Digital Systems Exam 02

¡Supera tus tareas y exámenes ahora con Quizwiz!

The main tools used by data analysts include which three of the following? A. spreadsheets B. punnett squares C. databases and query languages D. data visualization tools

A. spreadsheets C. databases and query languages D. data visualization tools

Which type of chart is commonly used to create pictographs? A. histogram B. scatterplot C. pie chart D. bar or line chart

D. bar or line chart

According to the National Institute of Standards and Technology (NIST) there are four cloud computing deployment models. Community cloud is a cloud deployment model where cloud infrastructure is provided to multiple business units within an organization. True or False.

False

Which of the following is true about geographic information systems (GIS)? More than one answer may be correct. A GIS uses a global positioning system (GPS) powered by at least 24 satellites. Combined with GPS, GIS is used to guide the transport of goods to different locations. Spatial data generated from GIS is used by organizations to make better decisions. GIS data is only available to users and organizations in the form of maps.

A GIS uses a global positioning system (GPS) powered by at least 24 satellites. Combined with GPS, GIS is used to guide the transport of goods to different locations. Spatial data generated from GIS is used by organizations to make better decisions.

From the following list, select the statement that correctly defines that type of network. A. A PAN connects devices around an individual. B. The Internet connects LANs, WANs, and other Internet networks together. C. An WAN connects a variety of devices at a single site, such as an office. D. A LAN connects a variety of devices between two or more geographic locations.

A. A PAN connects devices around an individual. B. The Internet connects LANs, WANs, and other Internet networks together.

When working in Tableau, users can assume which three roles? A. Creators B. Explorers C. Builders D. Viewers

A. Creators B. Explorers D. Viewers

What functionalities does Tableau provide for data analysis? multiple answers A. Data preparation and cleansing B. Real-time data entry C. What-if scenario analysis D. Automatic report writing

A. Data preparation and cleansing C. What-if scenario analysis

What is the second step in the process of sending a message via the Internet? A. Identify the correct domain name. B. Add the IP (Internet Protocol) address to the packet. C. Look up the IP address using the Domain Name System (DNS) D. Assemble the data packet.

A. Identify the correct domain name.

When discussing personally identifiable information (PII), which three of the following are usually anonymized? A. Names B. Phone numbers C. Social media activity D. Social Security numbers

A. Names B. Phone numbers D. Social Security numbers

A record is a ________ of related fields in a data file. A. collection B. highlighted area C. button D. characteristic

A. collection

A computer network must be connected to the Internet to support A. communicating via email with people on other networks. B. using digital video and audio applications for playback and editing. C. maximizing the combined storage space of the networked computers. D. using programs or software that are installed on a networked server.

A. communicating via email with people on other networks.

Knowledge Discovery in Data (KDD) is also known as ________ A. data mining B. data evaluation C. data algorithms D. data processing

A. data mining

What does the acronym NoSQL stand for? A. non-relational databases B. no-relational databases C. new-relational databases D. now-relational databases

A. non-relational databases

The purpose of information policies in a database is to indicate the ________ used in the design. A. rules B. data C. integrity D. relationship

A. rules

Trends in data analytics include which three of the following? A. scalable Ai B. virtual analytics C. composable data D. data analytics as a core business function

A. scalable Ai C. composable data D. data analytics as a core business function

The steps in the data project life cycle, according to Harvard University's Data Science Ready Project include which three of the following? A. sensing B. collection C. wrangling D. proposal

A. sensing B. collection C. wrangling

Key skills required of data analysts include which three of the following? A. technical writing skills B. experience with SQL and computer code C. in-depth knowledge of sociology D. oral communication skills

A. technical writing skills B. experience with SQL and computer code D. oral communication skills

The six-step process analysts use to create data-driven decision making includes which three of the following? A. Present B. Ask C. Analysis D. Prepare

B. Ask C. Analysis D. Prepare

What key outcome can IoT analytics achieve for businesses? A. Reduces the need for data storage B. Enhances consumer engagement through personalized experiences C. Eliminates the need for human data analysis D. Increases the cost of technology implementation

