Reading Exam Questions

Beschreibung

Quiz am Reading Exam Questions, erstellt von Mikaela Fenton am 16/05/2018.
Mikaela Fenton
Quiz von Mikaela Fenton, aktualisiert more than 1 year ago
Mikaela Fenton
Erstellt von Mikaela Fenton vor fast 6 Jahre
24
1

Zusammenfassung der Ressource

Frage 1

Frage
What is data governance?
Antworten
  • an approach to managing information across an entire organization
  • a process that spans all organizational business processes and applications
  • a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems
  • generated and captured by operational systems, describe the business’s activities, or transactions.

Frage 2

Frage
Five major parts of database
Antworten
  • Hardware, software, people, procedures, data
  • Hardware, software, Database, CPU
  • Keyboard, monitor, CPU, Physical component, computer
  • Hardware, Procedures, standards, CPU,UPS

Frage 3

Frage
Which of the following include all major parts of a database system?
Antworten
  • Hardware, Software, People, Procedures, Data
  • Hardware and Software
  • People
  • None of above

Frage 4

Frage
what is the 'initial public offering' stands for?
Antworten
  • IPO
  • ICO
  • ITO
  • IMO

Frage 5

Frage
What is a bit?
Antworten
  • The smallest unit of data a computer can process
  • A group of eight bits
  • CRM
  • A logical grouping of characters into a word, a small group of words, or an identification number

Frage 6

Frage
Data governance is an approach to managing information across ________ ?
Antworten
  • An entire organization
  • None of an organization
  • multiple organizations
  • The whole world

Frage 7

Frage
When is data managed most efficiently?
Antworten
  • When it is stored in a database.
  • When it is most accurate.
  • When the data is true.
  • When the data is in its rawest form.

Frage 8

Frage
What is the difference between Master Data and Transaction Data?
Antworten
  • Master data are applied to multiple transactions and are used to categorize, aggregate, and evaluate the transaction data.
  • Transaction data are a set of core data, such as customer, product, employee, vendor, geo- graphic location, and so on, that span the enterprise information systems.
  • Transaction data is a process that spans all organizational business processes and applications.
  • Master data is an approach to managing information across an entire organization.

Frage 9

Frage
How does the planning process for IT applications begin?
Antworten
  • Through organizational strategic planning
  • when it gets approved by manager
  • Never
  • It doesn't have a beginning

Frage 10

Frage
What is normalization of data?
Antworten
  • A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.
  • A method for expanding a database to contain all information related to a certain topic and get the most general view of the information
  • A method that ignores data integrity to optimal processing performance to reduce redundancy within the data set
  • A method of creating a dataset with very little data to get a very general view of the topic at hand

Frage 11

Frage
What is the point of relationships in databases?
Antworten
  • Relationships illustrate an association between entities.
  • Relationships draw connections between the database and real life.
  • Relationships convert computer-readable binary code to a language humans can understand.
  • Relationships ensure that the link between the computer software and hardware remains functional as you use the database.

Frage 12

Frage
What are the two main types of queries commonly used in database operations?
Antworten
  • Structured query language (SQL) and Query by example (QBE)
  • Query inquiry prototype (QIP) and Databased Query Investment (DQI)
  • Query by knowledge (QBN) and Query by theory (QBT)
  • Query through investigation (QTI) or Query by example (QBE)

Frage 13

Frage
Relationships illustrate an association between _____
Antworten
  • Entities
  • Procedures
  • Policies
  • Principles

Frage 14

Frage
What is a binary relationship in database?
Antworten
  • A relationship that exists when two entities are associated.
  • A relationship that exists when no entities are associated.
  • A relationship that exists when three entities are associated.
  • A relationship that exists when four entities are associated.

Frage 15

Frage
What is a binary relationship?
Antworten
  • a relationship between two entities
  • a relationship between ten entities
  • no relationship exists
  • twitter

Frage 16

Frage
What is the uniquely identified field of a database called?
Antworten
  • Primary key
  • Secondary key
  • Foreign key
  • Database key

Frage 17

Frage
What is normalization and its purpose?
Antworten
  • A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance
  • A means of expressing that the value of one particular attribute is associated with a specific single value of another attribute
  • To make the data look normal
  • Only God knows

Frage 18

Frage
What is a structured query language?
Antworten
  • a computer code that allows you to ask questions of a database
  • a schedule builder
  • an online library
  • a computer coding information table

Frage 19

Frage
What is structured query language?
Antworten
  • a computer code that allows you to ask questions of a database
  • a binary computer code
  • a library
  • a schedule builder

Frage 20

Frage
What is an Entity-Relationship Diagram?
Antworten
  • Document that shows data entities and attributes and relationships among them
  • A relationship that exists when three entities are associated
  • A relationship that exists when an association is maintained within a single entity
  • The process of designing a database by organizing data entities to be used and identifying the relationships among them

Frage 21

Frage
What does "SQL" stand for?
Antworten
  • Structured query language
  • Super query language
  • Safe query language
  • Second query language

Frage 22

Frage
What is an example of a "simple vs. composite" attribute?
Antworten
  • Address
  • Name
  • Customer Number
  • Gender

Frage 23

Frage
Which is not a degree of relationship?
Antworten
  • Unitary relationship
  • Unary relationship
  • Binary relationship
  • Ternary relationship

Frage 24

Frage
What is a 1:1. relationship?
Antworten
  • a single-entity instance of one type is related to a single-entity instance of another type.
  • properties that describe the entity’s characteristics.
  • a person, place, or thing that can be identified in the users’ work environment.
  • attributes that are unique to that entity instance.

