Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

The 3 V’s which Gartner originally used to define Big Data are Volume, Variety and ….

294 answers
177 good - 117 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is NOT correct about the General Data Protection Regulation (GDPR)?

485 answers
242 good - 243 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cybersecurity

The CIA triad is a model designed to guide policies for information security within an...

328 answers
223 good - 105 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Outsourcing

Which of the following statements is TRUE?

678 answers
606 good - 72 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

Which of the following characteristics indicates the data-driven maturity of the company best...

294 answers
152 good - 142 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

For which type of analytics is the CRISP-DM (Cross Industry Standard for Data Mining) process...

463 answers
181 good - 282 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Which of the following is NOT considered as personally identifiable information...

294 answers
132 good - 162 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Digital Resilience

What is a phishing attack?

857 answers
383 good - 474 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Which of the following is NOT a privacy enhancing technology?

294 answers
130 good - 164 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Privacy by Design (PbD) refers to …

463 answers
209 good - 254 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Project Management

(What is the | Is there a) key difference between managing projects and managing programs?

917 answers
213 good - 704 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Agile/Scrum

According to the Agile Manifesto, which of the following topics are NOT part of the 12 Agile...

732 answers
562 good - 170 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big Data analytics

Which of the following is NOT a critical success factor to achieve success with data analytics...

860 answers
538 good - 322 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Enterprise IT Governance

“Bimodal IT” describes

436 answers
254 good - 182 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Which of the following is correct about the General Data Protection Regulation (GDPR)?

564 answers
170 good - 394 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Project Management

The Waterfall model …

585 answers
455 good - 130 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cybersecurity

Fill in the blanks: _________________ is the psychological manipulation of people into perfo

372 answers
216 good - 156 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

What is the number one big data challenge for most organizations ?

294 answers
161 good - 133 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

“Categorization of customers by their product preferences” is an example of;

73 answers
18 good - 55 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Service Management

What is a “problem” according to ITIL?

119 answers
94 good - 25 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Service Management

Service-level management determines the …. of an IT service

855 answers
639 good - 216 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Service Management

What is a “problem” according to ITIL?

889 answers
647 good - 242 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

As compared to RDBMS, Hadoop

65 answers
18 good - 47 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

Which of the following are characteristics of data warehouse?

76 answers
22 good - 54 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Privacy by Design (PbD) refers to …

846 answers
720 good - 126 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Agile/Scrum

According to State of Agile, which of the following frameworks are “scaling agile frameworks”:...

245 answers
244 good - 1 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Outsourcing

Which of the following aspects is NOT an advantage of a multi-sourcing strategy?

433 answers
255 good - 178 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

Please explain Moore’s Law:

294 answers
162 good - 132 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big Data analytics

Which of the following are critical skills for Data scientists to have?

168 answers
83 good - 85 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Outsourcing

What is a “Retained Organization” after the completion of IT Outsourcing?

543 answers
339 good - 204 bad