What is data governance?
an approach to managing information across an entire organization
a process that spans all organizational business processes and applications
a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems
generated and captured by operational systems, describe the business’s activities, or transactions.
Five major parts of database
Hardware, software, people, procedures, data
Hardware, software, Database, CPU
Keyboard, monitor, CPU, Physical component, computer
Hardware, Procedures, standards, CPU,UPS
Which of the following include all major parts of a database system?
Hardware, Software, People, Procedures, Data
Hardware and Software
People
None of above
what is the 'initial public offering' stands for?
IPO
ICO
ITO
IMO
What is a bit?
The smallest unit of data a computer can process
A group of eight bits
CRM
A logical grouping of characters into a word, a small group of words, or an identification number
Data governance is an approach to managing information across ________ ?
An entire organization
None of an organization
multiple organizations
The whole world
When is data managed most efficiently?
When it is stored in a database.
When it is most accurate.
When the data is true.
When the data is in its rawest form.
What is the difference between Master Data and Transaction Data?
Master data are applied to multiple transactions and are used to categorize, aggregate, and evaluate the transaction data.
Transaction data are a set of core data, such as customer, product, employee, vendor, geo- graphic location, and so on, that span the enterprise information systems.
Transaction data is a process that spans all organizational business processes and applications.
Master data is an approach to managing information across an entire organization.
How does the planning process for IT applications begin?
Through organizational strategic planning
when it gets approved by manager
Never
It doesn't have a beginning
What is normalization of data?
A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.
A method for expanding a database to contain all information related to a certain topic and get the most general view of the information
A method that ignores data integrity to optimal processing performance to reduce redundancy within the data set
A method of creating a dataset with very little data to get a very general view of the topic at hand
What is the point of relationships in databases?
Relationships illustrate an association between entities.
Relationships draw connections between the database and real life.
Relationships convert computer-readable binary code to a language humans can understand.
Relationships ensure that the link between the computer software and hardware remains functional as you use the database.
What are the two main types of queries commonly used in database operations?
Structured query language (SQL) and Query by example (QBE)
Query inquiry prototype (QIP) and Databased Query Investment (DQI)
Query by knowledge (QBN) and Query by theory (QBT)
Query through investigation (QTI) or Query by example (QBE)
Relationships illustrate an association between _____
Entities
Procedures
Policies
Principles
What is a binary relationship in database?
A relationship that exists when two entities are associated.
A relationship that exists when no entities are associated.
A relationship that exists when three entities are associated.
A relationship that exists when four entities are associated.
What is a binary relationship?
a relationship between two entities
a relationship between ten entities
no relationship exists
twitter
What is the uniquely identified field of a database called?
Primary key
Secondary key
Foreign key
Database key
What is normalization and its purpose?
A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance
A means of expressing that the value of one particular attribute is associated with a specific single value of another attribute
To make the data look normal
Only God knows
What is a structured query language?
a computer code that allows you to ask questions of a database
a schedule builder
an online library
a computer coding information table
What is structured query language?
a binary computer code
a library
What is an Entity-Relationship Diagram?
Document that shows data entities and attributes and relationships among them
A relationship that exists when three entities are associated
A relationship that exists when an association is maintained within a single entity
The process of designing a database by organizing data entities to be used and identifying the relationships among them
What does "SQL" stand for?
Structured query language
Super query language
Safe query language
Second query language
What is an example of a "simple vs. composite" attribute?
Address
Name
Customer Number
Gender
Which is not a degree of relationship?
Unitary relationship
Unary relationship
Binary relationship
Ternary relationship
What is a 1:1. relationship?
a single-entity instance of one type is related to a single-entity instance of another type.
properties that describe the entity’s characteristics.
a person, place, or thing that can be identified in the users’ work environment.
attributes that are unique to that entity instance.
Which of the following commands doesn't affect the text font?
Borders
Underline
Bold
Italics
What are the 3 advantages of a wireless device?
They are portable and productive.
The production of the device is minimal.
