Mikaela Fenton
Quiz von , erstellt am more than 1 year ago

Quiz am Reading Exam Questions, erstellt von Mikaela Fenton am 16/05/2018.

24
1
0
Keine Merkmale angegeben
Mikaela Fenton
Erstellt von Mikaela Fenton vor etwa 6 Jahre
Schließen

Reading Exam Questions

Frage 1 von 200

1

What is data governance?

Wähle eine der folgenden:

  • an approach to managing information across an entire organization

  • a process that spans all organizational business processes and applications

  • a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems

  • generated and captured by operational systems, describe the business’s activities, or transactions.

Erklärung

Frage 2 von 200

1

Five major parts of database

Wähle eine der folgenden:

  • Hardware, software, people, procedures, data

  • Hardware, software, Database, CPU

  • Keyboard, monitor, CPU, Physical component, computer

  • Hardware, Procedures, standards, CPU,UPS

Erklärung

Frage 3 von 200

1

Which of the following include all major parts of a database system?

Wähle eine der folgenden:

  • Hardware, Software, People, Procedures, Data

  • Hardware and Software

  • People

  • None of above

Erklärung

Frage 4 von 200

1

what is the 'initial public offering' stands for?

Wähle eine der folgenden:

  • IPO

  • ICO

  • ITO

  • IMO

Erklärung

Frage 5 von 200

1

What is a bit?

Wähle eine der folgenden:

  • The smallest unit of data a computer can process

  • A group of eight bits

  • CRM

  • A logical grouping of characters into a word, a small group of words, or an identification number

Erklärung

Frage 6 von 200

1

Data governance is an approach to managing information across ________ ?

Wähle eine der folgenden:

  • An entire organization

  • None of an organization

  • multiple organizations

  • The whole world

Erklärung

Frage 7 von 200

1

When is data managed most efficiently?

Wähle eine der folgenden:

  • When it is stored in a database.

  • When it is most accurate.

  • When the data is true.

  • When the data is in its rawest form.

Erklärung

Frage 8 von 200

1

What is the difference between Master Data and Transaction Data?

Wähle eine der folgenden:

  • Master data are applied to multiple transactions and are used to categorize, aggregate, and evaluate the transaction data.

  • Transaction data are a set of core data, such as customer, product, employee, vendor, geo- graphic location, and so on, that span the enterprise information systems.

  • Transaction data is a process that spans all organizational business processes and applications.

  • Master data is an approach to managing information across an entire organization.

Erklärung

Frage 9 von 200

1

How does the planning process for IT applications begin?

Wähle eine der folgenden:

  • Through organizational strategic planning

  • when it gets approved by manager

  • Never

  • It doesn't have a beginning

Erklärung

Frage 10 von 200

1

What is normalization of data?

Wähle eine der folgenden:

  • A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.

  • A method for expanding a database to contain all information related to a certain topic and get the most general view of the information

  • A method that ignores data integrity to optimal processing performance to reduce redundancy within the data set

  • A method of creating a dataset with very little data to get a very general view of the topic at hand

Erklärung

Frage 11 von 200

1

What is the point of relationships in databases?

Wähle eine der folgenden:

  • Relationships illustrate an association between entities.

  • Relationships draw connections between the database and real life.

  • Relationships convert computer-readable binary code to a language humans can understand.

  • Relationships ensure that the link between the computer software and hardware remains functional as you use the database.

Erklärung

Frage 12 von 200

1

What are the two main types of queries commonly used in database operations?

Wähle eine der folgenden:

  • Structured query language (SQL) and Query by example (QBE)

  • Query inquiry prototype (QIP) and Databased Query Investment (DQI)

  • Query by knowledge (QBN) and Query by theory (QBT)

  • Query through investigation (QTI) or Query by example (QBE)

Erklärung

Frage 13 von 200

1

Relationships illustrate an association between _____

Wähle eine der folgenden:

  • Entities

  • Procedures

  • Policies

  • Principles

Erklärung

Frage 14 von 200

1

What is a binary relationship in database?

Wähle eine der folgenden:

  • A relationship that exists when two entities are associated.

  • A relationship that exists when no entities are associated.

  • A relationship that exists when three entities are associated.

  • A relationship that exists when four entities are associated.

Erklärung

Frage 15 von 200

1

What is a binary relationship?

Wähle eine der folgenden:

  • a relationship between two entities

  • a relationship between ten entities

  • no relationship exists

  • twitter

Erklärung

Frage 16 von 200

1

What is the uniquely identified field of a database called?

Wähle eine der folgenden:

  • Primary key

  • Secondary key

  • Foreign key

  • Database key

Erklärung

Frage 17 von 200

1

What is normalization and its purpose?

Wähle eine der folgenden:

  • A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance

  • A means of expressing that the value of one particular attribute is associated with a specific single value of another attribute

  • To make the data look normal

  • Only God knows

Erklärung

Frage 18 von 200

1

What is a structured query language?

Wähle eine der folgenden:

  • a computer code that allows you to ask questions of a database

  • a schedule builder

  • an online library

  • a computer coding information table

Erklärung

Frage 19 von 200

1

What is structured query language?

Wähle eine der folgenden:

  • a computer code that allows you to ask questions of a database

  • a binary computer code

  • a library

  • a schedule builder

Erklärung

Frage 20 von 200

1

What is an Entity-Relationship Diagram?

Wähle eine der folgenden:

  • Document that shows data entities and attributes and relationships among them

  • A relationship that exists when three entities are associated

  • A relationship that exists when an association is maintained within a single entity

  • The process of designing a database by organizing data entities to be used and identifying the relationships among them

Erklärung

Frage 21 von 200

1

What does "SQL" stand for?

Wähle eine der folgenden:

  • Structured query language

  • Super query language

  • Safe query language

  • Second query language

Erklärung

Frage 22 von 200

1

What is an example of a "simple vs. composite" attribute?

Wähle eine der folgenden:

  • Address

  • Name

  • Customer Number

  • Gender

Erklärung

Frage 23 von 200

1

Which is not a degree of relationship?