B. Enhances consumer engagement through personalized experiences

What does the asterisk (*) symbol represent in an SQL query? A. Indicates the end of a statement B. Selects all data that fits a criteria C. Denotes uniqueness D. Specifies a condition

B. Selects all data that fits a criteria

Data analysts are likely to have achieved what education level when beginning their career? A. high school diploma B. bachelor's degree C. associates degree D. doctorate

B. bachelor's degree

A hybrid data mart ________ data from a data warehouse as well as other data collection systems. It incorporates a top-down approach, end-user inputs, and enterprise-level integration. A. detracts B. integrates C. isolates D. extracts

B. integrates

What is a pictograph used for in data representation? A. displaying textual information B. using pictures to represent data C. using only numbers for data visualization D. creating complex mathematical models

B. using pictures to represent data

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to A. be given access to each other's workspaces and files, for micro-management. B. view, edit, and add shared information in real time, from anywhere. C. hold virtual meetings online via teleconferencing or video-conferencing features. D. complete their work using personal devices such as smartphones or tablets.

B. view, edit, and add shared information in real time, from anywhere.

In a bar, line, or scatterplot graph, which axis is typically used to represent the values being compared? A. z-axis B. y-axis C. t-axis D. x-axis

B. y-axis

The role of a DBA is to ________ and maintain tables in a relational database. Build Partition Assist Block

Build

Which of the following is a key focus of maintaining data quality in database management? A. Reducing the volume of data stored B. Limiting database access to administrators only C. Utilizing SMART data quality metrics D. Ignoring redundant data

C. Utilizing SMART data quality metrics

Data marts assist with the ________ of what data a user needs rather than focusing on existing data. A. access B. variety C. analysis D. advantages

C. analysis

Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data A. financer B. fabricator C. analyst D. administrator

C. analyst

The purpose of the application protocol layer of TCP/IP is to: A. enable users to create and connect private networks (such as intranets) to the Internet. B. standardize how any device will use its physical components to connect to the Internet. C. define how email programs and other software communicate within and across networks. D. manage the total suite of protocols that must work together to connect networks.

C. define how email programs and other software communicate within and across networks.

Which cryptocurrency offers a blockchain-based platform that can be used to develop decentralized applications? A. bitcoin B. ripple C. ethereum D. bitcoin cash

C. ethereum

Database reports are useful in many ways; one way a report is used is to provide details about individual records and to create ________ A. queries B. tables C. labels D. forms

C. labels

What type of computer users are considered miners? A. people who make purchases using bitcoin B. people who create new types of cryptocurrency C. people who validate cryptocurrency transactions on the digital ledger D. people who work at financial institutions that act as an intermediary for cryptocurrency transactions

C. people who validate cryptocurrency transactions on the digital ledger

A ________Blank key must contain a unique value. A. Foreign B. secondary C. primary D. relationship

C. primary

What do scatter plots primarily visualize? A. differences between long and short periods of time B. complex relationships within multiple data categories C. relationships between numerical data pairs D. categorical data distributions

C. relationships between numerical data pairs

In computer programming, a set of rules and guidelines that define a specific computer language is referred to as the language's A. queries B. fields C. syntax D. records

C. syntax

Popular applications used by today's organizations in web mining include Google Analytics, Data Miner, and ________ A. tanalytics B. tablet C. tableau D. tab miner

C. tableau

What object is used to store information when creating a database? A. queries B. forms C. tables D. reports

C. tables

What is the benefit of designing data visualizations for the target audience? A. It ensures the visualizations are visually appealing. B. It guarantees that all data will be represented. C. It makes the visualizations more complicated. D. It improves communication and understanding.