They can't communicate with other devices.
They are cheap.
do you like this class
like
dislike
you better pick a
do not pick b
What is an example of a "one-to-many" relationship?
A professor in a university teaching a certain amount of students
Students lecturing other students
A private tutor teaching a student calculus
Many professors in a university teaching a certain amount of students
When you open PowerPoint and click Blank Presentation, you go directly to:
Your first slide
Themes
Layout
Backstage view
What is piracy?
Copying a software program (other than freeware, demo software, etc.) without making payment to the owner
Defense mechanisms
Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud
Crime in which someone uses the personal informa- tion of others to create a false identity and then uses it for some fraud
What is exposure in regards to information security?
the harm, loss, or damage that can result if a threat compromises the information resource.
any danger to which a system may be exposed
the possibility that the system will be harmed by a threat
the degree of protection against criminal activity, danger, damage, and/or loss
What is one common cause of information breaches
Employee negligence
data redundancy
The russians
Government Interference
Which of the following is a example of a unintentional threat to information systems?
Careless Internet Surfing
Espionage or trespass
Information Extortion
Software Attacks
What is the differences of a trusted network and an untrusted network?
A trusted network, in general, is any network within your organization. An untrusted network, in general, is any network external to your organization.
A trusted network, in general, is any network external to your organization. An untrusted network, in general, is any network within your organization.
Both are any network that within your organization.
None of the above.
what can be defined as the degree of protection against criminal activity, danger, dam- age, and/or loss?
security
computer
desk
phone
Security is important to...
small businesses
giant businesses
tiny businesses
weak businesses
What is social engineering?
An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords
When an unauthorized individual attempts to gain illegal access to organizational information
When an attacker either threatens to steal, or actually steals, information from a company
Deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith
What does a transaction processing system generate?
Data
Photos
Excel
Microsoft
What is Cybercrime?
illegal activities conducted over computer networks, particularly the Internet.
The first video ever created.
Anti-virus Software.
Theft of computers.
What does CRM stand for?
Customer Relationship Management
Classical Relationship Management
Clinical Rotational Mission
Customer Rotational Mission
What is a transaction?
any business event that generates data worthy of being captured and stored in a database
a non-business event
a collection of random data
anything that is done in a business
What is a domain name?
The name assigned to an internet site, consisting of multiple parts, separated by dots, which are translated from right to left
The name you give your computer
A company that gives you a fancy website name
The store you purchase computers from
Which of the following is true of Sales Force Automation (SFA)?
It automatically records all of the components of a sales transaction process
It includes a contact management system that that automatically sends emails to customers
It will duplicate contacts for you
It has a sales lead tracking system that tracks how many sales you have made
What is project scope management?
Defines the processes that limit and control the work in a project.
Is a Turkey.
the proper sequencing of data.
Resource management and estimating.
Which of the following explains On-Demand CRM?
It's hosted by an external vendor in the vendor’s data center.
It's a interactive system where communications related to sales, marketing, and customer service activities are conducted through a mobile medium for the purpose of building and maintaining customer relationships between an organization and its customers
It help a company manage the important parts of its business in an integrated fashion
It's a system which source code is available to developers and users
What is Project Management Body of Knowledge (PMBOK)
collection of processes and knowledge areas
collection of files
collection of scripts
collection of music videos
What are the five processes of project management?
Initiating,Planning,Executing,Monitoring and Controlling,Closing
Planning,Initiating,Executing,Monitoring and Controlling,Closing
Monitoring and Controlling,Closing,Planning,Initiating,Executing
Planning,Initiating,Monitoring and Controlling,Executing,Closing
what is the project management body of knowledge?
collections of processes and knowledge areas generally accepted as the best practice within the project management discipline
provides fundamentals of project management
no funding =bad idea
all of the above
What does a project management information system do?