Frage 25

Frage
Which of the following commands doesn't affect the text font?
Antworten
  • Borders
  • Underline
  • Bold
  • Italics

Frage 26

Frage
What are the 3 advantages of a wireless device?
Antworten
  • They are portable and productive.
  • The production of the device is minimal.
  • They can't communicate with other devices.
  • They are cheap.

Frage 27

Frage
do you like this class
Antworten
  • like
  • dislike
  • you better pick a
  • do not pick b

Frage 28

Frage
What is an example of a "one-to-many" relationship?
Antworten
  • A professor in a university teaching a certain amount of students
  • Students lecturing other students
  • A private tutor teaching a student calculus
  • Many professors in a university teaching a certain amount of students

Frage 29

Frage
When you open PowerPoint and click Blank Presentation, you go directly to:
Antworten
  • Your first slide
  • Themes
  • Layout
  • Backstage view

Frage 30

Frage
What is piracy?
Antworten
  • Copying a software program (other than freeware, demo software, etc.) without making payment to the owner
  • Defense mechanisms
  • Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud
  • Crime in which someone uses the personal informa- tion of others to create a false identity and then uses it for some fraud

Frage 31

Frage
What is exposure in regards to information security?
Antworten
  • the harm, loss, or damage that can result if a threat compromises the information resource.
  • any danger to which a system may be exposed
  • the possibility that the system will be harmed by a threat
  • the degree of protection against criminal activity, danger, damage, and/or loss

Frage 32

Frage
What is one common cause of information breaches
Antworten
  • Employee negligence
  • data redundancy
  • The russians
  • Government Interference

Frage 33

Frage
Which of the following is a example of a unintentional threat to information systems?
Antworten
  • Careless Internet Surfing
  • Espionage or trespass
  • Information Extortion
  • Software Attacks

Frage 34

Frage
What is the differences of a trusted network and an untrusted network?
Antworten
  • A trusted network, in general, is any network within your organization. An untrusted network, in general, is any network external to your organization.
  • A trusted network, in general, is any network external to your organization. An untrusted network, in general, is any network within your organization.
  • Both are any network that within your organization.
  • None of the above.

Frage 35

Frage
what can be defined as the degree of protection against criminal activity, danger, dam- age, and/or loss?
Antworten
  • security
  • computer
  • desk
  • phone

Frage 36

Frage
Security is important to...
Antworten
  • small businesses
  • giant businesses
  • tiny businesses
  • weak businesses

Frage 37

Frage
What is social engineering?
Antworten
  • An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords
  • When an unauthorized individual attempts to gain illegal access to organizational information
  • When an attacker either threatens to steal, or actually steals, information from a company
  • Deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith

Frage 38

Frage
What does a transaction processing system generate?
Antworten
  • Data
  • Photos
  • Excel
  • Microsoft

Frage 39

Frage
What is Cybercrime?
Antworten
  • illegal activities conducted over computer networks, particularly the Internet.
  • The first video ever created.
  • Anti-virus Software.
  • Theft of computers.

Frage 40

Frage
What does CRM stand for?
Antworten
  • Customer Relationship Management
  • Classical Relationship Management
  • Clinical Rotational Mission
  • Customer Rotational Mission

Frage 41

Frage
What is a transaction?
Antworten
  • any business event that generates data worthy of being captured and stored in a database
  • a non-business event
  • a collection of random data
  • anything that is done in a business

Frage 42

Frage
What is a domain name?
Antworten
  • The name assigned to an internet site, consisting of multiple parts, separated by dots, which are translated from right to left
  • The name you give your computer
  • A company that gives you a fancy website name
  • The store you purchase computers from

Frage 43

Frage
Which of the following is true of Sales Force Automation (SFA)?
Antworten
  • It automatically records all of the components of a sales transaction process
  • It includes a contact management system that that automatically sends emails to customers
  • It will duplicate contacts for you
  • It has a sales lead tracking system that tracks how many sales you have made

Frage 44

Frage
What is project scope management?
Antworten
  • Defines the processes that limit and control the work in a project.
  • Is a Turkey.
  • the proper sequencing of data.
  • Resource management and estimating.