Wähle eine der folgenden:

  • Unitary relationship

  • Unary relationship

  • Binary relationship

  • Ternary relationship

Erklärung

Frage 24 von 200

1

What is a 1:1. relationship?

Wähle eine der folgenden:

  • a single-entity instance of one type is related to a single-entity instance of another type.

  • properties that describe the entity’s characteristics.

  • a person, place, or thing that can be identified in the users’ work environment.

  • attributes that are unique to that entity instance.

Erklärung

Frage 25 von 200

1

Which of the following commands doesn't affect the text font?

Wähle eine der folgenden:

  • Borders

  • Underline

  • Bold

  • Italics

Erklärung

Frage 26 von 200

1

What are the 3 advantages of a wireless device?

Wähle eine der folgenden:

  • They are portable and productive.

  • The production of the device is minimal.

  • They can't communicate with other devices.

  • They are cheap.

Erklärung

Frage 27 von 200

1

do you like this class

Wähle eine der folgenden:

  • like

  • dislike

  • you better pick a

  • do not pick b

Erklärung

Frage 28 von 200

1

What is an example of a "one-to-many" relationship?

Wähle eine der folgenden:

  • A professor in a university teaching a certain amount of students

  • Students lecturing other students

  • A private tutor teaching a student calculus

  • Many professors in a university teaching a certain amount of students

Erklärung

Frage 29 von 200

1

When you open PowerPoint and click Blank Presentation, you go directly to:

Wähle eine der folgenden:

  • Your first slide

  • Themes

  • Layout

  • Backstage view

Erklärung

Frage 30 von 200

1

What is piracy?

Wähle eine der folgenden:

  • Copying a software program (other than freeware, demo software, etc.) without making payment to the owner

  • Defense mechanisms

  • Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud

  • Crime in which someone uses the personal informa- tion of others to create a false identity and then uses it for some fraud

Erklärung

Frage 31 von 200

1

What is exposure in regards to information security?

Wähle eine der folgenden:

  • the harm, loss, or damage that can result if a threat compromises the information resource.

  • any danger to which a system may be exposed

  • the possibility that the system will be harmed by a threat

  • the degree of protection against criminal activity, danger, damage, and/or loss

Erklärung

Frage 32 von 200

1

What is one common cause of information breaches

Wähle eine der folgenden:

  • Employee negligence

  • data redundancy

  • The russians

  • Government Interference

Erklärung

Frage 33 von 200

1

Which of the following is a example of a unintentional threat to information systems?

Wähle eine der folgenden:

  • Careless Internet Surfing

  • Espionage or trespass

  • Information Extortion

  • Software Attacks

Erklärung

Frage 34 von 200

1

What is the differences of a trusted network and an untrusted network?

Wähle eine der folgenden:

  • A trusted network, in general, is any network within your organization. An untrusted network, in general, is any network external to your organization.

  • A trusted network, in general, is any network external to your organization. An untrusted network, in general, is any network within your organization.

  • Both are any network that within your organization.

  • None of the above.

Erklärung

Frage 35 von 200

1

what can be defined as the degree of protection against criminal activity, danger, dam- age, and/or loss?

Wähle eine der folgenden:

  • security

  • computer

  • desk

  • phone

Erklärung

Frage 36 von 200

1

Security is important to...

Wähle eine der folgenden:

  • small businesses

  • giant businesses

  • tiny businesses

  • weak businesses

Erklärung

Frage 37 von 200

1

What is social engineering?

Wähle eine der folgenden:

  • An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords

  • When an unauthorized individual attempts to gain illegal access to organizational information

  • When an attacker either threatens to steal, or actually steals, information from a company

  • Deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith

Erklärung

Frage 38 von 200

1

What does a transaction processing system generate?

Wähle eine der folgenden:

  • Data

  • Photos

  • Excel

  • Microsoft

Erklärung

Frage 39 von 200

1

What is Cybercrime?

Wähle eine der folgenden:

  • illegal activities conducted over computer networks, particularly the Internet.

  • The first video ever created.

  • Anti-virus Software.

  • Theft of computers.

Erklärung

Frage 40 von 200

1

What does CRM stand for?

Wähle eine der folgenden:

  • Customer Relationship Management

  • Classical Relationship Management

  • Clinical Rotational Mission

  • Customer Rotational Mission

Erklärung

Frage 41 von 200

1

What is a transaction?

Wähle eine der folgenden:

  • any business event that generates data worthy of being captured and stored in a database

  • a non-business event

  • a collection of random data

  • anything that is done in a business

Erklärung

Frage 42 von 200

1

What is a domain name?

Wähle eine der folgenden:

  • The name assigned to an internet site, consisting of multiple parts, separated by dots, which are translated from right to left

  • The name you give your computer

  • A company that gives you a fancy website name

  • The store you purchase computers from

Erklärung

Frage 43 von 200

1

Which of the following is true of Sales Force Automation (SFA)?

Wähle eine der folgenden:

  • It automatically records all of the components of a sales transaction process

  • It includes a contact management system that that automatically sends emails to customers

  • It will duplicate contacts for you

  • It has a sales lead tracking system that tracks how many sales you have made

Erklärung

Frage 44 von 200

1

What is project scope management?

Wähle eine der folgenden:

  • Defines the processes that limit and control the work in a project.

  • Is a Turkey.

  • the proper sequencing of data.

  • Resource management and estimating.

Erklärung

Frage 45 von 200

1

Which of the following explains On-Demand CRM?

Wähle eine der folgenden:

  • It's hosted by an external vendor in the vendor’s data center.

  • It's a interactive system where communications related to sales, marketing, and customer service activities are conducted through a mobile medium for the purpose of building and maintaining customer relationships between an organization and its customers

  • It help a company manage the important parts of its business in an integrated fashion

  • It's a system which source code is available to developers and users

Erklärung

Frage 46 von 200

1

What is Project Management Body of Knowledge (PMBOK)

Wähle eine der folgenden:

  • collection of processes and knowledge areas

  • collection of files

  • collection of scripts

  • collection of music videos

Erklärung

Frage 47 von 200

1

What are the five processes of project management?

