to be aware that the things that motivate them may not necessarily motivate their employees. Then what is motivation? MEANING OF IS MOTIVATION? Motivation can be defined as a concept used to describe the factors within an individual which arouse, maintain and channel behaviour towards a goal. It is more the removal of obstacles to good work than it is "inspiring" people to work harder. There is an old saying you can take a horse to the water but you cannot force it to drink; it will drink only if it's thirsty - so with people. They will do what they want to do or otherwise motivated to do. Whether it is to excel on the workshop floor or in the 'ivory to wer' they must be motivated or driven to it, either by themselves or through external stimulus. Motivation is, in effect, a means to reduce and manipulate the gap between an individual's actual state and some desired state and the manager tries to reduce this gap. It is inducing others in a specific way towards goals specifically stated by the motivator. Naturally, these goals as also the motivation system must conform to the corporate policy of the organization. The motivational system must be tailored to the situation and to the organization. In one of the most elaborate studies on employee motivation, involving 31,000 men and 13,000 women, the Minneapolis Gas Company sought to determine what their potential employees desire most from a job. This study was carried out during a 20 year period from 1945 to 1965 and was quite revealing. The ratings for the various factors differed only slightly between men and women, but both gr... Free Essays on Motivations Free Essays on Motivations Motivation INTRODUCTION A good first step towards understanding the best way to motivates people is to ask "What do people want from their jobs?" We might answer, "money" or "power" but really it is very difficult to judge because depending on our own individual values and beliefs, we are not all motivated by the same things to the same degree. Managers need to be aware that the things that motivate them may not necessarily motivate their employees. Then what is motivation? MEANING OF IS MOTIVATION? Motivation can be defined as a concept used to describe the factors within an individual which arouse, maintain and channel behaviour towards a goal. It is more the removal of obstacles to good work than it is "inspiring" people to work harder. There is an old saying you can take a horse to the water but you cannot force it to drink; it will drink only if it's thirsty - so with people. They will do what they want to do or otherwise motivated to do. Whether it is to excel on the workshop floor or in the 'ivory to wer' they must be motivated or driven to it, either by themselves or through external stimulus. Motivation is, in effect, a means to reduce and manipulate the gap between an individual's actual state and some desired state and the manager tries to reduce this gap. It is inducing others in a specific way towards goals specifically stated by the motivator. Naturally, these goals as also the motivation system must conform to the corporate policy of the organization. The motivational system must be tailored to the situation and to the organization. In one of the most elaborate studies on employee motivation, involving 31,000 men and 13,000 women, the Minneapolis Gas Company sought to determine what their potential employees desire most from a job. This study was carried out during a 20 year period from 1945 to 1965 and was quite revealing. The ratings for the various factors differed only slightly between men and women, but both gr...

Monday, October 21, 2019

nano-technology essays

nano-technology essays One of the big problems not fully appreciated with current ideas in nano technology research is the energy requirement for the development of shuttles and using it to carry the bots to other planets. First of all, the design of the shuttle would have to be very intricate because it would have to be able to manage to intense cold since it has to travel farther and farther away from the sun. And as for the probes that are going to build a base for colonization, it requires a new type of energy unlike solar power because as it travels farther, there would not be enough solar energy to make the bots function. Battery-charged energy would also fail because the probes are designed to stay on the planet long enough to build the base. A new type of energy that the group created is some type of regenerative energy that is built inside the probes. This allows the probes the period of time to build the base. Another requirement or idea that is needed for our invention that is not present in the world today is some sort of advanced satellite transmission. Since the probes have to travel very far, it has to be able to transmit information that is collected from its exploration on the planets. The present technology does not allow satellite transmission, for example, in Pluto. That is the reason why we need new and improved satellites. Another method is to place better satellites that are able to withstand extreme weather changes, between the planets in intervals. For example, we would position a satellite at Saturn and one near the Earth. The probe would be able to send information from Pluto to the satellite near Saturn. Then the satellite would transmit the info to the satellite located near Earth. ...

Sunday, October 20, 2019

All About the Habits and Traits of Carpenter Bees

All About the Habits and Traits of Carpenter Bees Carpenter bees dont exactly endear themselves to people. They excavate nests in wood decks, porches, and homes, and the males tend to  exhibit an unsettling aggressiveness. However, despite their bad behavior, carpenter bees are quite harmless and are actually excellent pollinators. Large carpenter bees (about 500 different species) belong to the genus Xylocopa. Interestingly, these insects inhabit every continent except Antarctica. Identifying Carpenter Bees Carpenter bees get their name from their woodworking skills. These solitary bees excavate nest tunnels in wood, especially in lumber that is bare and weathered. Over several years, the damage to wood can become quite extensive, as the bees expand old tunnels and excavate new ones. Carpenter bees often nest in decks, porches, and eaves, putting them in close proximity to people. Xylocopa bees look quite similar to bumblebees, so its easy to misidentify them. Look at the upper side of the bees abdomen to differentiate the two kinds of bees. While bumblebee abdomens are hairy, the top of a carpenter bees abdomen will be hairless, black, and shiny. Male carpenter bees will hover around nest entrances, chasing away intruders. They lack a sting, though, so just ignore their buzzing and aggressive flights around your head. Females do sting, but only if seriously provoked. Refrain from swatting at them, and you shouldnt have to worry about carpenter bees causing you harm. Carpenter Bee Classifications Kingdom: AnimaliaPhylum: ArthropodaClass: InsectaOrder: HymenopteraFamily: ApidaeGenus: Xylocopa Diet and Life Cycle Like honey bees, carpenter bees feed on pollen and nectar. Female bees provision their larvae with food by placing a ball of pollen and regurgitated nectar in the brood cell. Its important to note that carpenter bees do not feed on wood at any time during their life cycle. Carpenter bees overwinter as adults, usually within vacant nest tunnels. As the weather warms in spring, the adults emerge and mate. Males die after mating, while females begin excavating new tunnels or expanding tunnels from previous years. She constructs brood cells for her offspring, provisions them with food, and then lays an egg in each chamber. Eggs hatch within a few days, and the young larvae feed on the cache left by the mother. Within a period of five to seven weeks, depending on environmental conditions, the bee pupates and reaches adulthood. The new adult generation emerges in late summer to feed on nectar before settling in for the winter. Special Adaptations and Defenses Though they are good pollinators of open-faced flowers, deeper flowers present a challenge for the large carpenter bees. To get to the sweet nectar, they will slit open the side of the flower, breaking into the nectary center and robbing the flower of its juices without providing any pollination services in exchange. Carpenter bees practice buzz pollination, an active method of collecting pollen grains. When it lands on a flower, the bee uses its thoracic muscles to produce sound waves that shake the pollen loose.

Saturday, October 19, 2019

Emotional Intelligence and Leadership Essay Example | Topics and Well Written Essays - 1250 words

Emotional Intelligence and Leadership - Essay Example When leading others, a good leader will be willing to express emotions that are well aligned to the objective. This is either meant to encourage the subjects or to stress a point and show its importance. If the leader is also capable of reading other people’s emotions, he or she will be in a better position to deal with them knowing how well they accept the plans or how they perceive the project or the leader. This can be important in planning and motivating the subjects. This paper will analyze the five main elements of emotional intelligence and their application in leadership skills.Self-awarenessThis is the first element of emotional intelligence. With emotional intelligence, a leader is capable of being self-aware. This means that he or she knows and understand what he or she feels. This also encompasses the knowledge of the emotions and their effects on other people. To develop this kind of competence, a leader should be ready to put more focus on self-development aiming at making it possible first to know self before seeking to know others. This is the aspect of emotional intelligence referred to as action-based (Antonakis et al. 2009, pp. 247–261.). For this, three steps model is used. In this model the leader is supposed first to know self, be aware of his or her reactions to various situations. Then, the leader should be able to choose himself or herself. This means that the leader shifts the reactions from unconscious to intentional responses guided by competencies and optimism. Through the choosing.