Frage 45

Frage
Which of the following explains On-Demand CRM?
Antworten
  • It's hosted by an external vendor in the vendor’s data center.
  • It's a interactive system where communications related to sales, marketing, and customer service activities are conducted through a mobile medium for the purpose of building and maintaining customer relationships between an organization and its customers
  • It help a company manage the important parts of its business in an integrated fashion
  • It's a system which source code is available to developers and users

Frage 46

Frage
What is Project Management Body of Knowledge (PMBOK)
Antworten
  • collection of processes and knowledge areas
  • collection of files
  • collection of scripts
  • collection of music videos

Frage 47

Frage
What are the five processes of project management?
Antworten
  • Initiating,Planning,Executing,Monitoring and Controlling,Closing
  • Planning,Initiating,Executing,Monitoring and Controlling,Closing
  • Monitoring and Controlling,Closing,Planning,Initiating,Executing
  • Planning,Initiating,Monitoring and Controlling,Executing,Closing

Frage 48

Frage
what is the project management body of knowledge?
Antworten
  • collections of processes and knowledge areas generally accepted as the best practice within the project management discipline
  • provides fundamentals of project management
  • no funding =bad idea
  • all of the above

Frage 49

Frage
What does a project management information system do?
Antworten
  • A project management information system (PMIS) can provide a framework to help guide the progress of IT projects.
  • used to create professional-looking slideshows that can be displayed on projectors or big-screen TVs
  • create themes, pictures, comic strips, calendar flashcards.
  • none of the above

Frage 50

Frage
CRM
Antworten
  • is a customer-focused and customer-driven organizational strategy.
  • is a business strategy with transparency
  • is a modern management that communicates with consumers
  • is a business model that consumers satisfied with the products' quality

Frage 51

Frage
In reference to product management, what does "time" refer to?
Antworten
  • the window of opportunity in which a project must be completed to provide a benefit to the organization.
  • actual amount of resources, including cash and labor, that an organization can commit to completing a project.
  • processes that ensure that the project includes all the work required—and only the work required—to complete the project successfully.
  • money

Frage 52

Frage
What does Scope Creep refer to?
Antworten
  • Uncontrolled changes in a project’s scope when the scope of a project is not properly defined, documented, or controlled
  • Changes to the initiation of project
  • The monitoring or controlling part of the project management process
  • A creepy scope

Frage 53

Frage
What are the five distinct phases of the traditional approach to project management?
Antworten
  • Initiation, planning, execution, monitoring and control, and completion.
  • Monitoring, comparing, identifying, documenting, executing
  • Focusing, mastering, building, excelling, establishing
  • None of the above.

Frage 54

Frage
What are the five basic process groups of the PMBOK?
Antworten
  • Initiation, planning, execution, monitoring and control, completion
  • Planning, coding, execution, completion, innitiation
  • Coding, marketing, initiation, monitoring, completion
  • Promoting, selling, monitoring, dealing, planning

Frage 55

Frage
Which of the four is NOT a way of enabling project management success?
Antworten
  • Forcing members of a group to execute a project that they are not comfortable with
  • Focusing on managing strategy and stakeholders instead of exclusively concentrating on budgeting and scheduling
  • Building effective teams by aligning their incentives with the overall goals of projects
  • Mastering technology and project content by securing critical internal and external talent

Frage 56

Frage
The _________ is a collection of processes and knowledge areas generally accepted as best practice within the project management discipline.
Antworten
  • Project Management Body of Knowledge
  • Computer
  • Motherboard
  • The mouse

Frage 57

Frage
What refers to a real-time, wireless connection between a mobile device and other computing environments?
Antworten
  • Mobile computing
  • Mobile commerce
  • Pervasive computing
  • Ubiquitous computing

Frage 58

Frage
Surfing the web anonymously has which negative side effect?
Antworten
  • Web surfing is slower compared to normal surfing
  • You can't purchase items online
  • You can only surf 1 webpage per day
  • No side effects

Frage 59

Frage
What happens to the private information stored in the typical smartphone?
Antworten
  • It is auctioned to advertisers by applications automatically
  • It is secure on your device as long as you are not hacked
  • You may opt in or out of sending private information for a more personalized experience
  • It is secure from hackers on a private server

Frage 60

Frage
_____________ is a thin, flat device using polarized light from a light source and liquid crystals to illuminate colored pixels.
Antworten
  • LCD
  • ABC
  • YMCA
  • XYZ

Frage 61

Frage
What is a good way to keep privacy?
Antworten
  • Not save passwords
  • Save all passwords
  • Share your information with friends
  • Not have a passcode to enter the computer

Frage 62

Frage
What is a proxy server?
Antworten
  • It is a computer to which you connect, which in turn connects to the Web site you wish to visit.
  • It hacks into computers
  • It is a data base
  • none of the above

Frage 63

Frage
You should never post personal information about yourself or your family on any type of social networking sites
Antworten
  • TRUE
  • FALSE

Frage 64

Frage
What supports the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data?
Antworten
  • Transaction processing system (TPS)
  • FAIS
  • Organization Database
  • Expert System

Frage 65

Frage
Define TPS
Antworten
  • to monitor, store, collect, and process data generated from all business transactions
  • To create profit for business
  • Allows for easier tasks within workforce
  • Helps with customer satisfaction

Frage 66

Frage
What is Master Data?
Antworten
  • A Set of Core Data
  • Data about data
  • data about computers
  • data from your Operating System

Frage 67

Frage
Data Warehouse refers to what?
Antworten
  • A multi-dimensional database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.
  • A relational or multi-dimensional database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.
  • A simple database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.
  • A linearized database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

Frage 68

Frage
What is a plugin
Antworten
  • bundle that helps an application function
  • applications
  • excel charts
  • microsoft office suit