Wähle eine der folgenden:

  • Initiating,Planning,Executing,Monitoring and Controlling,Closing

  • Planning,Initiating,Executing,Monitoring and Controlling,Closing

  • Monitoring and Controlling,Closing,Planning,Initiating,Executing

  • Planning,Initiating,Monitoring and Controlling,Executing,Closing

Erklärung

Frage 48 von 200

1

what is the project management body of knowledge?

Wähle eine der folgenden:

  • collections of processes and knowledge areas generally accepted as the best practice within the project management discipline

  • provides fundamentals of project management

  • no funding =bad idea

  • all of the above

Erklärung

Frage 49 von 200

1

What does a project management information system do?

Wähle eine der folgenden:

  • A project management information system (PMIS) can provide a framework to help guide the progress of IT projects.

  • used to create professional-looking slideshows that can be displayed on projectors or big-screen TVs

  • create themes, pictures, comic strips, calendar flashcards.

  • none of the above

Erklärung

Frage 50 von 200

1

CRM

Wähle eine der folgenden:

  • is a customer-focused and customer-driven organizational strategy.

  • is a business strategy with transparency

  • is a modern management that communicates with consumers

  • is a business model that consumers satisfied with the products' quality

Erklärung

Frage 51 von 200

1

In reference to product management, what does "time" refer to?

Wähle eine der folgenden:

  • the window of opportunity in which a project must be completed to provide a benefit to the organization.

  • actual amount of resources, including cash and labor, that an organization can commit to completing a project.

  • processes that ensure that the project includes all the work required—and only the work required—to complete the project successfully.

  • money

Erklärung

Frage 52 von 200

1

What does Scope Creep refer to?

Wähle eine der folgenden:

  • Uncontrolled changes in a project’s scope when the scope of a project is not properly defined, documented, or controlled

  • Changes to the initiation of project

  • The monitoring or controlling part of the project management process

  • A creepy scope

Erklärung

Frage 53 von 200

1

What are the five distinct phases of the traditional approach to project management?

Wähle eine der folgenden:

  • Initiation, planning, execution, monitoring and control, and completion.

  • Monitoring, comparing, identifying, documenting, executing

  • Focusing, mastering, building, excelling, establishing

  • None of the above.

Erklärung

Frage 54 von 200

1

What are the five basic process groups of the PMBOK?

Wähle eine der folgenden:

  • Initiation, planning, execution, monitoring and control, completion

  • Planning, coding, execution, completion, innitiation

  • Coding, marketing, initiation, monitoring, completion

  • Promoting, selling, monitoring, dealing, planning

Erklärung

Frage 55 von 200

1

Which of the four is NOT a way of enabling project management success?

Wähle eine der folgenden:

  • Forcing members of a group to execute a project that they are not comfortable with

  • Focusing on managing strategy and stakeholders instead of exclusively concentrating on budgeting and scheduling

  • Building effective teams by aligning their incentives with the overall goals of projects

  • Mastering technology and project content by securing critical internal and external talent

Erklärung

Frage 56 von 200

1

The _________ is a collection of processes and knowledge areas generally accepted as best practice within the project management discipline.

Wähle eine der folgenden:

  • Project Management Body of Knowledge

  • Computer

  • Motherboard

  • The mouse

Erklärung

Frage 57 von 200

1

What refers to a real-time, wireless connection between a mobile device and other computing environments?

Wähle eine der folgenden:

  • Mobile computing

  • Mobile commerce

  • Pervasive computing

  • Ubiquitous computing

Erklärung

Frage 58 von 200

1

Surfing the web anonymously has which negative side effect?

Wähle eine der folgenden:

  • Web surfing is slower compared to normal surfing

  • You can't purchase items online

  • You can only surf 1 webpage per day

  • No side effects

Erklärung

Frage 59 von 200

1

What happens to the private information stored in the typical smartphone?

Wähle eine der folgenden:

  • It is auctioned to advertisers by applications automatically

  • It is secure on your device as long as you are not hacked

  • You may opt in or out of sending private information for a more personalized experience

  • It is secure from hackers on a private server

Erklärung

Frage 60 von 200

1

_____________ is a thin, flat device using polarized light from a light source and liquid crystals to illuminate colored pixels.

Wähle eine der folgenden:

  • LCD

  • ABC

  • YMCA

  • XYZ

Erklärung

Frage 61 von 200

1

What is a good way to keep privacy?

Wähle eine der folgenden:

  • Not save passwords

  • Save all passwords

  • Share your information with friends

  • Not have a passcode to enter the computer

Erklärung

Frage 62 von 200

1

What is a proxy server?

Wähle eine der folgenden:

  • It is a computer to which you connect, which in turn connects to the Web site you wish to visit.

  • It hacks into computers

  • It is a data base

  • none of the above

Erklärung

Frage 63 von 200

1

You should never post personal information about yourself or your family on any type of social networking sites

Wähle eine der folgenden:

  • TRUE

  • FALSE

Erklärung

Frage 64 von 200

1

What supports the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data?

Wähle eine der folgenden:

  • Transaction processing system (TPS)

  • FAIS

  • Organization Database

  • Expert System

Erklärung

Frage 65 von 200

1

Define TPS

Wähle eine der folgenden:

  • to monitor, store, collect, and process data generated from all business transactions

  • To create profit for business

  • Allows for easier tasks within workforce

  • Helps with customer satisfaction

Erklärung

Frage 66 von 200

1

What is Master Data?

Wähle eine der folgenden:

  • A Set of Core Data

  • Data about data

  • data about computers

  • data from your Operating System

Erklärung

Frage 67 von 200

1

Data Warehouse refers to what?

Wähle eine der folgenden:

  • A multi-dimensional database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

  • A relational or multi-dimensional database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

  • A simple database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

  • A linearized database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

Erklärung

Frage 68 von 200

1

What is a plugin

Wähle eine der folgenden:

  • bundle that helps an application function

  • applications

  • excel charts

  • microsoft office suit

Erklärung

Frage 69 von 200

1

What are Comparative Reports?

Wähle eine der folgenden:

  • Reports that compare performances of different business units or times

  • Reports that show a greater level of detail than is included in routine reports.

