Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Outsourcing

Which of the following aspects is NOT an advantage of a multi-sourcing strategy?

799 answers
799 good - 0 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Which of the following is correct about the General Data Protection Regulation (GDPR)?

564 answers
170 good - 394 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

ETL Process is extraction, transformation and loading of data from:

75 answers
24 good - 51 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

ETL is an abbreviation for:

74 answers
34 good - 40 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cybersecurity

Which of the following is NOT a typical asset that cyber threats target to achieve?

102 answers
28 good - 74 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

Which of the following are characteristics of data warehouse?

76 answers
22 good - 54 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

Which of the following features usually applies to data in a data warehouse?

85 answers
23 good - 62 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big Data analytics

Which of the following is NOT a critical success factor to achieve success with data analytics...

864 answers
629 good - 235 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

A ______ is a subset of a data warehouse

86 answers
34 good - 52 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

What does OLAP acronym stand for?

88 answers
33 good - 55 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

For which type of analytics is the CRISP-DM (Cross Industry Standard for Data Mining) process...

463 answers
181 good - 282 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

“Categorization of customers by their product preferences” is an example of;

73 answers
18 good - 55 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is not an assumption that needs fixing in digital ethics?

285 answers
176 good - 109 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Project Management

Please complete the following sentence: A program …

376 answers
294 good - 82 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Outsourcing

In what type of sourcing does the company engage? The client company A is located in Belgium.

895 answers
769 good - 126 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big Data analytics

"Uncertainty due to data inconsistency & incompleteness, ambiguities, latency, deception"...

681 answers
573 good - 108 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

Please explain Moore’s Law:

294 answers
162 good - 132 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Which of the following is NOT correct about the DPO (data protection officer...

463 answers
159 good - 304 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big Data analytics

Which of the following is NOT a direct result of applying analytics in organizations?

524 answers
239 good - 285 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

The 3 V’s which Gartner originally used to define Big Data are Volume, Variety and ….

294 answers
177 good - 117 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

What is the number one big data challenge for most organizations ?

294 answers
161 good - 133 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is NOT a useful method an individual can benefit from, to protect their...

813 answers
578 good - 235 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

Which of the following skills is the least important for a data scientist in an analytical team...

738 answers
652 good - 86 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Which of the following is NOT considered as personally identifiable information...

294 answers
132 good - 162 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

As compared to RDBMS, Hadoop

65 answers
18 good - 47 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big Data analytics

Which one below is not a definitive characteristics of Big Data?

156 answers
32 good - 124 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Project Management

(What is the | Is there a) key difference between managing projects and managing programs?

308 answers
28 good - 280 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is NOT considered as personally  identifiable information according t

692 answers
208 good - 484 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cybersecurity

The CIA triad is a model designed to guide policies for information security within an...

661 answers
114 good - 547 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

A Data Protection Officer (DPO) must be appointed....

880 answers
702 good - 178 bad