Frage 69

Frage
What are Comparative Reports?
Antworten
  • Reports that compare performances of different business units or times
  • Reports that show a greater level of detail than is included in routine reports.
  • Reports that include only information that exceeds certain threshold standards.
  • None of the above

Frage 70

Frage
what is IT planning?
Antworten
  • organizational strategic plan
  • Tech support
  • Program that organizes
  • all of the above

Frage 71

Frage
what is CRM short for?
Antworten
  • Customer Relationship Management
  • Customer Relationship Manual
  • Customer Relationship Machinery
  • none of them above

Frage 72

Frage
What does CRM stand for?
Antworten
  • Customer Relationship Management
  • Customer Rotational Mission
  • Classical Relationship Management
  • Clinical Rotational Mission

Frage 73

Frage
The practice of marketing additional related products to customers based on a previous purchase is:
Antworten
  • cross-selling
  • upselling
  • bundling
  • none of above

Frage 74

Frage
What is the advantages of on-demand CRM systems?
Antworten
  • Lower costs and a need for employees to know only how to access and utilize the software.
  • Easy to enter.
  • Possibly unreliable vendors.
  • Difficulty in modifying the software.

Frage 75

Frage
What does CRM stand for?
Antworten
  • Customer Relationship Management
  • Courtesy Reply Mail
  • Cause Related Marketing
  • Charge Residue Model

Frage 76

Frage
The drawbacks of on-demand CRM system are all of the following EXCEPT
Antworten
  • lower costs
  • possible reliable vendors
  • difficult to modify software
  • difficult to modify softwar

Frage 77

Frage
What is a database?
Antworten
  • Database is a computer programming
  • Database is a storage of message
  • It is a video game!
  • Database used to connect programs, which is really cool.

Frage 78

Frage
What problems do databases NOT minimize?
Antworten
  • Data redundancy
  • Data repetition
  • Data isolation
  • Data inconsistency

Frage 79

Frage
Organizations store data in what?
Antworten
  • Safe Vaults
  • Databases
  • Guarded facilities
  • Software

Frage 80

Frage
The most popular language used to interact with a database is...
Antworten
  • Standard Query Example (SQE)
  • Structured Query Language (SQL)
  • Query by Example (QBE)
  • Query Lookup Tool (QLT)

Frage 81

Frage
When data are normalized, attributes in each table depend on the _______.
Antworten
  • joint operation
  • primary key
  • structured query language
  • database

Frage 82

Frage
What is an ethernet?
Antworten
  • A keyboard
  • A common LAN protocol
  • A modem
  • A common WAN protocol

Frage 83

Frage
What does SQL stand for?
Antworten
  • Standard Query Language
  • Structured Query Language
  • Structured Quote Literacy
  • Standard Query Literacy

Frage 84

Frage
What is a relationship in the context of this class?
Antworten
  • Something I will never have
  • An association between entities
  • A description of policies, principles, and procedures
  • A query language for interacting with a database

Frage 85

Frage
What does SLQ stand for?
Antworten
  • Software query language
  • Structured query language
  • Structure query learning
  • Software query learning

Frage 86

Frage
Whats is a data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.
Antworten
  • explicit knowledge model
  • relational database model
  • entity-relationship modeling
  • multidimensional structure model

Frage 87

Frage
What does the threat of a trespass entail?
Antworten
  • Occurs when an attacker threatens to steal or steals information from a company
  • Occurs when an unauthorized individual attempts to gain illegal access to organizational information
  • Occurs when a deliberate act that involves defacing an organization's website is made
  • When a device is stolen/used by an attacker

Frage 88

Frage
What is Identity Theft?
Antworten
  • deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith
  • the deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime.
  • stealing computing devices and storage devices
  • used malicious software to infect as many computers worldwide as possible, to the profit- driven, Web-based attacks of today.

Frage 89

Frage
What is a trusted network?
Antworten
  • any network you know the password.
  • any network within your organization.
  • any network external to your organization.
  • all of above are incorrect.

Frage 90

Frage
What is NOT a common deliberate threat to information systems?
Antworten
  • Espionage or trespass
  • Alien invasion
  • Information extortion, identity thefts, and sabotage
  • All of the above are common threats to information systems

Frage 91

Frage
Which of the following is not an example of a deliberate threat to information systems?
Antworten
  • Cyberterrorism
  • Social engineering
  • Espionage
  • Alien software

Frage 92

Frage
What is Scope Creep?
Antworten
  • Increasing the scope of a project without asking first
  • Uncontrolled changes in a projects scope
  • When you don't know the scope of the project
  • When Listerine isn't on sale you have to buy a different brand

Frage 93

Frage
What is one of the most well known centers for customer interaction?
Antworten
  • Customer Services
  • Call Center
  • the mall food court
  • HR

Frage 94

Frage
Which is the first phase in project management?
Antworten
  • Planning
  • Initiation
  • Execution
  • Monitoring and Control

Frage 95

Frage
Which of these is considered "project execution?"
Antworten
  • Defining the problem that the project is intended to solve and the goals that it is to achieve.
  • The work defined in the project management plan is performed to accomplish the project’s requirements.
  • To identify and sequence every project objective and activity associated with that objective.
  • Uncontrolled changes in a project’s scope.