  • Reports that include only information that exceeds certain threshold standards.

  • None of the above

Erklärung

Frage 70 von 200

1

what is IT planning?

Wähle eine der folgenden:

  • organizational strategic plan

  • Tech support

  • Program that organizes

  • all of the above

Erklärung

Frage 71 von 200

1

what is CRM short for?

Wähle eine der folgenden:

  • Customer Relationship Management

  • Customer Relationship Manual

  • Customer Relationship Machinery

  • none of them above

Erklärung

Frage 72 von 200

1

What does CRM stand for?

Wähle eine der folgenden:

  • Customer Relationship Management

  • Customer Rotational Mission

  • Classical Relationship Management

  • Clinical Rotational Mission

Erklärung

Frage 73 von 200

1

The practice of marketing additional related products to customers based on a previous purchase is:

Wähle eine der folgenden:

  • cross-selling

  • upselling

  • bundling

  • none of above

Erklärung

Frage 74 von 200

1

What is the advantages of on-demand CRM systems?

Wähle eine der folgenden:

  • Lower costs and a need for employees to know only how to access and utilize the software.

  • Easy to enter.

  • Possibly unreliable vendors.

  • Difficulty in modifying the software.

Erklärung

Frage 75 von 200

1

What does CRM stand for?

Wähle eine der folgenden:

  • Customer Relationship Management

  • Courtesy Reply Mail

  • Cause Related Marketing

  • Charge Residue Model

Erklärung

Frage 76 von 200

1

The drawbacks of on-demand CRM system are all of the following EXCEPT

Wähle eine der folgenden:

  • lower costs

  • possible reliable vendors

  • difficult to modify software

  • difficult to modify softwar

Erklärung

Frage 77 von 200

1

What is a database?

Wähle eine der folgenden:

  • Database is a computer programming

  • Database is a storage of message

  • It is a video game!

  • Database used to connect programs, which is really cool.

Erklärung

Frage 78 von 200

1

What problems do databases NOT minimize?

Wähle eine der folgenden:

  • Data redundancy

  • Data repetition

  • Data isolation

  • Data inconsistency

Erklärung

Frage 79 von 200

1

Organizations store data in what?

Wähle eine der folgenden:

  • Safe Vaults

  • Databases

  • Guarded facilities

  • Software

Erklärung

Frage 80 von 200

1

The most popular language used to interact with a database is...

Wähle eine der folgenden:

  • Standard Query Example (SQE)

  • Structured Query Language (SQL)

  • Query by Example (QBE)

  • Query Lookup Tool (QLT)

Erklärung

Frage 81 von 200

1

When data are normalized, attributes in each table depend on the _______.

Wähle eine der folgenden:

  • joint operation

  • primary key

  • structured query language

  • database

Erklärung

Frage 82 von 200

1

What is an ethernet?

Wähle eine der folgenden:

  • A keyboard

  • A common LAN protocol

  • A modem

  • A common WAN protocol

Erklärung

Frage 83 von 200

1

What does SQL stand for?

Wähle eine der folgenden:

  • Standard Query Language

  • Structured Query Language

  • Structured Quote Literacy

  • Standard Query Literacy

Erklärung

Frage 84 von 200

1

What is a relationship in the context of this class?

Wähle eine der folgenden:

  • Something I will never have

  • An association between entities

  • A description of policies, principles, and procedures

  • A query language for interacting with a database

Erklärung

Frage 85 von 200

1

What does SLQ stand for?

Wähle eine der folgenden:

  • Software query language

  • Structured query language

  • Structure query learning

  • Software query learning

Erklärung

Frage 86 von 200

1

Whats is a data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.

Wähle eine der folgenden:

  • explicit knowledge model

  • relational database model

  • entity-relationship modeling

  • multidimensional structure model

Erklärung

Frage 87 von 200

1

What does the threat of a trespass entail?

Wähle eine der folgenden:

  • Occurs when an attacker threatens to steal or steals information from a company

  • Occurs when an unauthorized individual attempts to gain illegal access to organizational information

  • Occurs when a deliberate act that involves defacing an organization's website is made

  • When a device is stolen/used by an attacker

Erklärung

Frage 88 von 200

1

What is Identity Theft?

Wähle eine der folgenden:

  • deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith

  • the deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime.

  • stealing computing devices and storage devices

  • used malicious software to infect as many computers worldwide as possible, to the profit- driven, Web-based attacks of today.

Erklärung

Frage 89 von 200

1

What is a trusted network?

Wähle eine der folgenden:

  • any network you know the password.

  • any network within your organization.

  • any network external to your organization.

  • all of above are incorrect.

Erklärung

Frage 90 von 200

1

What is NOT a common deliberate threat to information systems?

Wähle eine der folgenden:

  • Espionage or trespass

  • Alien invasion

  • Information extortion, identity thefts, and sabotage

  • All of the above are common threats to information systems

Erklärung

Frage 91 von 200

1

Which of the following is not an example of a deliberate threat to information systems?

Wähle eine der folgenden:

  • Cyberterrorism

  • Social engineering

  • Espionage

  • Alien software

Erklärung

Frage 92 von 200

1

What is Scope Creep?

Wähle eine der folgenden:

  • Increasing the scope of a project without asking first

  • Uncontrolled changes in a projects scope

  • When you don't know the scope of the project

  • When Listerine isn't on sale you have to buy a different brand

Erklärung

Frage 93 von 200

1

What is one of the most well known centers for customer interaction?

Wähle eine der folgenden:

  • Customer Services

  • Call Center

  • the mall food court

  • HR

Erklärung

Frage 94 von 200

1

Which is the first phase in project management?

Wähle eine der folgenden:

  • Planning

  • Initiation

  • Execution

  • Monitoring and Control

Erklärung

Frage 95 von 200

1

Which of these is considered "project execution?"

Wähle eine der folgenden:

  • Defining the problem that the project is intended to solve and the goals that it is to achieve.

  • The work defined in the project management plan is performed to accomplish the project’s requirements.

  • To identify and sequence every project objective and activity associated with that objective.