A project management information system (PMIS) can provide a framework to help guide the progress of IT projects.
used to create professional-looking slideshows that can be displayed on projectors or big-screen TVs
create themes, pictures, comic strips, calendar flashcards.
none of the above
is a customer-focused and customer-driven organizational strategy.
is a business strategy with transparency
is a modern management that communicates with consumers
is a business model that consumers satisfied with the products' quality
In reference to product management, what does "time" refer to?
the window of opportunity in which a project must be completed to provide a benefit to the organization.
actual amount of resources, including cash and labor, that an organization can commit to completing a project.
processes that ensure that the project includes all the work required—and only the work required—to complete the project successfully.
money
What does Scope Creep refer to?
Uncontrolled changes in a project’s scope when the scope of a project is not properly defined, documented, or controlled
Changes to the initiation of project
The monitoring or controlling part of the project management process
A creepy scope
What are the five distinct phases of the traditional approach to project management?
Initiation, planning, execution, monitoring and control, and completion.
Monitoring, comparing, identifying, documenting, executing
Focusing, mastering, building, excelling, establishing
What are the five basic process groups of the PMBOK?
Initiation, planning, execution, monitoring and control, completion
Planning, coding, execution, completion, innitiation
Coding, marketing, initiation, monitoring, completion
Promoting, selling, monitoring, dealing, planning
Which of the four is NOT a way of enabling project management success?
Forcing members of a group to execute a project that they are not comfortable with
Focusing on managing strategy and stakeholders instead of exclusively concentrating on budgeting and scheduling
Building effective teams by aligning their incentives with the overall goals of projects
Mastering technology and project content by securing critical internal and external talent
The _________ is a collection of processes and knowledge areas generally accepted as best practice within the project management discipline.
Project Management Body of Knowledge
Computer
Motherboard
The mouse
What refers to a real-time, wireless connection between a mobile device and other computing environments?
Mobile computing
Mobile commerce
Pervasive computing
Ubiquitous computing
Surfing the web anonymously has which negative side effect?
Web surfing is slower compared to normal surfing
You can't purchase items online
You can only surf 1 webpage per day
No side effects
What happens to the private information stored in the typical smartphone?
It is auctioned to advertisers by applications automatically
It is secure on your device as long as you are not hacked
You may opt in or out of sending private information for a more personalized experience
It is secure from hackers on a private server
_____________ is a thin, flat device using polarized light from a light source and liquid crystals to illuminate colored pixels.
LCD
ABC
YMCA
XYZ
What is a good way to keep privacy?
Not save passwords
Save all passwords
Share your information with friends
Not have a passcode to enter the computer
What is a proxy server?
It is a computer to which you connect, which in turn connects to the Web site you wish to visit.
It hacks into computers
It is a data base
You should never post personal information about yourself or your family on any type of social networking sites
TRUE
FALSE
What supports the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data?
Transaction processing system (TPS)
FAIS
Organization Database
Expert System
Define TPS
to monitor, store, collect, and process data generated from all business transactions
To create profit for business
Allows for easier tasks within workforce
Helps with customer satisfaction
What is Master Data?
A Set of Core Data
Data about data
data about computers
data from your Operating System
Data Warehouse refers to what?
A multi-dimensional database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.
A relational or multi-dimensional database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.
A simple database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.
A linearized database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.
What is a plugin
bundle that helps an application function
applications
excel charts
microsoft office suit
What are Comparative Reports?
Reports that compare performances of different business units or times
Reports that show a greater level of detail than is included in routine reports.
Reports that include only information that exceeds certain threshold standards.
None of the above
what is IT planning?
organizational strategic plan
Tech support
Program that organizes
what is CRM short for?
Customer Relationship Manual
Customer Relationship Machinery
none of them above
The practice of marketing additional related products to customers based on a previous purchase is:
cross-selling
upselling
bundling
none of above
What is the advantages of on-demand CRM systems?
Lower costs and a need for employees to know only how to access and utilize the software.
Easy to enter.
Possibly unreliable vendors.
Difficulty in modifying the software.
Courtesy Reply Mail
Cause Related Marketing
Charge Residue Model
The drawbacks of on-demand CRM system are all of the following EXCEPT
lower costs
possible reliable vendors
difficult to modify software
difficult to modify softwar
What is a database?