Frage 96

Frage
Which of the following is NOT part of the process for developing an application?
Antworten
  • Clearly defining what the program is to do.
  • Make the app able to store 1 terabyte of data
  • Visualizing the application running on the computer and designing its user interface
  • Defining values for each control's relevant properties

Frage 97

Frage
Choose the best definition for Adware
Antworten
  • Something that you can commonly find de-installation procedures
  • A term applied to programs that either launch advertisements/ re-direct search results to promotional web sites
  • Advertisements you receive via mail
  • None of the above

Frage 98

Frage
What is NOT an example of a short-range wireless network?
Antworten
  • Bluetooth
  • Wi-Fi
  • Ultra-Wideband
  • Near-Field Communications

Frage 99

Frage
Which of the following is NOT an advantage of a wireless device?
Antworten
  • Small enough to carry
  • Copy and pass confidential information easily
  • Provide sufficient computing power to preform productive tasks
  • Can communicate wirelessly with the internet and other devices

Frage 100

Frage
Which command CANNOT be used to do diagnostics?
Antworten
  • qqnorm
  • BFtest
  • shapiro.test
  • leveneTest

Frage 101

Frage
What is Windows Defender?
Antworten
  • Minesweeper
  • Free Antivirus program already installed on windows computers
  • Paid Antivirus program that is specific to Linux
  • Successor to Clippy. Helps write resumes.

Frage 102

Frage
Which is not the way to close the application in mac?
Antworten
  • Use the mouse to click
  • Command+q
  • Command+m
  • Command+c

Frage 103

Frage
What are the key functions of a TPS (Transaction Processing System)?
Antworten
  • Input functions, output functions, storage functions
  • Input functions, Processing the functions, Output functions, Storage functions
  • Processing the functions, storage functions
  • Processing the functions, output functions, storage functions

Frage 104

Frage
Which is not a goal of Customer relationship management?
Antworten
  • Improving business relationships with customers
  • Get customer’s personal information
  • Assisting in customer retention
  • Driving sales growth

Frage 105

Frage
Data Redundancy is defined as
Antworten
  • Various copies of the data do not agree
  • Applications and data are independent of one another
  • The same data are stored in multiple locations
  • None of the above

Frage 106

Frage
What is a primary key?
Antworten
  • a password that gives the user access to all applications in an application suite
  • a type of Macro
  • a field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated and sorted
  • a piece of hardware needed to help laptops run smoothly

Frage 107

Frage
What is NOT a difficulty involved in managing data?
Antworten
  • Data accumulates over time
  • Data is scattered throughout organizations
  • Data is difficult to understand
  • Data is obtained from multiple sources

Frage 108

Frage
When a company examines its needs and performance, it generates a prioritized list of both existing and potential IT applications. This is called?
Antworten
  • IT strategic plan
  • application portfolio
  • organizational strategic plan
  • none of the above

Frage 109

Frage
A data warehouse:
Antworten
  • has data located at a single site.
  • supports a company's day to day operations.
  • stores data used for tactical or strategic decisions.
  • has data distributed across several different sties.

Frage 110

Frage
What does SQL stand for?
Antworten
  • Standard Quarter Language
  • Standard Query Langauge
  • Structured Query Language
  • Structured Question Language

Frage 111

Frage
A database can store:
Antworten
  • Metadata
  • End-user data
  • Both A and B
  • Neither A or B

Frage 112

Frage
What is an example of a primary key?
Antworten
  • First name
  • Date of birth
  • Student ID
  • Town of residence

Frage 113

Frage
Which of the following is incorrect regarding SQL?
Antworten
  • SQL is the most popular database query language
  • SQL uses keywords and statements to perform searches
  • SQL is simpler to use than QBE
  • SQL stands for Structured Query Language

Frage 114

Frage
What is a binary relationship?
Antworten
  • A binary relationship illustrate an association between entities.
  • A binary relationship exists when an association is maintained within a single entity.
  • A binary relationship exists when two entities are associated.
  • A binary relationship exists when three entities are associated.

Frage 115

Frage
What should be used to request information out of data?
Antworten
  • Google
  • Ctrl F
  • Query
  • Help function in program

Frage 116

Frage
Designers plan and create databases through the process of...
Antworten
  • entity–relationship modeling
  • using an entity–relationship diagram
  • both A & B
  • none of the above

Frage 117

Frage
Which of the following answer are not supported by transaction processing system(TPS)?
Antworten
  • monitoring
  • collection
  • drive
  • storage

Frage 118

Frage
Which one is not included in risk management?
Antworten
  • Process of identifying risk
  • Assessing its relative magnitude
  • Wait for the risk to lessen
  • Taking steps to reduce it to an acceptable level

Frage 119

Frage
Which statement about quality control systems is FALSE?
Antworten
  • They can be stored for future analysis
  • They can be interpreted in real time
  • They assess the speed of computers
  • They provide information about incoming material and parts

Frage 120

Frage
Which is not an example of financial transaction management?
Antworten
  • Global stock exchange
  • Managing multiple currencies
  • Auditing
  • Expense management automation