D. It improves communication and understanding.

The key goals of data governance include rules for data use, requirement compliance, high-quality data, and _________ A. server space B. data scrubbing C. database objects D. cost reduction

D. cost reduction

Database Management Systems (DBMS) assign users different access rules to protect the data and users from ________, data leaks, and the misuse of data. A. bad information B. sharing images C. inefficient access times D. identity theft

D. identity theft

Database forms structure data input to ensure data ________ A. information B. control C. language D. integrity

D. integrity

What is another term used to describe line charts? A. bar graphs B. pie charts C. scatterplots D. line plots

D. line plots

An independent data mart is a(n) ________ system created separate from a data warehouse and focused on specific organizational functions. A. assimilated B. extracted C. integrates D. stand-alone

D. stand-alone

One way to visualize a data ecosystem is to apply it to the data project life cycle. The Data Science Ready project outlines the five steps of the data project life cycle. The final stage in this life cycle is A. wrangling B. data fabric C. analysis D. storage

D. storage

When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered ______ data. A. primary B. comprehensive C. second-party D. third-party

D. third-party

From the following list, select all the characteristics of collaboration software that enhance the productivity of teams, groups, and organizations. Dedicated workspaces are viewable and editable by approved users, regardless of their physical location. The software is cloud-based, removing the need for users to have specific software downloaded on a device. Remote users create individual, dedicated workspaces online for managing their own data and workflows. Changes to project documents or spreadsheets must be saved and sent to the members of a team.

Dedicated workspaces are viewable and editable by approved users, regardless of their physical location. The software is cloud-based, removing the need for users to have specific software downloaded on a device.

Which statement describes part of the process for sending information on the Internet? More than one answer option may be correct. Each device connecting to the Internet must have a network interface card (NIC) installed. Devices connect to the Internet using either network cables or wireless technologies. Modems and routers are connected to the Internet via an Internet Service Provider (ISP). Server software on digital devices serve as a bridge between that device and all others on the Internet.

Each device connecting to the Internet must have a network interface card (NIC) installed. Devices connect to the Internet using either network cables or wireless technologies. Modems and routers are connected to the Internet via an Internet Service Provider (ISP).

A cloud-based service offered by vendors and hosted on a vendor's cloud that allows users to access a software application using a web browser and Internet connection is referred to as software as a system. True or False.

False

Created in 2008, bitcoin cash remains the most widely traded and respected cryptocurrency. True or False.

False

Four types of action queries are included in many RDBMS and include requests for append, delete, update, and statement. True or false

False

Generally, cloud computing services are classified in three ways: infrastructure as a service (IaaS), platform as a service (PaaS), and security as a service (SaaS). True or False.

False

Describe the benefits of cloud computing. More than one answer may be correct. Flexibility Cost savings Collaboration Local copies of data

Flexibility Cost savings Collaboration

Examples of IoT devices include which of the following? More than one answer may be correct. Smart TVs Home security cameras smart speakers smartphones

Smart TVs Home security cameras smart speakers

A data mart is a division of a data warehouse explicitly built and constructed for individual departments or business functions. True or false.

True

At its core, blockchain stores transaction data in blocks and then links the blocks together to form a chain. True or false

True

Created in 2015, ethereum is the second most valuable cryptocurrency after bitcoin. Its cryptocurrency is called an ether. True or False.

True

Describe web services. More than one answer may be correct. Web services are a set of software technologies. Web services allow for the exchange of information between two systems and are not tied to any one operating system or programming language. Web services can be used to create apps that link different systems of different organizations and to build open-standard based web applications HTTP is commonly used to create web services.

Web services are a set of software technologies. Web services allow for the exchange of information between two systems and are not tied to any one operating system or programming language.

Which of the following is a common method of connecting a LAN to the Internet? More than one answer may be correct. fiber optic cables ethernet cables coaxial cables satellite signals

fiber optic cables ethernet cables coaxial cables

Database forms structure data input to ensure data integrity. True or false

true


Conjuntos de estudio relacionados

EAQ's you won't find the answer to elsewhere..

View Set

Physical Science Final Study Guide

View Set

Ch. 43 Venipuncture Equipment & Order of Draw

View Set

Physical Stress Management Midterm Winter 2020

View Set

Elsevier Adaptive Quizzing: Respiration

View Set

Chapter 37 - Lecture Notes (Transport Operations)

View Set

ch. 9, Exam 2- quiz, micro CH5, mirco ch 6, micro ch7, ch 8

View Set

Ch. 16 Nutrition During Adulthood

View Set