Define traditional capital and human capital.
What will be an ideal response?
Q. 2________ is a social engineering technique in which a person pretends to be a legitimate company and sends emails requesting confidential data.
A) Phishing
B) Keylogging
C) Sniffing
D) Denial of service
Q. 3In an organization, each employee might work for one or more projects, as well as for different managers. In such a case, the best approach by a database manager would be to create multiple records for the employee.
Indicate whether the statement is true or false
Q. 4Shirley Yearwood is an analyst at a retail outlet and is required to assess customer data to understand which items are more likely to be bought together.
What analysis process will best help her to analyze purchasing habits of customers who bought gum boots along with umbrellas, ties along with shirts, and hair clips along with headbands among other related products?A) online analytical processing
B) market basket analysis
C) what-if analysis
D) goal-seeking analysis
Q. 5If a supplier has a limited number of buyers, then the ________.
A) threat of substitutes is low
B) network effects are greater
C) buyers have to deal with greater switching costs
D) buyers will have more power
Q. 6________ is often stored electronically and left behind with an organization even when an employee is no longer with the organization.
A) Structural capital
B) Social capital
C) Venture capital
D) Human capital
Q. 7When compared to electronic data interchange, the use of collaborative systems with XML formats to improve visibility between partner companies in a supply chain ________.
A) requires no trust between partners
B) is more flexible
C) is difficult to create
D) requires less time to create