Friday, October 18, 2019

The Mexican revolution of the 1910s Essay Example | Topics and Well Written Essays - 1000 words

The Mexican revolution of the 1910s - Essay Example Though much of The Mexican revolution of the 1910’s speaks about bringing down the President Porfirio Diaz from his power; the main idea behind it was to bring justice to the people who were longing for it and ensure proper distribution of wealth through a fight against the foreign imperialists. Though the youth tried to get into politics and begin a fresh phase of rule that would change lives of people to a better standard, they were not given this opportunity. The imperialism that prevailed in the people with power left people in silence though, they had an opinion to express and a wish to elect their leader. But the youth of Mexico however made it to the throne. They acquired the power after a long struggle from the hands of the imperialists and brought their people what they wanted, freedom. The people living in the borders of the Mexico and the United states have seen the worst phase of this revolution. The Mexican people resisted the control the U.S over these places and fought against them. This revolution saw blood of both the Nations. People even migrated from Mexico borders to keep away from this violence. This image shows a family trying to migrate from Mexico border that had seen violence in many forms. Initially it was the rule of the President Porfirio Diaz which weakened their minds and to add to their misery the imperialism by the U.S people left them to going away to safer places. Many of them migrated to California and some people to Los Angeles hoping the war would end in a few months but it didn’t and actually lasted a for years. "We were running away from the rebellion. . . . We came to the United States to wait out the conclusion of the Revolution. We thought it would be over in a few months."(Mexicans and Mexican-Americans). However the boundaries between the two nations (Mexico and The U.S) had been a controversy since ages and this has been the issue for the Mexican revolution of the 1910’s as well. Even today the b oundary separation has its conflicts going on. Though attempts were made to pacify people on the boundaries of the Nations, they proved futile with the discrepancies the people had among the ownership of the lands. The period 1910-1920 has seen the worst phase with wars in many places. The Mexicans attacked the Anglos and their stores and railroads. The picture above shows the Mexican troops marching in Juarez, Mexico during the Mexican revolution in the 1910’s. This Mexican revolution of the 1910’s however would leave an impression on anybody who carefully studies and understands the history and the story behind the imperialistic foreigner’s strategy. I, feel that though there have been complaints about the then President of Mexico, Porfirio Diaz, and his selfish rule that had concentrated wealth and power in the hands of a few, which rendered people of Mexico helpless and other issues pertaining to the rule of their government and confiscating lands from peasa nts, there had always been a bigger issue, the imperialistic foreigners who took away the power of people and controlled their lands. This issue certainly appealed to everybody who knew the history of the Mexican Revolution because the other problems the Mexicans had with their government and the peasants could be solved among them at some point in time and they were categorically domestic issues which needed just the attention of some people of the Nation. But the

The reflection as successful ability of the students Essay

The reflection as successful ability of the students - Essay Example The reflection is the successful ability of the student to relate the theoretical approach with the professional challenges. The student should be able to understand the requirements that the respective profession and job sought from the candidate. The development of the critical and analytical skills is, therefore essential to handle the requirements of the profession with the logical approach under professional acumen. The professional obligations shall be realised by the candidates, and this has been possible by relating the learning experiences with the current situation. The difference between the role and responsibility of the student and candidate is the accountability of the latter. The candidate is under compulsion to involve in the interactive sessions inside the classroom to understand and develop professional motivation and direction. Considering the relevant example of the business situations, under my capacity as Business Analyst for the financial institution, it is exp ected that candidate shall be able to handle and resolve the economic issues of the company, and generate business opportunities for the company.

Thursday, October 17, 2019

Cross Culture Marketing strategy2 Article Example | Topics and Well Written Essays - 500 words

Cross Culture Marketing strategy2 - Article Example They tend to take steps of the business context to make sure that relationships do not stop at just being business partners, but establishes allegiances as well. They believe that this method results to the establishment of harmonious relationships, with trust and loyalty, and eventually leads to a successful business relationship, where conflicts are resolved through mediation. For collectivists, â€Å"hasty litigation may be interpreted as uncompromising and self-oriented† (5), a big deviation from their sense of affective commitment, where business partners are treated as family. Entertainment, in the form of wining and dining is â€Å"a means of gauging the other party’s values, trustworthiness, and willingness to compromise† (2). This way, a possible business partner can be gauged or assessed according to his behavior not just as a possible business partner but a man and a future friend and â€Å"family† since â€Å"collectivists operate on solidarit y and share values† (4). Gift-giving on the other hand, is viewed by collectivists as a positive gesture. It is an expression of the â€Å"desire for partnership success† (James 5). Partnership success in a collectivist’s view means a lasting and enduring relationship with a sense of duty and obligation to each other (2). For a collectivist, â€Å"investments in time, energy and resources were acknowledged as pledges or signals to the buyer that the supplier was benevolent† (5). 2. In a collectivist culture, decisions are made collectively by senior members (James 2) and information sharing is of utmost importance. Being relationally oriented (1), with trust, commitment, cooperation, loyalty and obligation to his organization, it is not surprising that collectivist cultures rely more heavily on the use of social media. In high-context cultures, people prefer a less explicit form of communication (5). They prefer indirect

Research Article Paper Example | Topics and Well Written Essays - 3250 words

Article - Research Paper Example This relationship is the essence of organizational behavior as Sims (2002) defines organizational behavior â€Å"as the actions and attitudes of people in the organization.† These actions and attitudes of people are greatly shaped by their personality traits and play a significant role in their organizational performance. Similarly, the research article also deals with the advancement of organizational effectiveness. This is done by providing ways to effectively manage the various dimensions of an individual’s personality such as extraversion, agreeableness, conscientiousness, emotional stability and openness to experience. Elanain’s (2007) article starts with an introduction which discusses previous researches regarding the relationship between personality and job performance. The existing literature indicates a significant relationship personality traits and performance dimensions. The introduction then gives a definition of personality traits as enduring patte rns of thought, emotion, and behavior that are not likely to change over time and explain people’s behavior across different situations. ... The article further indicates an inconsistency in the personality-performance relationship which is explained by individual variables and situational conditions that encourage or limit the influence of personality attributes on performance, and influence the relationship between personality traits and performance. In order to control the effects on Organizational Citizenship Behavior, an individual dimension (work locus of control) and situational dimension (organizational justice) are used. The introduction ends with an explanation of the purpose of the study which is to examine the relationship between FFM personality traits and OCB after controlling the impact of the control variables (Elanain, 2007). The overall introduction is quite logical and explanatory. It provides readers with the definitions and descriptions of variables involved in the study. Furthermore, the introduction also provides evidence from previous researches that support the existing research paper. On the othe r hand, the author mentions the purpose of the research at the end of the introduction, but there is no further explanation provided. In addition, there is no section of Problem of the Statement which would have been helped the readers understand the issue under study better (Elanain, 2007). Theoretical Framework/Hypotheses The author then discusses the literature review which is divided into three parts; the Five-Factor Model (FFM) of Personality, the Organizational Citizenship Behavior (OCB) and predicting OCB from personality. Here the author provides the five dimensions of FFM that include, Extraversion (sociable vs. introverted), Agreeableness (cooperative vs. competitive), Conscientiousness (organized and planful vs. unorganized and careless),

Wednesday, October 16, 2019

Cross Culture Marketing strategy2 Article Example | Topics and Well Written Essays - 500 words

Cross Culture Marketing strategy2 - Article Example They tend to take steps of the business context to make sure that relationships do not stop at just being business partners, but establishes allegiances as well. They believe that this method results to the establishment of harmonious relationships, with trust and loyalty, and eventually leads to a successful business relationship, where conflicts are resolved through mediation. For collectivists, â€Å"hasty litigation may be interpreted as uncompromising and self-oriented† (5), a big deviation from their sense of affective commitment, where business partners are treated as family. Entertainment, in the form of wining and dining is â€Å"a means of gauging the other party’s values, trustworthiness, and willingness to compromise† (2). This way, a possible business partner can be gauged or assessed according to his behavior not just as a possible business partner but a man and a future friend and â€Å"family† since â€Å"collectivists operate on solidarit y and share values† (4). Gift-giving on the other hand, is viewed by collectivists as a positive gesture. It is an expression of the â€Å"desire for partnership success† (James 5). Partnership success in a collectivist’s view means a lasting and enduring relationship with a sense of duty and obligation to each other (2). For a collectivist, â€Å"investments in time, energy and resources were acknowledged as pledges or signals to the buyer that the supplier was benevolent† (5). 2. In a collectivist culture, decisions are made collectively by senior members (James 2) and information sharing is of utmost importance. Being relationally oriented (1), with trust, commitment, cooperation, loyalty and obligation to his organization, it is not surprising that collectivist cultures rely more heavily on the use of social media. In high-context cultures, people prefer a less explicit form of communication (5). They prefer indirect