Database is a computer programming
Database is a storage of message
It is a video game!
Database used to connect programs, which is really cool.
What problems do databases NOT minimize?
Data redundancy
Data repetition
Data isolation
Data inconsistency
Organizations store data in what?
Safe Vaults
Databases
Guarded facilities
Software
The most popular language used to interact with a database is...
Standard Query Example (SQE)
Structured Query Language (SQL)
Query by Example (QBE)
Query Lookup Tool (QLT)
When data are normalized, attributes in each table depend on the _______.
joint operation
primary key
structured query language
database
What is an ethernet?
A keyboard
A common LAN protocol
A modem
A common WAN protocol
What does SQL stand for?
Standard Query Language
Structured Query Language
Structured Quote Literacy
Standard Query Literacy
What is a relationship in the context of this class?
Something I will never have
An association between entities
A description of policies, principles, and procedures
A query language for interacting with a database
What does SLQ stand for?
Software query language
Structure query learning
Software query learning
Whats is a data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.
explicit knowledge model
relational database model
entity-relationship modeling
multidimensional structure model
What does the threat of a trespass entail?
Occurs when an attacker threatens to steal or steals information from a company
Occurs when an unauthorized individual attempts to gain illegal access to organizational information
Occurs when a deliberate act that involves defacing an organization's website is made
When a device is stolen/used by an attacker
What is Identity Theft?
deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith
the deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime.
stealing computing devices and storage devices
used malicious software to infect as many computers worldwide as possible, to the profit- driven, Web-based attacks of today.
What is a trusted network?
any network you know the password.
any network within your organization.
any network external to your organization.
all of above are incorrect.
What is NOT a common deliberate threat to information systems?
Alien invasion
Information extortion, identity thefts, and sabotage
All of the above are common threats to information systems
Which of the following is not an example of a deliberate threat to information systems?
Cyberterrorism
Social engineering
Espionage
Alien software
What is Scope Creep?
Increasing the scope of a project without asking first
Uncontrolled changes in a projects scope
When you don't know the scope of the project
When Listerine isn't on sale you have to buy a different brand
What is one of the most well known centers for customer interaction?
Customer Services
Call Center
the mall food court
HR
Which is the first phase in project management?
Planning
Initiation
Execution
Monitoring and Control
Which of these is considered "project execution?"
Defining the problem that the project is intended to solve and the goals that it is to achieve.
The work defined in the project management plan is performed to accomplish the project’s requirements.
To identify and sequence every project objective and activity associated with that objective.
Uncontrolled changes in a project’s scope.
Which of the following is NOT part of the process for developing an application?
Clearly defining what the program is to do.
Make the app able to store 1 terabyte of data
Visualizing the application running on the computer and designing its user interface
Defining values for each control's relevant properties
Choose the best definition for Adware
Something that you can commonly find de-installation procedures
A term applied to programs that either launch advertisements/ re-direct search results to promotional web sites
Advertisements you receive via mail
What is NOT an example of a short-range wireless network?
Bluetooth
Wi-Fi
Ultra-Wideband
Near-Field Communications
Which of the following is NOT an advantage of a wireless device?
Small enough to carry
Copy and pass confidential information easily
Provide sufficient computing power to preform productive tasks
Can communicate wirelessly with the internet and other devices
Which command CANNOT be used to do diagnostics?
qqnorm
BFtest
shapiro.test
leveneTest
What is Windows Defender?
Minesweeper
Free Antivirus program already installed on windows computers
Paid Antivirus program that is specific to Linux
Successor to Clippy. Helps write resumes.
Which is not the way to close the application in mac?
Use the mouse to click
Command+q
Command+m
Command+c
What are the key functions of a TPS (Transaction Processing System)?
Input functions, output functions, storage functions
Input functions, Processing the functions, Output functions, Storage functions
Processing the functions, storage functions
Processing the functions, output functions, storage functions
Which is not a goal of Customer relationship management?