  • Uncontrolled changes in a project’s scope.

Erklärung

Frage 96 von 200

1

Which of the following is NOT part of the process for developing an application?

Wähle eine der folgenden:

  • Clearly defining what the program is to do.

  • Make the app able to store 1 terabyte of data

  • Visualizing the application running on the computer and designing its user interface

  • Defining values for each control's relevant properties

Erklärung

Frage 97 von 200

1

Choose the best definition for Adware

Wähle eine der folgenden:

  • Something that you can commonly find de-installation procedures

  • A term applied to programs that either launch advertisements/ re-direct search results to promotional web sites

  • Advertisements you receive via mail

  • None of the above

Erklärung

Frage 98 von 200

1

What is NOT an example of a short-range wireless network?

Wähle eine der folgenden:

  • Bluetooth

  • Wi-Fi

  • Ultra-Wideband

  • Near-Field Communications

Erklärung

Frage 99 von 200

1

Which of the following is NOT an advantage of a wireless device?

Wähle eine der folgenden:

  • Small enough to carry

  • Copy and pass confidential information easily

  • Provide sufficient computing power to preform productive tasks

  • Can communicate wirelessly with the internet and other devices

Erklärung

Frage 100 von 200

1

Which command CANNOT be used to do diagnostics?

Wähle eine der folgenden:

  • qqnorm

  • BFtest

  • shapiro.test

  • leveneTest

Erklärung

Frage 101 von 200

1

What is Windows Defender?

Wähle eine der folgenden:

  • Minesweeper

  • Free Antivirus program already installed on windows computers

  • Paid Antivirus program that is specific to Linux

  • Successor to Clippy. Helps write resumes.

Erklärung

Frage 102 von 200

1

Which is not the way to close the application in mac?

Wähle eine der folgenden:

  • Use the mouse to click

  • Command+q

  • Command+m

  • Command+c

Erklärung

Frage 103 von 200

1

What are the key functions of a TPS (Transaction Processing System)?

Wähle eine der folgenden:

  • Input functions, output functions, storage functions

  • Input functions, Processing the functions, Output functions, Storage functions

  • Processing the functions, storage functions

  • Processing the functions, output functions, storage functions

Erklärung

Frage 104 von 200

1

Which is not a goal of Customer relationship management?

Wähle eine der folgenden:

  • Improving business relationships with customers

  • Get customer’s personal information

  • Assisting in customer retention

  • Driving sales growth

Erklärung

Frage 105 von 200

1

Data Redundancy is defined as

Wähle eine der folgenden:

  • Various copies of the data do not agree

  • Applications and data are independent of one another

  • The same data are stored in multiple locations

  • None of the above

Erklärung

Frage 106 von 200

1

What is a primary key?

Wähle eine der folgenden:

  • a password that gives the user access to all applications in an application suite

  • a type of Macro

  • a field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated and sorted

  • a piece of hardware needed to help laptops run smoothly

Erklärung

Frage 107 von 200

1

What is NOT a difficulty involved in managing data?

Wähle eine der folgenden:

  • Data accumulates over time

  • Data is scattered throughout organizations

  • Data is difficult to understand

  • Data is obtained from multiple sources

Erklärung

Frage 108 von 200

1

When a company examines its needs and performance, it generates a prioritized list of both existing and potential IT applications. This is called?

Wähle eine der folgenden:

  • IT strategic plan

  • application portfolio

  • organizational strategic plan

  • none of the above

Erklärung

Frage 109 von 200

1

A data warehouse:

Wähle eine der folgenden:

  • has data located at a single site.

  • supports a company's day to day operations.

  • stores data used for tactical or strategic decisions.

  • has data distributed across several different sties.

Erklärung

Frage 110 von 200

1

What does SQL stand for?

Wähle eine der folgenden:

  • Standard Quarter Language

  • Standard Query Langauge

  • Structured Query Language

  • Structured Question Language

Erklärung

Frage 111 von 200

1

A database can store:

Wähle eine der folgenden:

  • Metadata

  • End-user data

  • Both A and B

  • Neither A or B

Erklärung

Frage 112 von 200

1

What is an example of a primary key?

Wähle eine der folgenden:

  • First name

  • Date of birth

  • Student ID

  • Town of residence

Erklärung

Frage 113 von 200

1

Which of the following is incorrect regarding SQL?

Wähle eine der folgenden:

  • SQL is the most popular database query language

  • SQL uses keywords and statements to perform searches

  • SQL is simpler to use than QBE

  • SQL stands for Structured Query Language

Erklärung

Frage 114 von 200

1

What is a binary relationship?

Wähle eine der folgenden:

  • A binary relationship illustrate an association between entities.

  • A binary relationship exists when an association is maintained within a single entity.

  • A binary relationship exists when two entities are associated.

  • A binary relationship exists when three entities are associated.

Erklärung

Frage 115 von 200

1

What should be used to request information out of data?

Wähle eine der folgenden:

  • Google

  • Ctrl F

  • Query

  • Help function in program

Erklärung

Frage 116 von 200

1

Designers plan and create databases through the process of...

Wähle eine der folgenden:

  • entity–relationship modeling

  • using an entity–relationship diagram

  • both A & B

  • none of the above

Erklärung

Frage 117 von 200

1

Which of the following answer are not supported by transaction processing system(TPS)?

Wähle eine der folgenden:

  • monitoring

  • collection

  • drive

  • storage

Erklärung

Frage 118 von 200

1

Which one is not included in risk management?

Wähle eine der folgenden:

  • Process of identifying risk

  • Assessing its relative magnitude

  • Wait for the risk to lessen

  • Taking steps to reduce it to an acceptable level

Erklärung

Frage 119 von 200

1

Which statement about quality control systems is FALSE?

Wähle eine der folgenden:

  • They can be stored for future analysis

  • They can be interpreted in real time

  • They assess the speed of computers

  • They provide information about incoming material and parts

Erklärung

Frage 120 von 200

1

Which is not an example of financial transaction management?