Tuesday, October 15, 2019

Zeitgeist of the Twentieth Century - H. R. Giger Essay

Zeitgeist of the Twentieth Century - H. R. Giger - Essay Example Another important point of inspiration in his work is culture, to be more precise – the integration of all cultures into one phenomenon. Art has been a focal point for a variety of cultures since the history of time   new dimension of art. It is an expression of how a race or a group of people perceive themselves in relation with the world around them. In this context, an important premise remains the fact that art is born from within and from influences that come from the outside. This has been studied from the perspective of various art forms, ancient, medieval and modern so as to demonstrate how cultures are capable of affecting art forms and rendering finer detail to the structure. His inspiration has conceptualised the way art has been seen and used since 1985 with the advent of mass media and especially the Internet. This conceptualisation has reached a phase where the influx of ideas related with the use of technology and mass media has grown to such heights where it accommodates a whole new dimension of art.It is said that the way something is built has a large bearing on how it is perceived. In the case of art, the use of mass media has accentuated the play of technology to the extent that the very way that an art form is conceptualised depends on the factors that are a part of the culture surrounding it. Since 1985, the play of mass media has begun on a note that has created the scope to create art beyond what has been seen in the conventional sense.... It is an expression of how a race or a group of people perceive themselves in relation with the world around them. In this context, an important premise remains the fact that art is born from within and from influences that come from the outside. This has been studied from the perspective of various art forms, ancient, medieval and modern so as to demonstrate how cultures are capable of affecting art forms and rendering finer detail to the structure. His inspiration has conceptualised the way art has been seen and used since 1985 with the advent of mass media and especially the Internet. This conceptualisation has reached a phase where the influx of ideas related with the use of technology and mass media has grown to such heights where it accommodates a whole new dimension of art. It is said that the way something is built has a large bearing on how it is perceived. In the case of art, the use of mass media has accentuated the play of technology to the extent that the very way that an art form is conceptualised depends on the factors that are a part of the culture surrounding it. Since 1985, the play of mass media has begun on a note that has created the scope to create art beyond what has been seen in the conventional sense. The rise of technology has been accentuated by the west. Technology has come from the west and is associated with the west. Thus, an important premise here is that most of world sees western culture as an amalgamation of technology along with an ethic that is associated with the same. Communication forms in the form of electronic, print and other media has had a major role in deciding how western culture is perceived to begin with. Thus, art has been accepted in context of these communication forms that dominate the various

In-band or out-of-band SAN appliances Essay Example for Free

In-band or out-of-band SAN appliances Essay Out-of band SAN appliances allow for independent flow of data between servers and storages since it does not function within the data path (InfoWorld, 2001). In addition, execution of management functions by these appliances is independent of application servers, a factor which dictates for having host drives. This has the implication that the positioning of an out-band SAN appliance posses performance concerns in the system (InfoWorld, 2001). Another implication is that increase in the number of server in such a system complicates administration issues. Still, out-of band SAN appliances have its meta-data and control operations separate from the data path. This coupled with the need for having a driver at each host frees the host to engage only in transferring data to and from the storage. Nevertheless, this configuration has the advantage of caching due to the request time delays involved in linking data path information and the appliance for processing. On the other hand, in-band SAN appliances employ a single device for executing all the basic storage management functions namely; data path, control operations, and meta-data management (Kornfeld, 2001). This has the implication that no additional driver software is needed in the host. Also, this enhances scalability of the SAN system. However, this limits the application of in-band SAN appliances in a busy SAN since both meta-data and control operations share the same data path. Despite this, in-band SAN appliances enjoy the privilege of allowing for caching and clustering (InfoWorld, 2001). In addition, being a single device, in-band SAN appliances boast of low cost of implementation and ease of administration (Kornfeld, 2001). Therefore, both in-band and out-of-band SAN appliances have advantages as well as disadvantages. Considerations before choice of a SAN appliance should thus be based on the needs in the particular organization.

Monday, October 14, 2019

Effect Of Caffeine On Breathing And Pulse Rate Biology Essay

Effect Of Caffeine On Breathing And Pulse Rate Biology Essay Caffeine is a natural chemical substance known to have stimulant properties within the body (Addicott MA Laurienti PJ, 2009). Prior research focused on caffeines ability to affect ventilation, blood pressure, mood, and mental stress (Kennedy MD et al. 2008; Addicott MA Laurienti PJ, 2009). Their findings concluded that caffeine actually spiked blood pressure, ventilation and heart rate (Kennedy MD et al., 2008); while others claimed that it had no effect on heart rate or breathing (Ratliff-Crain J et al., 1989). Some gaps in these studies were that very few actually measured the rate of breathing, but rather focused on the volume of breathing and the percent oxygen saturation/diffusion (Chapman R Stager JM, 2008), as well as blood pressure, rather than heart rate (Ratliff-Crain J et al., 1989). This experiment aimed at finding a clear relationship between ingesting caffeine, and its effect, if any, on breathing and heart rate, after the subjects performed incremental stepping exercises. The significance of this study is vital in sport, particularly caffeines role in the Olympics (Spriet LL, 1995), and its potential as a prophylactic in treating asthma (Welsh EJ et al., 2010). Methods: See School of Biological Sciences (2010). Refer to Appendix (1) for the hypotheses. Results: Using the t-test it was found that the mean (+/- range) change in pulse rate was not significantly different between non-caffeine (Group A) and caffeine (Group B) treated subjects (t=0.4, df=161, P=0.7 ie P>0.05). (Refer to Appendices 2a, 2b,3a, and 3b for the data and t-test) Figure 1: The mean of changes in the pulse rate of non-caffeinated (control) and caffeinated (treatment) participants after performing a stepping exercise. Error bars are the range. N=140 and n= 75 for the non-caffeinated and caffeinated groups respectively. Using a paired two sample for mean t-test it was found that the mean (+/- range) change in respiration rate was not significantly different between non-caffeine (Group A) and caffeine (Group B) treated subjects (t=-0.7, df=132, P=0.5 ie P>0.05). (Refer to Appendices 2a, 2b,3a, and 3b for the data and t-test) Figure 2: The mean of changes in the breathing rate of non-caffeinated (control) and caffeinated (treatment) participants after doing a stepping exercise. Error bars are the range. N=140 and n= 75 for the non caffeinated and caffeinated groups respectively. Discussion: The results of the investigation revealed that the difference in mean pulse rate change between the two groups was 1.1 BPM and the mean breathing rate was 1 BRPM. This indicated that there were no significant difference between mean change in pulse rate and breathing rate between the group that was taking the caffeinated drink (treatment), and the group that ingested the non -caffeinated beverage (control). Therefore, since (P>0.05) the null hypothesis (HO) was accepted, and the alternative hypothesis (HA) was rejected. Prior research revealed that caffeine had no significant effect on the ventilator responsiveness or exercise ventilation on exercise -induced subjects following the administration of a moderate dose of caffeine (8mg per kilogram of body weight). Any modest increase in breathing rate was attributed to caffeines secondary effect on the Central Nervous System, rather than a direct effect on the respiratory system (Chapman R Stager JM, Caffeine stimulates ventilation in athletes with exercise-induced hypoxemia, 2008). However, other studies have suggested that caffeine acted in the manner of a ventilator stimulant and increased the breathing rate of individuals (Chapman R Mickleborough TD, 2009). Similar studies found that caffeine increased the mean change in pulse rate by 6 beats/min an hour after ingesting caffeinated coffee (350mL, 140mg of Caffeine). This revealed that while caffeine may affect the heart rate, its relative impact had no significant effect (Kennedy MD et al., 2008). Further research concluded that regular consumption of coffee could not increase the heart rate and blood pressure; unless consumed chronically and excessively (Ratliff-Crain J et al., 1989). The experimental data revealed that naturally there were a large range of values, beginning from as low as {3 BPM, 1 BRPM} and peaking to {110 BPM, and to 62 BRPM} respectively. The issue with having such a large range was that it masked any significance to the mean. The extreme data points would distort the mean value, even if caffeine had proven to have a significant effect. Thus, its effect would not be reflected in the results. Whilst increasing the sample size and repeating the experiment a number of times would improve the reliability of the experiment, it would do little to increase the precision of results. This is due to the presence of natural variation. Different people have differing athletic ability, sensitivity to caffeine, or gender differences, which the sample sizes (n=140 and n=75), did not account for. The failure to take account for the nature of the sample sizes greatly reduced the power of the experiment. Research suggests that males and females may actually hav e distinct responses (Kennedy MD et al., 2008), and so must be accounted for separately. This could be improved by separating the caffeinated and non- caffeinated groups into gender types, and perhaps only observing its effect on athletes (Chapman R Stager JM, Caffeine stimulates ventilation in athletes with exercise-induced hypoxemia, 2008). The amount of coffee may have been too small experimentally to produce a noticeable effect. Switching the dose to a full cup of coffee could enhance the effects of caffeine (Kennedy MD et al., 2008), or perhaps the length of time between ingestion and exercise was too short. Increasing the period from 1 hour to 2 hours could give caffeine more time to produce its effects (Kennedy MD et al., 2008). The accuracy of the results could have been improved by using more sophisticated counting methods to measure heart rate like using a digital pulse readout (i.e. an ECG), or percentage arterial oxyhemoglobin saturation to measure ventilation, which would produce more accurate results (Chapman R Stager JM, Caffeine stimulates ventilation in athletes with exercise-induced hypoxemia, 2008). The implication of this study is particularly important in the issue of caffeine bans from the International Olympic Committee, and whether or not it provides legal ergogenic advantage to athletes in short distance running or other aerobic activities. The rules governing caffeine ingestion prior to exercise may be revised if caffeine is proven to have substantially enhanced the athletes pulmonary capabilities (Spriet LL, 1995). Other future studies of caffeine include developing prophylactics for asthma (from its anti-inflammatory and bronchodilator properties). Randomised clinical trials have already confirmed improvements in lung function after using caffeine. This could produce new front line drugs to treat asthma (Welsh EJ, 2010). In conclusion, the caffeinated and non caffeinated groups showed a slight mean difference of 1.1 BPM and 1 BRPM, but statistically, there were no significant change in the mean heart rate or the mean breathing rate, which means the null hypothesis was accepted (P>0.05), and the effects of caffeine was not proven conclusive on either. References: Addicott MA, Laurienti PJ. (2009). A comparison of the effects of caffeine following abstinence and normal caffeine use. Psychopharmacology , 207 (3), 423-31. Chapman R, Mickleborough TD. (2009). The effects of caffeine on ventilation and pulmonary function during exercise: an often-overlooked response. Phys Sportsmed. , 37 (4), 97-103. Chapman RF, Stager JM. (2008). Caffeine stimulates ventilation in athletes with exercise-induced hypoxemia. Medicine and Science in Sports and Exercise , 40 (6), 1080-6. Graham TE, Hibbert P, Sathasivam P. (1998). Metabolic and exercise endurance effects of coffee and caffeine ingestion. Journal of Applied Physiology , 85 (3), 883-9. Kennedy MD, Galloway AV, Dickau LJ, Hudson MK. (2008). The cumulative effect of coffee and a mental stress task on heart rate, blood pressure, and mental alertness is similar in caffeine-naÃÆ'Â ¯ve and caffeine-habituated females. Nutrition Research. , 28 (9), 609-614. Ratliff-Crain J, OKeeffe MK, Baum A. (1989). Cardiovascular reactivity, mood, and task performance in deprived and nondeprived coffee drinkers. Health Psychol. 1989 , 8 (4), 427-427. School of Biological Sciences, The University of Sydney. (2010). Human Biology: Unit of Study Manual for Students. Spriet LL. (1995). Caffeine and Performance. International Journal of Sport Nutrition. , S84-99. Welsh EJ, Bara A, Barley E, Cates CJ.(2010). Caffeine for asthma. Cochrane Database Systematic Reviews. 1(1): CD001112.