Improving business relationships with customers
Get customer’s personal information
Assisting in customer retention
Driving sales growth
Data Redundancy is defined as
Various copies of the data do not agree
Applications and data are independent of one another
The same data are stored in multiple locations
What is a primary key?
a password that gives the user access to all applications in an application suite
a type of Macro
a field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated and sorted
a piece of hardware needed to help laptops run smoothly
What is NOT a difficulty involved in managing data?
Data accumulates over time
Data is scattered throughout organizations
Data is difficult to understand
Data is obtained from multiple sources
When a company examines its needs and performance, it generates a prioritized list of both existing and potential IT applications. This is called?
IT strategic plan
application portfolio
A data warehouse:
has data located at a single site.
supports a company's day to day operations.
stores data used for tactical or strategic decisions.
has data distributed across several different sties.
Standard Quarter Language
Standard Query Langauge
Structured Question Language
A database can store:
Metadata
End-user data
Both A and B
Neither A or B
What is an example of a primary key?
First name
Date of birth
Student ID
Town of residence
Which of the following is incorrect regarding SQL?
SQL is the most popular database query language
SQL uses keywords and statements to perform searches
SQL is simpler to use than QBE
SQL stands for Structured Query Language
A binary relationship illustrate an association between entities.
A binary relationship exists when an association is maintained within a single entity.
A binary relationship exists when two entities are associated.
A binary relationship exists when three entities are associated.
What should be used to request information out of data?
Google
Ctrl F
Query
Help function in program
Designers plan and create databases through the process of...
entity–relationship modeling
using an entity–relationship diagram
both A & B
Which of the following answer are not supported by transaction processing system(TPS)?
monitoring
collection
drive
storage
Which one is not included in risk management?
Process of identifying risk
Assessing its relative magnitude
Wait for the risk to lessen
Taking steps to reduce it to an acceptable level
Which statement about quality control systems is FALSE?
They can be stored for future analysis
They can be interpreted in real time
They assess the speed of computers
They provide information about incoming material and parts
Which is not an example of financial transaction management?
Global stock exchange
Managing multiple currencies
Auditing
Expense management automation
Which is NOT a basic method of computer security in hardware and software?
Antivirus
Firewall
Windows Updates
Router Restrictions
What is the type of system security malware that allows for access to computer, program, or unauthorized service called?
Frontdoor
Sidedoor
Backdoor
Closed doors
Which one is an example of an input device?
monitor
printer
keyboard
projector
Why is CRM so important to any organization?
Helps org perform appropriate analysis to see who their customers are and what their wants or needs are.
Better assist those wants or needs. More revenue and profits
A and B
Which one of the consumer touch points must an organization CRM system manage?
Telephone Contact
Direct Mailing
E-mail
Physical contact
List the phases of the project management process in order.
Planning, Execution, Monitoring and Control, Completion, Initiation
Planning, Initiation, Execution, Monitoring and Control, Completion
Initiation, Planning, Execution, Monitoring and Control, Completion
Initiation, Execution, Monitoring and Control, Planning, Completion
What are the three constraints of project management?
Time, effort, and style
Time, cost, and availability
Time, cost, and scope
Time, supervisors, and budget
Which of the following is NOT a well known anti-malware product?
Norton Anti-Malware
PC-cillin
McAspirin
VirusScan
Which of the following is a sign that your computer is infected?
Programs run smoothly
your computer runs out of memory due to the fact that you have been using it for 10 years
a random picture of a unicorn pops up on your screen that makes you smile
your computer shuts down when you hit the power button
Every time you access the internet or use your computer what do you risk?
Professional information
Personal information
Which is NOT a type of action to protect your information assets?
Behavioral actions
Computer-based actions
Software based actions
All of these are types of actions to protect information assets
What is a trojan horse?
a beneficial program that scans for viruses
a fake website intended to steal sensitive user information
a malicious program disguised as legitimate software
an application that secures sensitive user information
Acquiring IT applications from outside contractors or external organizations is called
external reach
external plug in
outsourcing
external sourcing
What is SSID stand for?