Wähle eine der folgenden:

  • Global stock exchange

  • Managing multiple currencies

  • Auditing

  • Expense management automation

Erklärung

Frage 121 von 200

1

Which is NOT a basic method of computer security in hardware and software?

Wähle eine der folgenden:

  • Antivirus

  • Firewall

  • Windows Updates

  • Router Restrictions

Erklärung

Frage 122 von 200

1

What is the type of system security malware that allows for access to computer, program, or unauthorized service called?

Wähle eine der folgenden:

  • Frontdoor

  • Sidedoor

  • Backdoor

  • Closed doors

Erklärung

Frage 123 von 200

1

Which one is an example of an input device?

Wähle eine der folgenden:

  • monitor

  • printer

  • keyboard

  • projector

Erklärung

Frage 124 von 200

1

Why is CRM so important to any organization?

Wähle eine der folgenden:

  • Helps org perform appropriate analysis to see who their customers are and what their wants or needs are.

  • Better assist those wants or needs. More revenue and profits

  • A and B

  • None of above

Erklärung

Frage 125 von 200

1

Which one of the consumer touch points must an organization CRM system manage?

Wähle eine der folgenden:

  • Telephone Contact

  • Direct Mailing

  • E-mail

  • Physical contact

Erklärung

Frage 126 von 200

1

List the phases of the project management process in order.

Wähle eine der folgenden:

  • Planning, Execution, Monitoring and Control, Completion, Initiation

  • Planning, Initiation, Execution, Monitoring and Control, Completion

  • Initiation, Planning, Execution, Monitoring and Control, Completion

  • Initiation, Execution, Monitoring and Control, Planning, Completion

Erklärung

Frage 127 von 200

1

What are the three constraints of project management?

Wähle eine der folgenden:

  • Time, effort, and style

  • Time, cost, and availability

  • Time, cost, and scope

  • Time, supervisors, and budget

Erklärung

Frage 128 von 200

1

Which of the following is NOT a well known anti-malware product?

Wähle eine der folgenden:

  • Norton Anti-Malware

  • PC-cillin

  • McAspirin

  • VirusScan

Erklärung

Frage 129 von 200

1

Which of the following is a sign that your computer is infected?

Wähle eine der folgenden:

  • Programs run smoothly

  • your computer runs out of memory due to the fact that you have been using it for 10 years

  • a random picture of a unicorn pops up on your screen that makes you smile

  • your computer shuts down when you hit the power button

Erklärung

Frage 130 von 200

1

Every time you access the internet or use your computer what do you risk?

Wähle eine der folgenden:

  • Professional information

  • Personal information

  • Both A and B

  • None of the above

Erklärung

Frage 131 von 200

1

Which is NOT a type of action to protect your information assets?

Wähle eine der folgenden:

  • Behavioral actions

  • Computer-based actions

  • Software based actions

  • All of these are types of actions to protect information assets

Erklärung

Frage 132 von 200

1

What is a trojan horse?

Wähle eine der folgenden:

  • a beneficial program that scans for viruses

  • a fake website intended to steal sensitive user information

  • a malicious program disguised as legitimate software

  • an application that secures sensitive user information

Erklärung

Frage 133 von 200

1

Acquiring IT applications from outside contractors or external organizations is called

Wähle eine der folgenden:

  • external reach

  • external plug in

  • outsourcing

  • external sourcing

Erklärung

Frage 134 von 200

1

What is SSID stand for?

Wähle eine der folgenden:

  • Social Security Identification

  • Secure Sources Internet driver

  • Service set identifier

  • None of the above

Erklärung

Frage 135 von 200

1

What does "GUI" stand for?

Wähle eine der folgenden:

  • Graphical Understanding Internet

  • Graphing Under Ignes

  • Graphical User Interface

  • Graphing User Internet

Erklärung

Frage 136 von 200

1

Which of the following is not one of the six keys to getting the most from your connectivity?

Wähle eine der folgenden:

  • Collaborative Workgroups

  • Online Reference

  • Web Surfing

  • Training

Erklärung

Frage 137 von 200

1

What is the purpose of functional systems?

Wähle eine der folgenden:

  • To relieve workers of of tedious, repetitive tasks

  • To integrate the activities in an entire business process for efficiency

  • To facilitate the work and generate information for a single department or function

  • To simplify a program by categorizing everything into different steps

Erklärung

Frage 138 von 200

1

What is Microsoft Access most useful for?

Wähle eine der folgenden:

  • Making spreadsheets for information

  • Typing word documents

  • Store Information for reference

  • Search the internet

Erklärung

Frage 139 von 200

1

which one is correct?

Wähle eine der folgenden:

  • Customer relationship management (CRM) is not important solely for large enterprises.

  • CRM and CRM systems are critical to the success of modern businesses.

  • All of above.

  • None of above.

Erklärung

Frage 140 von 200

1

When do customers provide feedback?

Wähle eine der folgenden:

  • When service is really good

  • When service is really bad

  • When service is really good or really bad

  • Never

Erklärung

Frage 141 von 200

1

Which of the following is not taken into consideration when acquiring a new IT application?

Wähle eine der folgenden:

  • How much code does the company want to write.

  • Where will the application run?

  • Where will the application originate?

  • When will it be completed?

Erklärung

Frage 142 von 200

1

What problems do database systems minimize?

Wähle eine der folgenden:

  • data redundancy

  • data isolation

  • data inconsistency

  • all of the above

Erklärung

Frage 143 von 200

1

A byte can be which of the following?

Wähle eine der folgenden:

  • A letter

  • A number

  • A symbol

  • All of the above

Erklärung

Frage 144 von 200

1

Which of the following is not a characteristic of master data?

Wähle eine der folgenden:

  • used to categorize

  • used to aggregate

  • evaluate the transaction data

  • copy codes

Erklärung

Frage 145 von 200

1

If all IT applications require data, what are characteristics of the data?

Wähle eine der folgenden:

  • High quality

  • High quality accurate and consistent

  • timely and relevant

  • all of the above

Erklärung

Frage 146 von 200

1

What does IT stand for?

Wähle eine der folgenden:

  • Insane Tech

  • Information Team

  • Inspiring Technicians

  • None of the answers provided are correct.