Frage 121

Frage
Which is NOT a basic method of computer security in hardware and software?
Antworten
  • Antivirus
  • Firewall
  • Windows Updates
  • Router Restrictions

Frage 122

Frage
What is the type of system security malware that allows for access to computer, program, or unauthorized service called?
Antworten
  • Frontdoor
  • Sidedoor
  • Backdoor
  • Closed doors

Frage 123

Frage
Which one is an example of an input device?
Antworten
  • monitor
  • printer
  • keyboard
  • projector

Frage 124

Frage
Why is CRM so important to any organization?
Antworten
  • Helps org perform appropriate analysis to see who their customers are and what their wants or needs are.
  • Better assist those wants or needs. More revenue and profits
  • A and B
  • None of above

Frage 125

Frage
Which one of the consumer touch points must an organization CRM system manage?
Antworten
  • Telephone Contact
  • Direct Mailing
  • E-mail
  • Physical contact

Frage 126

Frage
List the phases of the project management process in order.
Antworten
  • Planning, Execution, Monitoring and Control, Completion, Initiation
  • Planning, Initiation, Execution, Monitoring and Control, Completion
  • Initiation, Planning, Execution, Monitoring and Control, Completion
  • Initiation, Execution, Monitoring and Control, Planning, Completion

Frage 127

Frage
What are the three constraints of project management?
Antworten
  • Time, effort, and style
  • Time, cost, and availability
  • Time, cost, and scope
  • Time, supervisors, and budget

Frage 128

Frage
Which of the following is NOT a well known anti-malware product?
Antworten
  • Norton Anti-Malware
  • PC-cillin
  • McAspirin
  • VirusScan

Frage 129

Frage
Which of the following is a sign that your computer is infected?
Antworten
  • Programs run smoothly
  • your computer runs out of memory due to the fact that you have been using it for 10 years
  • a random picture of a unicorn pops up on your screen that makes you smile
  • your computer shuts down when you hit the power button

Frage 130

Frage
Every time you access the internet or use your computer what do you risk?
Antworten
  • Professional information
  • Personal information
  • Both A and B
  • None of the above

Frage 131

Frage
Which is NOT a type of action to protect your information assets?
Antworten
  • Behavioral actions
  • Computer-based actions
  • Software based actions
  • All of these are types of actions to protect information assets

Frage 132

Frage
What is a trojan horse?
Antworten
  • a beneficial program that scans for viruses
  • a fake website intended to steal sensitive user information
  • a malicious program disguised as legitimate software
  • an application that secures sensitive user information

Frage 133

Frage
Acquiring IT applications from outside contractors or external organizations is called
Antworten
  • external reach
  • external plug in
  • outsourcing
  • external sourcing

Frage 134

Frage
What is SSID stand for?
Antworten
  • Social Security Identification
  • Secure Sources Internet driver
  • Service set identifier
  • None of the above

Frage 135

Frage
What does "GUI" stand for?
Antworten
  • Graphical Understanding Internet
  • Graphing Under Ignes
  • Graphical User Interface
  • Graphing User Internet

Frage 136

Frage
Which of the following is not one of the six keys to getting the most from your connectivity?
Antworten
  • Collaborative Workgroups
  • Online Reference
  • Web Surfing
  • Training

Frage 137

Frage
What is the purpose of functional systems?
Antworten
  • To relieve workers of of tedious, repetitive tasks
  • To integrate the activities in an entire business process for efficiency
  • To facilitate the work and generate information for a single department or function
  • To simplify a program by categorizing everything into different steps

Frage 138

Frage
What is Microsoft Access most useful for?
Antworten
  • Making spreadsheets for information
  • Typing word documents
  • Store Information for reference
  • Search the internet

Frage 139

Frage
which one is correct?
Antworten
  • Customer relationship management (CRM) is not important solely for large enterprises.
  • CRM and CRM systems are critical to the success of modern businesses.
  • All of above.
  • None of above.

Frage 140

Frage
When do customers provide feedback?
Antworten
  • When service is really good
  • When service is really bad
  • When service is really good or really bad
  • Never

Frage 141

Frage
Which of the following is not taken into consideration when acquiring a new IT application?
Antworten
  • How much code does the company want to write.
  • Where will the application run?
  • Where will the application originate?
  • When will it be completed?

Frage 142

Frage
What problems do database systems minimize?
Antworten
  • data redundancy
  • data isolation
  • data inconsistency
  • all of the above

Frage 143

Frage
A byte can be which of the following?
Antworten
  • A letter
  • A number
  • A symbol
  • All of the above

Frage 144

Frage
Which of the following is not a characteristic of master data?
Antworten
  • used to categorize
  • used to aggregate
  • evaluate the transaction data
  • copy codes

Frage 145

Frage
If all IT applications require data, what are characteristics of the data?
Antworten
  • High quality
  • High quality accurate and consistent
  • timely and relevant
  • all of the above

Frage 146

Frage
What does IT stand for?
Antworten
  • Insane Tech
  • Information Team
  • Inspiring Technicians
  • None of the answers provided are correct.