Sunday, October 13, 2019

Successful Management of a Diverse Workforce Essay -- essays research

Successful Management of a Diverse Workforce Being successful at managing workforce diversity involves attracting and retaining the highest quality individuals in the talent pool. For managers it means learning how to manage human potential sensitively. It requires an ever-increasing awareness of how people from different backgrounds deal with authority, communication, overall business etiquette, and relate to their communities of affiliation. Successful management of workforce diversity is a process that takes place in many stages and on many levels. It requires managers to first recruit a competent and qualified staff, then to accommodate individual needs within the context of the work team and the organization. However, the key to successfully building a diverse, high-quality workforce for tomorrow begins with a strong leadership commitment and knowledge of where the organization is today. Moreover, experience has demonstrated that successful diversity initiatives depend on positioning the organization first. (Department of Personnel Management, 2002) Diversity Initiatives: What They Are. A "diversity initiative" is a company's strategic response to diversity. The initiative looks at the company's needs in the area of diversity and responds with a strategically aligned approach. The initiative should have a long-term focus, as well as very specific goals and objectives. It should also be easily measurable and tied to the organization's overall business strategy. In terms of implementing the initiative, the entire organization - from the top down - should be held accountable. (U.S. Office of Personnel Management, 2004) Once the vision has been developed, the organization should then develop a diversity plan. The plan outlines the goals and objectives for diversity. Many companies see fit to appoint a diversity committee, comprised of a wide variety of people and perspectives, to help implement the plan. The plan may call for training on diversity, enhancing recruiting efforts to attract and retain women and people of color, or looking at succession planning, among other issues. Leading a Diverse Workforce Today we are more likely to encounter, interact with, work with, report to, or manage numerous individuals of different backgrounds, races, ethnicities, religions, belief systems, and cultures. While we all may have the same values, ... ...ly manages diversity is critical as organizations attempt to attract, motivate, and retain employees from a workforce that is growing in variety and complexity. American business will not be able to survive if we do not have a large diverse workforce, because those are the demographics. The company that gets out in front of managing diversity will have a competitive edge. References Stoner, C., & Russell-Chapin, L (1997). Creating a culture of diversity management: moving from awareness to action. University of California. Retrieved April 8, 2005 from University of Phoenix, InfoTrac Copeland, L. (2004). Valuing Diversity training series. Reprinted with permission from the NOAA Training manual, Silver Spring, MD. U.S. Office of Personnel Management (OPM). (2000, June). Building and Maintaining a Diverse and High Quality Workforce. Retrieved April 7, 2005 from: http://www.opm.gov/Diversity/guide.htm U.S. Census Bureau (2003). 2003 American Community Survey data. Retrieved April 10, 2005 from: http://factfinder.census.gov/servlet/ACSSAFFPeople?_event=&geo_id=01000US&_geoContext=01000US&_street=&_county=&_cityTown=&_state=&_zip=&_lang=en&_sse=on&ActiveGeoDiv=&_useEV=

Friday, October 11, 2019

Brave New World Essay -- essays research papers

Ivan Denisovich essay In his 17th century pem, â€Å"To Althea from Prison†, Richard Lovelace tells us that â€Å"stone walls do not a prison make, nor iron bars a cage.† Thus Lovelace introduces and makes the reader familiar with the paradoxical nature of freedom. This paradox is raised again when comparing two legitimate visions of the modern world: Aldous Huxley’s Brave New World and Alexander Solzhenitsyn’s One Day in the Life of Ivan Denisovich. One day in the life of Ivan Denisovich vividly describes and allows the reader to live through life in a prison, where an individuals rights are stripped away, and Brave New World introduces the reader to a fantasy world filled with sex, drugs, and a total lack of inhibition and self-reserve. Although apparently unrelated, both novels together describe what could be considered a modern hell. In Solzhenitsyn’s novel Shukov is stripped of his rights and his free will, while Huxley’s characters are stripped of independen ce of thought and brainwashed into mindless decadence. A comparison of the worlds created by Solzhenitsy and Huxley prompts us to redefine imprisonment of freedom, yet the brain that is enslaved in Huxley’s novel is truly less free than the body enchained in Solzhenitsyn gulag.   Ã‚  Ã‚  Ã‚  Ã‚  Alexander Solzhenitsyn carefully and tediously depicted what life is like in a prison. Ivans monotonous life prompts the reader initially to think that Ivans day is a living death of tedious details. Yet, in truth, Ivan i...

