How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cybersecurity

Fill in the blanks: _________________ is the psychological manipulation of people into perfo

822 answers
411 good - 411 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Project Management

Which of the following is NOT a typical challenge of how project evaluation and project...

390 answers
51 good - 339 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Agile/Scrum

According to the Agile Manifesto, which of the following topics are NOT part of the 12 Agile...

206 answers
68 good - 138 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is NOT a useful method an individual can benefit from, to protect their...

932 answers
136 good - 796 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

A Data Protection Officer (DPO) must be appointed....

771 answers
656 good - 115 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

Which of the following are characteristics of data warehouse?

76 answers
22 good - 54 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big Data analytics

Which of the following is NOT a critical success factor to achieve success with data analytics...

972 answers
26 good - 946 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Business Intelligence

A ______ is a subset of a data warehouse

86 answers
34 good - 52 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Outsourcing

Which of the following is NOT an IT Outsourcing Steering Process according to Urbach and Würz (...

401 answers
50 good - 351 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big Data analytics

Which of the following are critical skills for Data scientists to have?

168 answers
83 good - 85 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is NOT considered as personally  identifiable information according t

238 answers
57 good - 181 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

Please explain Moore’s Law:

294 answers
162 good - 132 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

What phase is NOT part of the CRISP-DM (Cross Industry Standard for Data Mining...

463 answers
223 good - 240 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Enterprise IT Governance

Which of the following is NOT a maturity level in the COBIT 5 framework?

649 answers
124 good - 525 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Which of the following is NOT a privacy enhancing technology?

294 answers
130 good - 164 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Which of the following is not an assumption that needs fixing in digital ethics?

850 answers
320 good - 530 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Project Management

(What is the | Is there a) key difference between managing projects and managing programs?

879 answers
274 good - 605 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

Which of the following skills is the least important for a data scientist in an analytical team...

526 answers
485 good - 41 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Service Management

What does the abbreviation ITIL mean?

839 answers
108 good - 731 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

In which organizational structure of analytical teams do analytical talent report the lowest...

294 answers
57 good - 237 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cybersecurity

The CIA triad is a model designed to guide policies for information security within an...

784 answers
725 good - 59 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Digital Resilience

What is a phishing attack?

996 answers
68 good - 928 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

Privacy by Design (PbD) refers to …

235 answers
187 good - 48 bad
 
20.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cybersecurity

Which of the following is not a typical threat actor behind cyber-attacks?

612 answers
289 good - 323 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cybersecurity

Which of the following is NOT a typical asset that cyber threats target to achieve?

935 answers
642 good - 293 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
GDPR

The GDPR legislation applies to …

825 answers
702 good - 123 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Cultivating Big Data

Which of the following is NOT correct about the DPO (data protection officer...

463 answers
159 good - 304 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

The 3 V’s which Gartner originally used to define Big Data are Volume, Variety and ….

294 answers
177 good - 117 bad
 
17.01.2020
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
IT Outsourcing

What is a “Captive Center”?

850 answers
468 good - 382 bad
 
21.08.2019
Öykü Isik
Professor of Information Systems Management at Vlerick Business School
Big data management

Which of the following characteristics indicates the data-driven maturity of the company best...

294 answers
152 good - 142 bad