Frage 147

Frage
Which is a problem that database systems minimize?
Antworten
  • Data Redundancy
  • Data Isolation
  • Data Inconsistency
  • All of the Above

Frage 148

Frage
Who are the users of the database system?
Antworten
  • System and database administrators
  • End users
  • Database designers
  • All of the above

Frage 149

Frage
Which is not the limitation of file system data management?
Antworten
  • Requires extensive programming
  • System administration is complex and difficult
  • Changing existing structures is difficult
  • All of them are limitations of file system data management.

Frage 150

Frage
Why should we use open source software in business?
Antworten
  • Flexibility
  • Cost Efficiency
  • Security
  • All of the above

Frage 151

Frage
Techniques for illegally obtaining personal information include
Antworten
  • Stealing mail or dumpster diving
  • Stealing personal information in computer databases
  • Impersonating a trusted organization in an electronic communication
  • All above

Frage 152

Frage
database system minimize which following is not problems
Antworten
  • data redundancy
  • data isolation
  • data security
  • non of above

Frage 153

Frage
What are the difficulties of managing data
Antworten
  • The amount of data increases greatly as time goes by
  • data are scattered throughout organizations
  • Data are collected by many individuals using various methods and devices
  • all the above

Frage 154

Frage
Which of the following is not a binary relationship?
Antworten
  • one-to-one relationship
  • one-to-many relationship
  • many-to-many relationship
  • Open relationship

Frage 155

Frage
Which of the following statement(s) is true?
Antworten
  • Business problems span multiple functional areas.
  • There is no uniform strategy for conducting a cost-benefit analysis.
  • Computers are irrelevant in society today.
  • A and B

Frage 156

Frage
Which of the following are problems with Non-ERP Systems?
Antworten
  • Long term maintenance costs are expensive
  • Ability to engage in process re-engineering is limited
  • Strategic decision making is not supported
  • All of the above

Frage 157

Frage
Which one of the following is a basic skill to create and run a slide show?
Antworten
  • Using Various design views
  • Using different slides layout
  • Running a slide show and adding, sizing and moving text, Cliparts and graphics
  • All of the above

Frage 158

Frage
Which element is not apart of the table of contents in PowerPoint?
Antworten
  • Before you start
  • Building Blocks
  • Slide design'
  • Query

Frage 159

Frage
What describes WLAN?
Antworten
  • It is same as the standard local network
  • Devices will not connected by wires
  • Increase productivity
  • All of the above

Frage 160

Frage
Which is not a purpose of normalization?
Antworten
  • Ensure minimum redundancy
  • Keep maximum data integrity
  • Allow for optimal processing performance
  • Form query relationships

Frage 161

Frage
What is an ER Diagram?
Antworten
  • A emergency response device Diagram
  • An electrical router Diagram
  • A electrical rope Diagram
  • An Entity- Relation ship Diagram

Frage 162

Frage
What are applications of technological knowledge?
Antworten
  • home
  • business
  • work
  • all of the above

Frage 163

Frage
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure...
Antworten
  • minimum redundancy
  • maximum data integrity
  • optimal processing performance
  • all of the above

Frage 164

Frage
Step not used for the process of entity-relationship modeling
Antworten
  • Background
  • Activity
  • Deliverable
  • Model

Frage 165

Frage
The exposure of an information results in what to the resource?
Antworten
  • Harm
  • Loss
  • Damage
  • All of the above

Frage 166

Frage
These are some signs to look for if you think your computer is infected by malware:
Antworten
  • Your computer shuts down unexpectedly by itself
  • Your computer does not start normally
  • Your computer runs out of RAM
  • All the above

Frage 167

Frage
Why shouldn't we use animations?
Antworten
  • You can't use animation in a powerpoint
  • Animations can harm your computer
  • Animation is not a important thing
  • Because PC and mouse are far from you while you are doing presentation so there is no point

Frage 168

Frage
Identify the answer that is a deliberate threat to information system.
Antworten
  • Sabatoge or Vandalism
  • Identity theft
  • Software attacks
  • All of the above

Frage 169

Frage
All of the following except what are functions of transaction processing system?
Antworten
  • Monitoring
  • Processing
  • Storage
  • Analyzing

Frage 170

Frage
which of following system is not a example of information system?
Antworten
  • Inventory Management
  • Quality Control
  • product life cycle Management
  • Human resource System

Frage 171

Frage
What are some types of deliberate threats to information system?
Antworten
  • Software attacks.
  • Cyberterrorism and Cyberwarfare.
  • Alien software.
  • All of the above.

Frage 172

Frage
Security can be defined as the degree of protection against:
Antworten
  • criminal activity
  • danger
  • Damage and/loss
  • all of the above

Frage 173

Frage
Which of the following are not types of reports discussed in the text?
Antworten
  • Routine reports
  • Ad hoc reports
  • Exception reports
  • Sale reports

Frage 174

Frage
When was the first U.S. cyberwar directive signed?
Antworten
  • 1930
  • 1965
  • 1985
  • 2012

Frage 175

Frage
What is Computer Virus?
Antworten
  • it is always attached to softwares
  • may or not may take bad actions on the computer
  • it can destroy files and folder in your computer
  • all of these above

Frage 176

Frage
How to secure your wireless network?
Antworten
  • Change the device password to something unique.
  • Turn SSID off.
  • Enable encryption such as WPA.
  • All of above

Frage 177

Frage
Which is included in Infectious Control?
Antworten
  • Disconnect from the internet both LAN & WAN
  • Update your antivirus
  • Check your antivirus software manufacturer’s website for specific procedures and software for particular viruses
  • All of above

Frage 178

Frage
What do phishing attacks enable thieves to do?
Antworten
  • Steal your identity
  • Steal your credit card numbers
  • Steal your passwords
  • All of the above.