Social Security Identification
Secure Sources Internet driver
Service set identifier
What does "GUI" stand for?
Graphical Understanding Internet
Graphing Under Ignes
Graphical User Interface
Graphing User Internet
Which of the following is not one of the six keys to getting the most from your connectivity?
Collaborative Workgroups
Online Reference
Web Surfing
Training
What is the purpose of functional systems?
To relieve workers of of tedious, repetitive tasks
To integrate the activities in an entire business process for efficiency
To facilitate the work and generate information for a single department or function
To simplify a program by categorizing everything into different steps
What is Microsoft Access most useful for?
Making spreadsheets for information
Typing word documents
Store Information for reference
Search the internet
which one is correct?
Customer relationship management (CRM) is not important solely for large enterprises.
CRM and CRM systems are critical to the success of modern businesses.
All of above.
None of above.
When do customers provide feedback?
When service is really good
When service is really bad
When service is really good or really bad
Which of the following is not taken into consideration when acquiring a new IT application?
How much code does the company want to write.
Where will the application run?
Where will the application originate?
When will it be completed?
What problems do database systems minimize?
data isolation
data inconsistency
A byte can be which of the following?
A letter
A number
A symbol
All of the above
Which of the following is not a characteristic of master data?
used to categorize
used to aggregate
evaluate the transaction data
copy codes
If all IT applications require data, what are characteristics of the data?
High quality
High quality accurate and consistent
timely and relevant
What does IT stand for?
Insane Tech
Information Team
Inspiring Technicians
None of the answers provided are correct.
Which is a problem that database systems minimize?
Data Redundancy
Data Isolation
Data Inconsistency
All of the Above
Who are the users of the database system?
System and database administrators
End users
Database designers
Which is not the limitation of file system data management?
Requires extensive programming
System administration is complex and difficult
Changing existing structures is difficult
All of them are limitations of file system data management.
Why should we use open source software in business?
Flexibility
Cost Efficiency
Security
Techniques for illegally obtaining personal information include
Stealing mail or dumpster diving
Stealing personal information in computer databases
Impersonating a trusted organization in an electronic communication
All above
database system minimize which following is not problems
data security
non of above
What are the difficulties of managing data
The amount of data increases greatly as time goes by
data are scattered throughout organizations
Data are collected by many individuals using various methods and devices
all the above
Which of the following is not a binary relationship?
one-to-one relationship
one-to-many relationship
many-to-many relationship
Open relationship
Which of the following statement(s) is true?
Business problems span multiple functional areas.
There is no uniform strategy for conducting a cost-benefit analysis.
Computers are irrelevant in society today.
Which of the following are problems with Non-ERP Systems?
Long term maintenance costs are expensive
Ability to engage in process re-engineering is limited
Strategic decision making is not supported
Which one of the following is a basic skill to create and run a slide show?
Using Various design views
Using different slides layout
Running a slide show and adding, sizing and moving text, Cliparts and graphics
Which element is not apart of the table of contents in PowerPoint?
Before you start
Building Blocks
Slide design'
What describes WLAN?
It is same as the standard local network
Devices will not connected by wires
Increase productivity
Which is not a purpose of normalization?
Ensure minimum redundancy
Keep maximum data integrity
Allow for optimal processing performance
Form query relationships
What is an ER Diagram?
A emergency response device Diagram
An electrical router Diagram
A electrical rope Diagram
An Entity- Relation ship Diagram
What are applications of technological knowledge?
home
business
work
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure...
minimum redundancy
maximum data integrity
optimal processing performance
Step not used for the process of entity-relationship modeling
Background
Activity
Deliverable
Model
The exposure of an information results in what to the resource?
Harm
Loss
Damage
These are some signs to look for if you think your computer is infected by malware:
Your computer shuts down unexpectedly by itself
Your computer does not start normally
Your computer runs out of RAM
All the above
Why shouldn't we use animations?