Erklärung

Frage 147 von 200

1

Which is a problem that database systems minimize?

Wähle eine der folgenden:

  • Data Redundancy

  • Data Isolation

  • Data Inconsistency

  • All of the Above

Erklärung

Frage 148 von 200

1

Who are the users of the database system?

Wähle eine der folgenden:

  • System and database administrators

  • End users

  • Database designers

  • All of the above

Erklärung

Frage 149 von 200

1

Which is not the limitation of file system data management?

Wähle eine der folgenden:

  • Requires extensive programming

  • System administration is complex and difficult

  • Changing existing structures is difficult

  • All of them are limitations of file system data management.

Erklärung

Frage 150 von 200

1

Why should we use open source software in business?

Wähle eine der folgenden:

  • Flexibility

  • Cost Efficiency

  • Security

  • All of the above

Erklärung

Frage 151 von 200

1

Techniques for illegally obtaining personal information include

Wähle eine der folgenden:

  • Stealing mail or dumpster diving

  • Stealing personal information in computer databases

  • Impersonating a trusted organization in an electronic communication

  • All above

Erklärung

Frage 152 von 200

1

database system minimize which following is not problems

Wähle eine der folgenden:

  • data redundancy

  • data isolation

  • data security

  • non of above

Erklärung

Frage 153 von 200

1

What are the difficulties of managing data

Wähle eine der folgenden:

  • The amount of data increases greatly as time goes by

  • data are scattered throughout organizations

  • Data are collected by many individuals using various methods and devices

  • all the above

Erklärung

Frage 154 von 200

1

Which of the following is not a binary relationship?

Wähle eine der folgenden:

  • one-to-one relationship

  • one-to-many relationship

  • many-to-many relationship

  • Open relationship

Erklärung

Frage 155 von 200

1

Which of the following statement(s) is true?

Wähle eine der folgenden:

  • Business problems span multiple functional areas.

  • There is no uniform strategy for conducting a cost-benefit analysis.

  • Computers are irrelevant in society today.

  • A and B

Erklärung

Frage 156 von 200

1

Which of the following are problems with Non-ERP Systems?

Wähle eine der folgenden:

  • Long term maintenance costs are expensive

  • Ability to engage in process re-engineering is limited

  • Strategic decision making is not supported

  • All of the above

Erklärung

Frage 157 von 200

1

Which one of the following is a basic skill to create and run a slide show?

Wähle eine der folgenden:

  • Using Various design views

  • Using different slides layout

  • Running a slide show and adding, sizing and moving text, Cliparts and graphics

  • All of the above

Erklärung

Frage 158 von 200

1

Which element is not apart of the table of contents in PowerPoint?

Wähle eine der folgenden:

  • Before you start

  • Building Blocks

  • Slide design'

  • Query

Erklärung

Frage 159 von 200

1

What describes WLAN?

Wähle eine der folgenden:

  • It is same as the standard local network

  • Devices will not connected by wires

  • Increase productivity

  • All of the above

Erklärung

Frage 160 von 200

1

Which is not a purpose of normalization?

Wähle eine der folgenden:

  • Ensure minimum redundancy

  • Keep maximum data integrity

  • Allow for optimal processing performance

  • Form query relationships

Erklärung

Frage 161 von 200

1

What is an ER Diagram?

Wähle eine der folgenden:

  • A emergency response device Diagram

  • An electrical router Diagram

  • A electrical rope Diagram

  • An Entity- Relation ship Diagram

Erklärung

Frage 162 von 200

1

What are applications of technological knowledge?

Wähle eine der folgenden:

  • home

  • business

  • work

  • all of the above

Erklärung

Frage 163 von 200

1

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure...

Wähle eine der folgenden:

  • minimum redundancy

  • maximum data integrity

  • optimal processing performance

  • all of the above

Erklärung

Frage 164 von 200

1

Step not used for the process of entity-relationship modeling

Wähle eine der folgenden:

  • Background

  • Activity

  • Deliverable

  • Model

Erklärung

Frage 165 von 200

1

The exposure of an information results in what to the resource?

Wähle eine der folgenden:

  • Harm

  • Loss

  • Damage

  • All of the above

Erklärung

Frage 166 von 200

1

These are some signs to look for if you think your computer is infected by malware:

Wähle eine der folgenden:

  • Your computer shuts down unexpectedly by itself

  • Your computer does not start normally

  • Your computer runs out of RAM

  • All the above

Erklärung

Frage 167 von 200

1

Why shouldn't we use animations?

Wähle eine der folgenden:

  • You can't use animation in a powerpoint

  • Animations can harm your computer

  • Animation is not a important thing

  • Because PC and mouse are far from you while you are doing presentation so there is no point

Erklärung

Frage 168 von 200

1

Identify the answer that is a deliberate threat to information system.

Wähle eine der folgenden:

  • Sabatoge or Vandalism

  • Identity theft

  • Software attacks

  • All of the above

Erklärung

Frage 169 von 200

1

All of the following except what are functions of transaction processing system?

Wähle eine der folgenden:

  • Monitoring

  • Processing

  • Storage

  • Analyzing

Erklärung

Frage 170 von 200

1

which of following system is not a example of information system?

Wähle eine der folgenden:

  • Inventory Management

  • Quality Control

  • product life cycle Management

  • Human resource System

Erklärung

Frage 171 von 200

1

What are some types of deliberate threats to information system?

Wähle eine der folgenden:

  • Software attacks.

  • Cyberterrorism and Cyberwarfare.

  • Alien software.

  • All of the above.

Erklärung

Frage 172 von 200

1

Security can be defined as the degree of protection against:

Wähle eine der folgenden:

  • criminal activity

  • danger

  • Damage and/loss

  • all of the above

Erklärung

Frage 173 von 200

1

Which of the following are not types of reports discussed in the text?

Wähle eine der folgenden:

  • Routine reports

  • Ad hoc reports

  • Exception reports

  • Sale reports

Erklärung

Frage 174 von 200

1

When was the first U.S. cyberwar directive signed?