Frage 179

Frage
What is the purpose of transaction processing system?
Antworten
  • Background
  • Activity
  • Deliverable
  • All of the Above

Frage 180

Frage
Which of the following is a type of software attack?
Antworten
  • Virus
  • Worm
  • Phishing attack
  • All of the Above

Frage 181

Frage
Relationships portray an association between entities. The degree of a relationship shows the number of entities associated with a relationship. Which of these is not considered a relationship?
Antworten
  • unary relationship
  • binary relationship
  • ternary relationship
  • All of these are considered relationships.

Frage 182

Frage
Which one is benefit of the Operational CRM system
Antworten
  • A 360° view of each customer
  • Efficient, personalized marketing, sales, and service
  • The ability of sales and service employees to access a complete history of customer interaction with the organization, regardless of the touch point
  • all above

Frage 183

Frage
Projects that are far over budget and past deadline resulting in abandonment are called?
Antworten
  • Bad Projects
  • Disasters
  • Efficiently planned projects
  • Runaway projects

Frage 184

Frage
Which of the following is NOT one of the five distinct phases of project management?
Antworten
  • Initiation
  • Planning
  • Execution
  • Printing

Frage 185

Frage
what the benefits CRM systems provide had?
Antworten
  • Efficient, personalized marketing, sales, and service
  • A 360° view of each customer
  • The ability of sales and service employees to access a complete history of customer interaction with the organization, regardless of the touch point
  • All of above

Frage 186

Frage
which one is the triple constraints of project management
Antworten
  • scope
  • time
  • cost
  • All of these answers are correct.

Frage 187

Frage
what are the risks while using the Cloud Computing?
Antworten
  • battery
  • privacy and security
  • criminal use of cloud computing
  • both B and C

Frage 188

Frage
According to the textbook, which of the followings is one of the knowledge areas of Project Management Body of Knowledge (PMBOK)?
Antworten
  • Project Integration Management
  • Project Scope Management
  • Project Time Management
  • All of the above

Frage 189

Frage
Which of the following is NOT an example of one of the triple constraints of project management?
Antworten
  • Time
  • Cost
  • Scope
  • Innovation

Frage 190

Frage
Which of the following is NOT a factor of triple constraints of project management?
Antworten
  • time
  • cost
  • scope
  • activity

Frage 191

Frage
What is Electronic Surveillance?
Antworten
  • The principles of right and wrong
  • Using software to block inappropriate websites
  • responsibility, accountability, liability
  • tracking people's activity with the aid of computers

Frage 192

Frage
What type of functional area information systems (FAISs) is??
Antworten
  • Accounting
  • Marketing
  • Human resource
  • All of above

Frage 193

Frage
Which one of the following is considered a sign to look for if you believe your computer is affected with malicious software or malware?
Antworten
  • your computer shuts down unexpectedly by itself
  • programs take longer to load than normal
  • your computer does not start normally
  • all of the above

Frage 194

Frage
Which one is the antispam software?
Antworten
  • SpamKiller
  • SpamGourmet
  • SpamAssassin
  • All of the above

Frage 195

Frage
A Trojan Horse is associated with all of the following except...
Antworten
  • Phishing attack
  • Robot
  • Zombie
  • Romans

Frage 196

Frage
What actions to take to protect your information assets?
Antworten
  • Background
  • Activity
  • Deliverable
  • All of the above

Frage 197

Frage
Which of the various computer-based actions can you take to protect your information assets?
Antworten
  • Run free malware scans on your computer.
  • Have a firewall on your computer
  • Never download any files or software over the internet from websites that you do not know
  • All of the above

Frage 198

Frage
When you discard mail or old records, you should use a
Antworten
  • Single-cut shredder
  • Cross-cut shredder
  • Confetti shredder
  • B and C are both proper methods

Frage 199

Frage
Which of the following is not a sign that your computer is infected?
Antworten
  • Programs take longer to load than usual.
  • Your email sends messages to all contacts in your address book on its own.
  • Your system continually runs out of main memory.
  • You can download files as usual.

Frage 200

Frage
IT is helpful in:
Antworten
  • Performing specific tasks on a computer
  • Allowing users to gain access to programs
  • Making more efficient use of a computer
  • All of the above
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Öffentliches Recht - Grundrecht
anna.grillborzer0656
10 Fragen aus der Abiturprüfung Geschichte
barbara91
Financial Accounting
zok42.com
Karteikarten Angewandte Sozialpsychologie
Sarah Rettätsfro
La mondialisation - Vocab
Gaelle Bourgeois
Buchführung
Sabrina Heckler
Säuren und Basen
Maxima Mehner
Vetie Radiologie Fragen VL 2013
Cedric-Bo Lüpkemann
HNO Patho
Sabine Gechter