Drm Exma Ii

Chapter 6 1. Which of the following is a purpose of the SQL standard? A)To specify syntax and semantics of SQL data definition and manipulation B)To specify minimal and complete standards, which permit different degrees of adoption in products C)To define the data structures and basic operations for SQL databases D)All of the above Answer: D Level: ModeratePage Ref: 312 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 2. The benefits of a standardized relational language include: A)application longevity. B)reduced training costs. C)cross-system communication.D)All of the above Answer: D Level: ModeratePage Ref: 313 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 3. The _____ is the structure that contains descriptions of objects such as tables and views created by users. A)SQL B)schema C)catalog D)master view Answer: B Level: EasyPage Ref: 314 Topic: The SQL Environment AACSB Use of Information Technology, Ana lytic Skills 4. _____ is a set of commands used to control a database, which includes security. A)DML B)DDL C)DCL D)DPL Answer: C Level: EasyPage Ref:315 Topic: The SQL Environment AACSB Use of Information Technology . _____ is a set of commands used to update and query a database. A)DML B)DDL C)DCL D)DPL Answer: A Level: EasyPage Ref: 315 Topic: The SQL Environment AACSB Use of Information Technology 6. DDL is typically used during which phases of the development process? A)Implementation B)Physical design C)Analysis D)All of the above Answer: B Level: DifficultPage Ref: 314, 315 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 7. The SQL command _____ defines a logical table from one or more tables or views. A)create table B)alter table C)create view D)create relationshipAnswer: C Level: EasyPage Ref:319 Topic: Defining A Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology 8. Any create command may be rev ersed by using a ________ command. A)truncate B)drop C)delete D)unpack Answer: B Level: EasyPage Ref: 319 Topic: Defining a Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology, Analytic Skills 9. The first in a series of steps to follow when creating a table is to: A)identify columns that must be unique. B)identify each attribute and its characteristics. C)create an index.D)identify columns that must be null. Answer: B Level: ModeratePage Ref: 319 Topic: Defining a Database in SQL Subtopic: Creating Tables AACSB Use of Information Technology, Analytic Skills 10. The SQL command _____ adds one or more new columns to a table. A)create table B)alter table C)create view D)create relationship Answer: B Level: EasyPage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology, Analytic Skills 11. What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A) Alters the Customer_T table to accept Type 2 VarcharsB)Alters the Customer_T table to be a Type 2 Varchar C)Alters the Customer_T table, and adds a field called â€Å"Type† D)Alters the Customer_T table by adding a 2-byte field called â€Å"Varchar† Answer: C Level: ModeratePage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology 12. What does the following SQL statement do? Delete from Customer_T where state = ‘HI’; A)Deletes all records from customer_t where the state is equal to HI B)Removes the customer_t table from the database C)Deletes all records from the customer_t table D)None of the aboveAnswer: A Level: ModeratePage Ref: 326 Topic: Inserting, Updating, and Deleting Data Subtopic: Deleting Database Contents AACSB Use of Information Technology, Analytic Skills 13. What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A)Changes the price of a unit called Product_T to 7 B)Changes the unit price of Product 7 to 775 C)Changes the length of the Unit_Price field to 775 D)Updates the Product_T table to have a unit price of 775 Answer: B Level: ModeratePage Ref: 327 Topic: Inserting, Updating, and Deleting Data Subtopic: Updating Database ContentsAACSB Use of Information Technology, Analytic Skills 14. Which of the following is a technique for optimizing the internal performance of the relational data model? A)Avoiding indexes on secondary keys B)Clustering data C)Not reporting statistics to save machine resources D)Using random index organizations Answer: B Level: ModeratePage Ref: 327 Topic: Internal Schema Definitions in RDBMSs AACSB Use of Information Technology 15. Indexes are created in most RDBMSs to: A)provide a quicker way to store data. B)decrease the amount of disk space utilized. C)provide rapid random and sequential access to base-table data.D)increase the cost of implementation. Answer: C Level: ModeratePage Ref: 328 Topic: Internal Schema Definition in RDBMSs Subtopic: Creating Indexes AACSB Use of Information Technology 16. In an SQL statement, which of the following parts states the conditions for row selection? A)Select B)From C)Where D)Group By Answer: C Level: EasyPage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 17. What does the following SQL statement do? Select * From Customer Where Cust_Type = â€Å"Best†A)Selects all the fields from the Customer table for each row with a customer labeled â€Å"best† B)Selects the â€Å"*† field from the Customer table for each row with a customer labeled â€Å"best† C)Selects fields with a â€Å"*† in them from the Customer table D)Selects all the fields from the Customer table for each row with a customer labeled â€Å"*† Answer: A Level: ModeratePage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 18. What result will the following SQL statement produce? Select Avg(standard_price) as average from product_v;A)The average of all products in product_v B)The average standard_price of all products in product_v C)The average price of all products D)None of the above Answer: B Level: ModeratePage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 19. Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A)How many products are in the Product Table? B)How many products have product descriptions in the Product Table? C)How many characters are in the field name â€Å"Product_Description†?D)How many different columns named â€Å"product Description† are there in table Product_T? Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: U sing Functions AACSB Use of Information Technology, Analytic Skills 20. What results will be produced by the following SQL query? Select sum(standard_price) as total_price from product_v where product_type = ‘WOOD’; A)The total price of all products that are of type wood B)The total price of all products C)The standard_price of the first wood product in the table D)The standard_price of any wood product in the table Answer: A Level: DifficultPage Ref: 331Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 21. Which of the following counts ONLY rows that contain a value? A)Count B)Count(*) C)Tally(*) D)Checknum Answer: A Level: ModeratePage Ref: 331,332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 22. Which of the following will produce the minimum of all standard prices? A)Select standard_price from product_v where standard_price = min; B)Select min(standard_price) from product_v; C)Select standard_price from min(product_v);D)Select min(standard_price) from product_v where standard_price = min(standard_price); Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 23. What will result from the following SQL Select statement? Select min(product_description) from product_v; A)The minimum value of product_description will be displayed. B)An error message will be generated. C)The first product description alphabetically in product_v will be shown. D)None of the above. Answer: C Level: DifficultPage Ref: 331, 332 Topic: Processing Single TablesSubtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 24. Which of the following is the wildcard operator in SQL statements? A) B) * C) = D) & Answer: B Level: EasyPage Ref: 332, 333 Topic: Processing Single Tables Subtopic: Using Wildcards AACSB Use of Information Technology, Analytic Skills 25. What result set will the following query return? Select item_no from order_v where quantity > 10; A)The item_no of all orders that had more than 10 items B)The order_id of all orders that had more than one item C)The order_id of all orders that had more than 10 itemsD)The item_no of all orders that had 10 or more items Answer: A Level: ModeratePage Ref: 333 Topic: Processing Single Tables Subtopic: Using Comparison Operators AACSB Use of Information Technology, Analytic Skills 26. Which of the following is true about the SQL statement? Select * From Product Where Quantity = 1 Or Quantity = 2; A)All fields will be selected from the Product table for products that have a quantity of 1. B)All fields will be selected from the Product table for products that have a quantity of only 2. C)All fields will be selected from the Product table for products that have a quantity of 1 or 2.D)None of the above. Answer: C Level: ModeratePage Ref: 333-336 Topic: Proces sing Single Tables Subtopic: Using Boolean Operators AACSB Use of Information Technology, Analytic Skills 27. What result set will the following query return? Select item_no, description from item where weight > 100 and weight < 200; A)The item_no and description for all items weighing less than 100 B)The item_no for all items weighing between 101 and 199 C)The item_no and description for all items weighing between 101 and 199 D)The item_no for all items weighing more than 200 Answer: C Level: ModeratePage Ref: 336, 337Topic: Processing Single Tables Subtopic: Using Ranges for Qualification AACSB Use of Information Technology, Analytic Skills 28. To eliminate duplicate rows in a query, the _____ qualifier is used in the SQL Select command. A)alter B)distinct C)check D)specific Answer: B Level: EasyPage Ref: 337, 338 Topic: Processing Single Tables Subtopic: Using Distinct Values AACSB Use of Information Technology 29. What result set is returned from the following query? Select cust omer_name, telephone from customers where city in (‘Boston’,’New York’,’Denver’); A)The customer_name and telephone of all customersB)The customer_name and telephone of all customers living in either Boston, New York or Denver C)The customer_name and telephone of all customers living in Boston and New York and Denver D)The customer_name of all customers living in Boston, New York or Denver Answer: B Level: ModeratePage Ref: 339 Topic: Processing Single Tables Subtopic: IN and NOT IN with Lists AACSB Use of Information Technology, Analytic Skills 30. To get all the customers from Hawaii sorted together, which of the following would be used? A)Order By B)Group By C)Having D)Sort Answer: A Level: EasyPage Ref: 339, 340 Topic: Processing Single TablesSubtopic: Sorting Results: The ORDER BY Clause AACSB Use of Information Technology, Analytic Skills 31. A single value returned from an SQL query that includes an aggregate function is called a(n): A )agate. B)scalar aggregate. C)vector aggregate. D)summation. Answer: B Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 32. Multiple values returned from an SQL query that includes an aggregate function are called: A)vector aggregates. B)scalar aggregates. C)agates. D)summations. Answer: A Level: EasyPage Ref: 340, 341Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 33. Which of the following can produce scalar and vector aggregates? A)Order By B)Group By C)Having D)Sort Answer: B Level: ModeratePage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 34. What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries gr oup by driver_no; A)A listing of all drivers, sorted by driver numberB)A listing of each driver as well as the number of deliveries that he or she has made C)A count of all of the deliveries made by all drivers D)None of the above Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 35. What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = ‘MA’ group by driver_no; A)A listing of all drivers who made deliveries to state = ‘MA’, sorted by driver number.B)A listing of each driver who made deliveries to state = ‘MA as well as the number of deliveries that each driver has made to that state. C)A count of all of the deliveries made to state = ‘MA’ by all drivers. D)None of the above. Answer: B Difficulty: DifficultPage Ref: 3 40, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 36. Which of the following finds all groups meeting stated conditions? A)Select B)Where C)Having D)Find Answer: C Level: EasyPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 37. What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2; A)A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B)A listing of all drivers C)A listing of the number of deliveries greater than 2 D)A listing of all drivers who made more than 2 deliveries Answer: A Level: DifficultPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 38. Which of the following is true of the order in which SQL statements are evaluated? A)The select clause is always processed first. B)The select clause is always processed last. C)The select clause is processed before the order by clause. D)The group by clause is processed before the where clause. Answer: C Level: DifficultPage Ref: 329 Topic: Processing Single Tables AACSB Use of Information Technology 39. A _______________ view is materialized when referenced. A)virtual B)dynamic C)materialized D)base Answer: BLevel: ModeratePage Ref: 342 Topic: Using and Defining Views AACSB Use of Information Technology 40. A view may not be updated directly iF it contains: A)the distinct keyword. B)derived columns and expressions in the select clause. C)uses the group by or having clause. D)all of the above. Answer: D Level: EasyPage Ref: 345 Topic: Using and Defining Views AACSB Use of Information Technology Chapter 7 1. A join operation: A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view.D) is used to combine indexing operations. Answer: B Level: EasyPage Ref: 358 Topic: Processing Multiple Tables AACSB Use of Information Technology 2. A join in which the joining condition is based on equality between values in the common columns is called a(n): E) equi-join. F) uni-lateral join. G) natural join. H) both A and C. Answer: D Level: EasyPage Ref: 358 Topic: Processing Multiple Tables Subtopic: Equi-join AACSB Use of Information Technology 3. A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): I) equi-join.J) natural join. K) multivariate join. L) inner join. Answer: B Level: EasyPage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 4. The most common ly used form of join operation is the: M) outer join. N) union join. O) equi-join. P) natural join. Answer: D Level: ModeratePage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 5. A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): Q) natural join. R) equi-join. S) outer join. T) union join. Answer: CLevel: EasyPage Ref: 361 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 6. In which of the following situations would one have to use an outer join in order to obtain the desired results? U) A report is desired that lists all customers who placed an order. V) A report is desired that lists all customers and the total of their orders. W) A report is desired that lists all customers, the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). X) There is never a situation that requires only an outer join.Answer: C Level: DifficultPage Ref: 361,362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology, Analytic Skills 7. One major advantage of the outer join is that: Y) information is easily accessible. Z) information is not lost. [) the query is easier to write. ) All of the above. Answer: B Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 8. A type of join implemented in SQL-1999 and by extension SQL-2003 that returns all of the data from each table that is joined is called a(n): ]) outer join. ^) inner join. ) union join. `) intersect join. Answer: C Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Union Join AACSB Use of Information Technology 9. A type of query that is placed within a WHERE or HAVING clause of another query is called a: a) master query. b) subquery. c) sup erquery. d) multi-query. Answer: B Level: EasyPage Ref: 340 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 10. _________ takes a value of true if a subquery returns an intermediate results table which contains one or more rows. e) In f) Having g) Exists h) Extents Answer: CLevel: ModeratePage Ref: 367 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 11. In SQL, a _____________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. i) correlated j) paired k) natural l) inner Answer: A Level: ModeratePage Ref: 368 Topic: Processing Multiple Tables Subtopic: Correlated Subqueries AACSB Use of Information Technology 12. A ______________ ____________ is a temporary table used in the FROM clause of an SQL query. m) correlated subquery n) derived table o) view table p) None of the above. Answer: BLevel: ModeratePage Ref: 369 Topic: Processing Multiple Tabl es Subtopic: Using Derived Tables AACSB Use of Information Technology 13. The UNION clause is used to: q) combine the output from multiple queries into a single result table. r) join two tables together to form one table. s) find all rows that do not match in two tables. t) None of the above. Answer: A Level: EasyPage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 14. In order for two queries to be UNION-compatible, they must: u) both have the same number of lines in their SQL statements. ) both output compatible data types for each column and return the same number of rows. w) both return at least one row. x) All of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 15. Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: y) using the if-then-else construct. z) using the immediate if stat ement. {) using the CASE keyword in a statement. |) using a subquery. Answer: C Level: ModeratePage Ref: 372 Topic: Processing Multiple Tables Subtopic: Conditional ExpressionsAACSB Use of Information Technology 16. Explicit commands to manage transactions are needed when: }) a transaction consists of just one SQL command. ~) multiple SQL commands must be run as part of a transaction. ) autocommit is set to off. ) None of the above. Answer: B Level: DifficultPage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 17. User-defined transactions can improve system performance because: ) transactions are processed as sets, reducing system overhead. ) transactions are mapped to SQL statements. ) speed is improved due to query optimization. ) All of the above.Answer: A Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 18. An interactive command that can be used to dynamically control a user session for a ppropriate integrity measures is: ) rollback. ) rollforward. ) set autocommit. ) expunge. Answer: C Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology, Analytic Skills 19. If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? ) dba_tab_privs ) dba_tab_comments ) dba_table_label ) dba_tables Answer: DLevel: ModeratePage Ref: 378 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 20. What results would the following SQL statement produce? select owner, table_name from dba_tables where table_name = ‘CUSTOMER’; ) A listing of all customers in the customer table ) A listing of the owner of the customer table ) A listing of the owner of the customer table as well as customers ) An error message Answer: B Level: ModeratePage Ref: 379 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 21. User-de fined data types: ) can be a subclass of a standard type. can behave as an object. ) can have defined functions and methods. ) can have all of the above. Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL AACSB Use of Information Technology 22. A new set of analytical functions added in SQL:200n are referred to as: ) OLAF Functions ) MOLAP Functions ) Average Functions ) OLAP Functions Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology 23. RANK and DENSE-RANK are examples of: ) Ceilings ) Door Functions ) Window Functions ) Moving FunctionsAnswer: C Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology, Analytic Skills 24. All of the following are new data types added in SQL:200n EXCEPT: ) BIGINT ) BIT ) MULTISET ) XML Answer: B Level: ModeratePa ge Ref: 381 Topic: SQL: 2003 Enhancements and Extensions to SQL Subtopic: New Data Types AACSB Use of Information Technology, Analytic Skills 25. The MERGE command: ) Allows one to combine the INSERT and UPDATE operations ) Allows one to combine the INSERT and DELETE operations ) Joins 2 tables together None of the above. Answer: A Level: ModeratePage Ref: 382 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Other Enhancements AACSB Use of Information Technology, Analytic Skills 26. Extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions are called: ) stored procedures. ) Persistent Stored Modules. ) flow control modules. ) None of the above. Answer: B Level: ModeratePage Ref: 383 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Programming Extensions AACSB Use of Information Technology 27.A named set of SQL statements that are considered when a data modification occurs a re called: ) stored procedures. ) treatments. ) triggers. ) trapdoors. Answer: C Level: EasyPage Ref: 384 Topic: Triggers and Routines AACSB Use of Information Technology 28. While triggers run automatically, ______________ do not and have to be called. ) trapdoors ) routines ) selects ) updates Answer: B Level: ModeratePage Ref: 386 Topic: Triggers and Routines AACSB Use of Information Technology 29. SQL-invoked routines can be: ) procedures. ) functions. ) All of the above. ) None of the above. Answer: C Level: EasyPage Ref: 386Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 30. All of the following are advantages of SQL-invoked routines EXCEPT: ) flexibility. ) efficiency. ) sharability. ) security. Answer: D Level: ModeratePage Ref: 387 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 31. A procedure is: ) stored within the database. ) given a unique name. ) called by name. ) All of the above. Answer: D Level : ModeratePage Ref: 387, 388 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 32. Embedded SQL consists of: hard-coded SQL statements included in a program written in another language. ) SQL encapsulated inside of other SQL statements. ) SQL written into a front-end application. ) SQL translated to a lower-level language. Answer: A and C are both plausible answers. Level: EasyPage Ref: 389 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 33. In order to embed SQL inside of another language, the ________ _______ statement must be placed before the SQL in the host language. ) GET SQL ) EXEC SQL ) RUN SQL ) SQL SQL Answer: B Level: ModeratePage Ref: 390 Topic: Embedded SQL and Dynamic SQLAACSB Use of Information Technology, Analytic Skills 34. Dynamic SQL: ) is used to generate appropriate SQL code on the fly, as an application is processing. ) is quite volatile. ) is not used widely on the Internet. ) creates a less flexible ap plication. Answer: A Level: EasyPage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 35. On-line transaction processing is: ) A system used for reporting only. ) A system used in transaction-oriented applications that involves real-time processing of SQL transactions. ) A set of tools that provides users with a graphical view of data. ) None of the above.Answer: B Level: EasyPage Ref: 391 Topic: OLAP SQL AACSB Use of Information Technology 36. OLAP systems differ from OLTP systems in several ways except: ) Size ) Processing ) Queries ) Physical Storage Answer: B Level: EasyPage Ref: 392 Topic: OLAP SQL AACSB Use of Information Technology Chapter 8 1. Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace? A)GUI evolutions B)Networking advances C)Communication changes D)All of the above. Answer: D Level: ModeratePage Ref: 403 Topic: Introduction AACSB Use of Information Technolog y 2.Which of the following is a component of processing logic? A)Input B)Output C)Retrieval D)Business rules Answer: D Level: EasyPage Ref: 404 Topic: Client/Server Architectures AACSB Use of Information Technology 3. A device that manages file operations and is shared by each client PC on a LAN is called a: A)file server. B)file processor. C)database server. D)fat client. Answer: A Level: EasyPage Ref: 405 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 4. In a file server architecture, which of the following is performed by a client? A)Provides significant LAN trafficB)File storage C)User interface processing D)All of the above. Answer: C Level: ModeratePage Ref: 404 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 5. Which of the following is true about file servers on a LAN? A)Each client must devote memory to a full version of its DBMS. B)Not much data movement i s generated. C)The DBMS copy has little responsibility. D)Application programmers need little knowledge about DBMSs. Answer: A Level: ModeratePage Ref: 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology . Which of the following is NOT a limitation to using file servers on local area networks? A)Considerable data movement is generated across the network. B)Each client workstation must devote memory to a full version of the DBMS. C)Stored procedures can be run on the file server. D)The DBMS copy in each workstation must manage the shared database integrity. Answer: C Level: ModeratePage Ref: 405, 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 7. A(n) _____ is a module of code written in SQL or some proprietary language to run business rules on a server.A)SQL program B)select module C)select procedure D)stored procedure Answer: D Level: EasyPage Ref: 407 Topic: Cl ient/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 8. Which of the following is an advantage of stored procedures? A)Data integrity improves when fewer applications access the procedure. B)The layers get cleaner. C)Stored procedures result in fatter clients. D)Performance improves for compiled SQL statements. Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 9.Which of the following is not a disadvantage of stored procedures? A)Writing stored procedures takes more time than writing an application in Visual Basic or PowerBuilder. B)Decreases in network traffic are realized. C)Stored procedures are proprietary and not easy to move from one RDBMS to another. D)Each client must be loaded with the application to be used at that location. Answer: B Level: ModeratePage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Archite ctures AACSB Use of Information Technology 10. A PC configured to handle user interface with little or no local storage is called a: A)server.B)fat client. C)thin client. D)workstation. Answer: C Level: EasyPage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 11. Which of the following is true about three-tier architectures? A)Less scalable than two-tier B)Increased risk C)More technological flexibility D)All of the above Answer: C Level: ModeratePage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 12. _____ is the process of assigning pieces of application code to clients or servers. A)Application partitioning B)Modularizing programs C)Code distribution D)Program breakup Answer: A Level: EasyPage Ref: 410Topic: Partitioning an Application AACSB Use of Information Technology 13. Which of the following is not a common distribution logic for two-tiered server environments: A)Fat Client B)Tall Client C)Thin Client D)Distributed Answer: A Level: ModeratePage Ref: 411 Topic: Partitioning an Application AACSB Use of Information Technology 14. Which of the following is true of mainframes in the client/server environment? A)Managers have a difficult time moving between platforms. B)Supporting distributed environments is easier than mainframe support. C)Migrating from mainframes to client/server is a relatively simple process.D)All of the above. Answer: A Level: ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 15. Moving mission critical applications to client/server environments is likely to cause serious problems in the transition from the pilot phase to production unless: A)Developers rewrite all code for the system. B)Brand new hardware is purchased. C)Developers anticipate scalability issues and address them as they develop code D)None of the above. Answer: C Level; ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 16. ____ is any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A)User interface enhancers B)Middleware C)Interface managers D)MPP Answer: B Level: EasyPage Ref: 413 Topic: Using Middleware AACSB Use of Information Technology 17. Which of the following does not connect applications to databases over networks? A)Asynchronous RPC middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)SMP Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 18.Which of the following could send and receive email, while the client works on other things? A)ORBs middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)MOM Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 19. Microsoft’s Transaction Server and IBM’s CICS are examples of: A)Asynchronous Remote Procedure Call (RPC) B)Synch ronous RPC C)MOM D)ORB Answer: B Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 20. ______________ makes it possible for applications to send objects and request services in an object-oriented system.A)MOM B)RPC C)ORB D)API Answer: C Level: EasyPage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 21. A(n) _____ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system. A)API B)MOM C)RPC D)LAN Answer: A Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 22. Which of the following is true of moving to client/server environments? A)Functionality must be delivered all at once. B)There are no hidden costs. C)Services can be placed appropriately. D)None of the above. Answer: C Level: EasyPage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 23. Which of the following is NOT a benefit of moving to cli ent/server environments? A)Functionality can be delivered in stages to end users. B)Business process reengineering is facilitated. C)Network traffic and response times are increased. D)Users are encouraged to utilize the application’s functionality. Answer: C Level: ModeratePage Ref: 416, 417 Topic: Client/Server Issues AACSB Use of Information Technology 24. The most common bottleneck in a client/server environment is the: A)users B)software C)network D)company politics Answer: C Level: ModeratePage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 25. In order to establish client/server security: A)Network security must be established B)Biometric authentication must be used C)Server security must be established D)Both A and C Answer: D Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 26. Multi-tier make sense if all of the following environments except: A) More than 100 users B)High-volume transaction process ing C)Workgroups D)Real-time processing Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 27.Which of the following is not a parameter that must be specified in order to establish an ODBC connection? A)Specific ODBC driver needed B)Back-end server name to connect to C)JDK version D)Database name to connect to Answer: C Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 28. Which of the following is a distinguishing characteristic of Level-2 API capabilities? A)Send and receive partial results B)Call a translation library C)Commit or rollback transactions D)Prepare and execute SQL statements Answer: B Level: ModeratePage Ref: 417Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 29. An application programming interface that enables an application program to process RDBMS databases meets the: A)objec t linking and embedding standard. B)open database connectivity standard. C)multi-platform connectivity standard. D)open source standard. Answer: B Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 30. Which of the following parameters must be defined in order to establish an ODBC connection? A)ODBC driver B)Back-end server nameC)Database name to connect to D)All of the above Answer: D Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology. Analytic Skills 31. The ability to call a translation library is a distinguishing characteristic of: A)Core-API ODBC conformance. B)Level-1 API ODBC conformance. C)Level-2 API ODBC conformance. D)Level-3 API ODBC conformance. Answer: C Level: DifficultPage Ref: 418 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 32. JDBC is similar to ODBC EXCEPT: A)ODBC is language independent and JDBC is not.B)ODBC can be used to execute SQL queries on a server while JDBC does not have this capability. C)ODBC can run on multiple platforms, while JDBC is platform specific. D)None of the above. Answer: A Level: ModeratePage Ref: 385 Topic: Using JDBC to Link External Tables Stored on a Database Server AACSB Use of Information Technology, Analytic Skills Chapter 9 1. The analysis of summarized data to support decision making is called: A)operational processing. B)informational processing. C)artificial intelligence. D)data scrubbing. Answer: B Level: EasyPage Ref: 461 Topic: Introduction AACSB Use of Information Technology 2.The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is: A)subject-oriented. B)integrated. C)time-variant. D)nonvolatile. Answer: A Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology 3. Wh en we consider data in the data warehouse to be time-variant, we mean: A)that the time of storage varies. B)data in the warehouse contain a time dimension so that they may be used to study trends and changes. C)that there is a time delay between when data are posted and when we report on the data. D)none of the above.Answer: B Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology, Analytic Skills 4. Which of the following advances in information systems contributed to the emergence of data warehousing? A)Improvements in database technology, particularly the relational data model B)Advances in computer hardware, especially affordable mass storage and parallel computer architectures C)Advances in middleware products that enabled enterprise database connectivity across heterogeneous platforms D)All of the above Answer: D Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data WarehousingSubtopic: A Brief History AACSB Use of Infor mation Technology 5. Which of the following factors drive the need for data warehousing? A)Businesses need an integrated view of company information. B)Informational data must be kept together with operational data. C)Data warehouses generally have better security. D)None of the above Answer: A Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: The Need for Data Warehousing AACSB Use of Information Technology 6. Which of the following organizational trends does not encourage the need for data warehousing? A)Multiple, nonsynchronized systemsB)Focus on customer relationship management C)Downsizing D)Focus on supplier relationship management Answer: C Level: ModeratePage Ref: 463–464 Topic: Basic Concepts of Data Warehousing Subtopic: Need for a Companywide View AACSB Use of Information Technology 7. Informational systems are designed for all of the following EXCEPT: A)running a business in real time. B)supporting decision making. C)complex queries. D)data mining. Answer: A Level: ModeratePage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 8.Operational and informational systems are generally separated because of which of the following factors? A)A data warehouse centralizes data that are scattered throughout disparate operational systems and makes them readily available for decision support applications. B)A properly designed data warehouse adds value to data by improving their quality and consistency. C)A separate data warehouse eliminates contention for resources that results when informational applications are confounded with operational processing. D)All of the above Answer: D Level: EasyPage Ref: 466 Topic: Basic Concepts of Data WarehousingSubtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 9. A data mart is a(n): A)enterprisewide data warehouse. B)smaller system built upon file processing technology. C)data warehouse that is limited in scope. D)generic on-line shopping site. Answer: C Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 10. One characteristic of independent data marts is complexity for end users when they need to access data in separate data marts.This complexity is caused by not only having to access data from separate databases, but also from: A)the possibility of a new generation of inconsistent data systems, the data marts themselves. B)lack of user training. C)denormalized data. D)incongruent data formats. Answer: A Level: DifficultPage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 11. All of the following are limitations of the independent data mart EXCEPT: A)separate extraction, transformation, and loading processes are developed for each data mart.B)data marts may not be consistent with one another. C)there is no capability to drill down into greater detail in other data marts. D)it is often more expedient to build a data mart than a data warehouse. Answer: D Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology, Reflective Thinking 12. A dependent data mart: A)is filled with data extracted directly from the operational system. B)is filled exclusively from the enterprise data warehouse with reconciled data.C)is dependent upon an operational system. D)participates in a relationship with an entity. Answer: B Level: ModeratePage Ref: 470 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 13. An operational data store (ODS) is a(n): A)place to store all unreconciled data. B)represen tation of the operational data. C)integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users.D)small-scale data mart. Answer: C Level: EasyPage Ref: 471 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 14. A logical data mart is a(n): A)data mart consisting of only logical data. B)data mart created by a relational view of a slightly denormalized data warehouse. C)integrated, subject-oriented, detailed database designed to serve operational users. D)centralized, integrated data warehouse. Answer: B Level: ModeratePage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 15. All of the following are unique characteristics of a logical data mart EXCEPT: A)logical data marts are not physically s eparate databases, but rather a relational view of a data warehouse. B)the data mart is always up-to-date since data in a view is created when the view is referenced. C)the process of creating a logical data mart is lengthy. D)data are moved into the data warehouse rather than a separate staging area. Answer: C Level: EasyPage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 16. The real-time data warehouse is characterized by which of the following? A)It accepts near-real time feeds of transaction data. B)Data are immediately transformed and loaded into the warehouse. C)It provides near-real-time access for the transaction processing systems to an enterprise data warehouse. D)All of the above Answer: D Level: EasyPage Ref: 473-474 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 7. Data that are detailed, current, and intended to be the single, authoritative source of all decision support applications are called _____ data. A)reconciled B)subject C)derived D)detailed Answer: A Level: EasyPage Ref: 475 Topic: Data Warehouse Architectures Subtopic: Three-Layer Data Architectures AACSB Use of Information Technology 18. A database action that results from a transaction is called a(n): A)transition. B)event. C)log entry. D)journal happening. Answer: B Level: EasyPage Ref: 476 Topic: Some Characteristics of Data Warehouse Data Subtopic: Status Versus Event DataAACSB Use of Information Technology, Analytic Skills 19. Data that are never physically altered once they are added to the store are called _____ data. A)transient B)override C)periodic D)complete Answer: C Level: EasyPage Ref: 477 Topic: Some Characteristics of Data Warehouse Data Subtopic: Transient Versus Periodic Data AACSB Use of Information Technology 20. Which of the following is an objective of derived data? A) Ease of use for decision support systems B)Faster response time for user queries C)Support data mining applications D)All of the above Answer: D Level: EasyPage Ref: 481Topic: The Derived Data Layer Subtopic: Characteristics of Derived Data AACSB Use of Information Technology 21. .A star schema contains both fact and _______ tables. A)narrative B)cross functional C)dimension D)starter Answer: C Level: ModeratePage Ref: 481 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 22. The level of detail in a fact table determined by the intersection of all the components of the primary key, including all foreign keys and any other primary key elements, is called the: A)span. B)grain. C)selection. D)aggregation. Answer: BLevel: EasyPage Ref: 485 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 23. Conformed dimensions allow users to do the following: A)share nonkey dimension data. B)query across fact tables with consistency. C)work on facts and business subjects for which all users have the same meaning. D)all of the above. Answer: D Level: ModeratePage Ref: 488-489 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 24. An expanded version of a star schema in which all of the tables are fully normalized is called a(n): A)snowflake schema.B)operational schema. C)DSS schema. D)complete schema. Answer: A Level: EasyPage Ref: 492 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 25. All of the following are ways to handle changing dimensions EXCEPT: A)overwrite the current value with the new value. B)for each dimension attribute that changes, create a current value field and as many old value fields as we wish. C)create a new dimension table row each time the dimension object changes. D)create a snowflake schema. Answer: D Level: ModeratePage Ref: 494 Topic: The Derived Data LayerSubtopic: The Star Schema AA CSB Use of Information Technology 26. The use of a set of graphical tools that provides users with multidimensional views of their data is called: A)on-line geometrical processing (OGP). B)drill-down analysis. C)on-line analytical processing (OLAP). D)on-line datacube processing (ODP). Answer: C Level: EasyPage Ref: 500 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 27. OLAP tools that use the database as a traditional relational database are called: A)ROLAP tools. B)MOLAP tools. C)slice and dice.D)none of the above. Answer: A Level: ModeratePage Ref: 500-501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 28. Rotating the view of a multidimensional database for a particular data point is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: D Level: ModeratePage Ref: 501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 29. Going from a summary view to progressively lower levels of detail is called data: A)cubing. B)drill-down. C)dicing.D)pivoting. Answer: B Level: ModeratePage Ref: 502 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 30. Which of the following data mining techniques identifies clusters of observations with similar characteristics? A)Case reasoning B)Rule discovery C)Clustering and signal processing D)Neural nets Answer: C Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 31. Which of the following data-mining techniques searches for patterns and correlations in large data sets?A)Case reasoning B)Rule discovery C)Signal processing D)Neural nets Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 32. Which of the following dat a mining applications identifies customers for promotional activity? A)Population profiling B)Target marketing C)Usage analysis D)Product affinity Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 33. Which of the following is true of data visualization?A)It is easier to observe trends and patterns in data. B)Correlations and clusters in data can be easily identified. C)It is often used in conjunction with data mining. D)All of the above. Answer: D Level: ModeratePage Ref: 503 Topic: The User Interface Subtopic: Data Visualization AACSB Use of Information Technology, Analytic Skills Chapter 10 1. High quality data are data that are A) Accurate B)Consistent C)Available in a timely fashion D)All of the above Answer: D Level: EasyPage Ref: 524 Topic: Managing Quality Data AACSB Use of Information Technology, Analytic Skills