You can't use animation in a powerpoint
Animations can harm your computer
Animation is not a important thing
Because PC and mouse are far from you while you are doing presentation so there is no point
Identify the answer that is a deliberate threat to information system.
Sabatoge or Vandalism
Identity theft
Software attacks
All of the following except what are functions of transaction processing system?
Monitoring
Processing
Storage
Analyzing
which of following system is not a example of information system?
Inventory Management
Quality Control
product life cycle Management
Human resource System
What are some types of deliberate threats to information system?
Software attacks.
Cyberterrorism and Cyberwarfare.
Alien software.
All of the above.
Security can be defined as the degree of protection against:
criminal activity
danger
Damage and/loss
Which of the following are not types of reports discussed in the text?
Routine reports
Ad hoc reports
Exception reports
Sale reports
When was the first U.S. cyberwar directive signed?
1930
1965
1985
2012
What is Computer Virus?
it is always attached to softwares
may or not may take bad actions on the computer
it can destroy files and folder in your computer
all of these above
How to secure your wireless network?
Change the device password to something unique.
Turn SSID off.
Enable encryption such as WPA.
All of above
Which is included in Infectious Control?
Disconnect from the internet both LAN & WAN
Update your antivirus
Check your antivirus software manufacturer’s website for specific procedures and software for particular viruses
What do phishing attacks enable thieves to do?
Steal your identity
Steal your credit card numbers
Steal your passwords
What is the purpose of transaction processing system?
Which of the following is a type of software attack?
Virus
Worm
Phishing attack
Relationships portray an association between entities. The degree of a relationship shows the number of entities associated with a relationship. Which of these is not considered a relationship?
unary relationship
binary relationship
ternary relationship
All of these are considered relationships.
Which one is benefit of the Operational CRM system
A 360° view of each customer
Efficient, personalized marketing, sales, and service
The ability of sales and service employees to access a complete history of customer interaction with the organization, regardless of the touch point
all above
Projects that are far over budget and past deadline resulting in abandonment are called?
Bad Projects
Disasters
Efficiently planned projects
Runaway projects
Which of the following is NOT one of the five distinct phases of project management?
Printing
what the benefits CRM systems provide had?
which one is the triple constraints of project management
scope
time
cost
All of these answers are correct.
what are the risks while using the Cloud Computing?
battery
privacy and security
criminal use of cloud computing
both B and C
According to the textbook, which of the followings is one of the knowledge areas of Project Management Body of Knowledge (PMBOK)?
Project Integration Management
Project Scope Management
Project Time Management
Which of the following is NOT an example of one of the triple constraints of project management?
Time
Cost
Scope
Innovation
Which of the following is NOT a factor of triple constraints of project management?
activity
What is Electronic Surveillance?
The principles of right and wrong
Using software to block inappropriate websites
responsibility, accountability, liability
tracking people's activity with the aid of computers
What type of functional area information systems (FAISs) is??
Accounting
Marketing
Human resource
Which one of the following is considered a sign to look for if you believe your computer is affected with malicious software or malware?
your computer shuts down unexpectedly by itself
programs take longer to load than normal
your computer does not start normally
Which one is the antispam software?
SpamKiller
SpamGourmet
SpamAssassin
A Trojan Horse is associated with all of the following except...
Robot
Zombie
Romans
What actions to take to protect your information assets?
Which of the various computer-based actions can you take to protect your information assets?
Run free malware scans on your computer.
Have a firewall on your computer
Never download any files or software over the internet from websites that you do not know
When you discard mail or old records, you should use a
Single-cut shredder
Cross-cut shredder
Confetti shredder
B and C are both proper methods
Which of the following is not a sign that your computer is infected?
Programs take longer to load than usual.
Your email sends messages to all contacts in your address book on its own.
Your system continually runs out of main memory.
You can download files as usual.
IT is helpful in:
Performing specific tasks on a computer
Allowing users to gain access to programs
Making more efficient use of a computer