You are on page 1of 3

Question 25

The ________ is the only person on a scrum team who has the authority to add, delete, or change requirements
and their priority.

scrum master

product owner

database designer

business analyst

Question 26
Which of the following is a use of social media (SM) in human resources?

It is used to determine performance incentives.

It is used to keep track of employees' personal lives.

It is used for recruiting candidates.

It is used for terminating employee

Question 27
________ are rule-based systems that encode human knowledge in the form of If/Then rules.

Document management systems

Expert systems

Content management systems

Enterprise resource planning systems

Question 28
The ________ is a regulatory law that provides protection for student education records.

Family Educational Rights and Privacy Act (FERPA)

Equal Educational Opportunities Act of 1974

Smith-Lever Act of 1914

Federal Information Security Management Act (FISMA)


Question 29
In the case of ________, data miners develop models prior to conducting analyses and then apply statistical
techniques to data to estimate parameters of the models.

pull publishing techniques

supervised data mining

push publishing techniques

unsupervised data mining

Question 30
The phenomenon in which the variability in the size and timing of orders increases at each stage of the supply
chain is known as the ________ effect.

Zeeman

butterfly

bullwhip

Stroop

Question 31
In the ________ phase, a BigData collection is broken into pieces and hundreds or thousands of independent
processors search these pieces for something of interest.

crash

break

reduce

map

Question 32
________ is a dynamic social media process of employing users to participate in product design or product
redesign.

Social capitalization

Flexible product development

Crowdsourcing

Collaborative product development


Question 33
________ are software or procedures used to prevent an information security attack.

Malware definitions

Countermeasures

Exploits

Attack vectors

Question 34
________ languages can be used to create difficult, complex applications, and, if used properly, will result in
high-performance code that is easy to alter when requirements change.

Assembly

Data-oriented

Object-oriented

Hardware description

Question 35
A(n) ________ refers to a content structure employed by Enterprise social networks (ESNs) that emerges from
the processing of many user tags.

heteronomy

agronomy

folksonomy

cytotaxonomy

Question 36
All of the following are agile development methodologies EXCEPT ________.

waterfall

scrum

the unified process

extreme programming

You might also like