Wähle eine der folgenden:

  • 1930

  • 1965

  • 1985

  • 2012

Erklärung

Frage 175 von 200

1

What is Computer Virus?

Wähle eine der folgenden:

  • it is always attached to softwares

  • may or not may take bad actions on the computer

  • it can destroy files and folder in your computer

  • all of these above

Erklärung

Frage 176 von 200

1

How to secure your wireless network?

Wähle eine der folgenden:

  • Change the device password to something unique.

  • Turn SSID off.

  • Enable encryption such as WPA.

  • All of above

Erklärung

Frage 177 von 200

1

Which is included in Infectious Control?

Wähle eine der folgenden:

  • Disconnect from the internet both LAN & WAN

  • Update your antivirus

  • Check your antivirus software manufacturer’s website for specific procedures and software for particular viruses

  • All of above

Erklärung

Frage 178 von 200

1

What do phishing attacks enable thieves to do?

Wähle eine der folgenden:

  • Steal your identity

  • Steal your credit card numbers

  • Steal your passwords

  • All of the above.

Erklärung

Frage 179 von 200

1

What is the purpose of transaction processing system?

Wähle eine der folgenden:

  • Background

  • Activity

  • Deliverable

  • All of the Above

Erklärung

Frage 180 von 200

1

Which of the following is a type of software attack?

Wähle eine der folgenden:

  • Virus

  • Worm

  • Phishing attack

  • All of the Above

Erklärung

Frage 181 von 200

1

Relationships portray an association between entities. The degree of a relationship shows the number of entities associated with a relationship. Which of these is not considered a relationship?

Wähle eine der folgenden:

  • unary relationship

  • binary relationship

  • ternary relationship

  • All of these are considered relationships.

Erklärung

Frage 182 von 200

1

Which one is benefit of the Operational CRM system

Wähle eine der folgenden:

  • A 360° view of each customer

  • Efficient, personalized marketing, sales, and service

  • The ability of sales and service employees to access a complete history of customer interaction with the organization, regardless of the touch point

  • all above

Erklärung

Frage 183 von 200

1

Projects that are far over budget and past deadline resulting in abandonment are called?

Wähle eine der folgenden:

  • Bad Projects

  • Disasters

  • Efficiently planned projects

  • Runaway projects

Erklärung

Frage 184 von 200

1

Which of the following is NOT one of the five distinct phases of project management?

Wähle eine der folgenden:

  • Initiation

  • Planning

  • Execution

  • Printing

Erklärung

Frage 185 von 200

1

what the benefits CRM systems provide had?

Wähle eine der folgenden:

  • Efficient, personalized marketing, sales, and service

  • A 360° view of each customer

  • The ability of sales and service employees to access a complete history of customer interaction with the organization, regardless of the touch point

  • All of above

Erklärung

Frage 186 von 200

1

which one is the triple constraints of project management

Wähle eine der folgenden:

  • scope

  • time

  • cost

  • All of these answers are correct.

Erklärung

Frage 187 von 200

1

what are the risks while using the Cloud Computing?

Wähle eine der folgenden:

  • battery

  • privacy and security

  • criminal use of cloud computing

  • both B and C

Erklärung

Frage 188 von 200

1

According to the textbook, which of the followings is one of the knowledge areas of Project Management Body of Knowledge (PMBOK)?

Wähle eine der folgenden:

  • Project Integration Management

  • Project Scope Management

  • Project Time Management

  • All of the above

Erklärung

Frage 189 von 200

1

Which of the following is NOT an example of one of the triple constraints of project management?

Wähle eine der folgenden:

  • Time

  • Cost

  • Scope

  • Innovation

Erklärung

Frage 190 von 200

1

Which of the following is NOT a factor of triple constraints of project management?

Wähle eine der folgenden:

  • time

  • cost

  • scope

  • activity

Erklärung

Frage 191 von 200

1

What is Electronic Surveillance?

Wähle eine der folgenden:

  • The principles of right and wrong

  • Using software to block inappropriate websites

  • responsibility, accountability, liability

  • tracking people's activity with the aid of computers

Erklärung

Frage 192 von 200

1

What type of functional area information systems (FAISs) is??

Wähle eine der folgenden:

  • Accounting

  • Marketing

  • Human resource

  • All of above

Erklärung

Frage 193 von 200

1

Which one of the following is considered a sign to look for if you believe your computer is affected with malicious software or malware?

Wähle eine der folgenden:

  • your computer shuts down unexpectedly by itself

  • programs take longer to load than normal

  • your computer does not start normally

  • all of the above

Erklärung

Frage 194 von 200

1

Which one is the antispam software?

Wähle eine der folgenden:

  • SpamKiller

  • SpamGourmet

  • SpamAssassin

  • All of the above

Erklärung

Frage 195 von 200

1

A Trojan Horse is associated with all of the following except...

Wähle eine der folgenden:

  • Phishing attack

  • Robot

  • Zombie

  • Romans

Erklärung

Frage 196 von 200

1

What actions to take to protect your information assets?

Wähle eine der folgenden:

  • Background

  • Activity

  • Deliverable

  • All of the above

Erklärung

Frage 197 von 200

1

Which of the various computer-based actions can you take to protect your information assets?

Wähle eine der folgenden:

  • Run free malware scans on your computer.

  • Have a firewall on your computer

  • Never download any files or software over the internet from websites that you do not know

  • All of the above

Erklärung

Frage 198 von 200

1

When you discard mail or old records, you should use a

Wähle eine der folgenden:

  • Single-cut shredder

  • Cross-cut shredder

  • Confetti shredder

  • B and C are both proper methods

Erklärung

Frage 199 von 200

1

Which of the following is not a sign that your computer is infected?

Wähle eine der folgenden:

  • Programs take longer to load than usual.

  • Your email sends messages to all contacts in your address book on its own.

  • Your system continually runs out of main memory.

  • You can download files as usual.

Erklärung

Frage 200 von 200

1

IT is helpful in:

Wähle eine der folgenden:

  • Performing specific tasks on a computer

  • Allowing users to gain access to programs

  • Making more efficient use of a computer

  • All of the above

Erklärung