IT Management Essentials

¡Supera tus tareas y exámenes ahora con Quizwiz!

____ is an important aspect of the data management process a. consistent data hygiene process b. data mapping c. segmenting data d. data governance

C. Segmenting data

Short-term working memory, supports the CPU. Known as the primary storage. a. CPU b. RAM c. disk drive d. USB

RAM

Small tags used to label products for identification and have the product's information transmitted through radio waves.

RFID

What are the four components to consider when considering ROI from an IT perspective?

Speed of product to market, security of IT systems, IT security investments, impact to the public image of the business.

A federal law that provides data privacy and implements security provisions to safeguard an individual's medical information.

HIPPA - Health Insurance Portability and Accountability Act

What are the six components of IT infrastructure?

Hardware, software, networks, data, people, processes

True or False: Data need to be given context to become useful.

True

True or False: IoT can include people.

True

True or False: Microsoft, Amazon, Google are outsourcing their database servers via lease. In this manner, data can be managed by the experts and the experts can protect privacy.

True

True or False: Regardless of the brand of database, such as Oracle, MySql, or Microsoft Access - tables are known as tables, records are known as records and a field is a field.

True

True or False: Reporting systems facilitate daily, operational decision-making and longer-term strategic planning in business.

True

True or False: Structured Query Language (SQL) can be used to query data in nearly every type of database. True False

True

True or False: The use of technology has resulted in people being more productive in their day to day operations.

True

True or False: an operating system is also known as a platform.

True

A CRM is what three things to a business?

-Technology that captures the information -Strategy used to increase business -Process used by the company to manage relationships with customers.

This is how a server provides services to one or more clients (users). a. client-server relationship b. cloud based infrastructure c. cloud service provider d. computer security

A. Client-server relationship

This is a virus that is self-replicating but does not attach itself to an existing program to spread. a. computer worm b. trojan horse c. adware d. spyware

A. Computer worm

Designed to provide members with information about locations and experiences. TripAdvisor, Yelp are examples of this. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging

A. Social review sites

What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information? a. Chief information security officer b. Chief technology officer c. Chief operating officer d. Chief cybersecurity officer

A. Chief information security officer

______ endeavors to provide better business strategic decision-making and even claims to predict the future. a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables

A. Business intelligence (BI)

This role runs the organization's IT engineering group and serves as the company's top technology architect, they develop strategies to increase the business revenue. Determines whether or not the IT center is within the organization or outsourced to Amazon, Microsoft, etc. a. Chief Technology Officer (CTO) b. IT Manager c. Chief Information Officer (CIO) d. Chief Security Officer (CSO)

A. Chief Technology Officer (CTO)

Counts the number of values selected in the argument that contain numbers. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)

A. =COUNT(value1, [value2],...)

Which component must each client computer in the office have in order to install the new network? a. A network interface controller b. An internal network server c. A network switch d. An internal network

A. A network interface controller (NIC)

A technology business is growing rapidly and needs new systems to support a growing workforce. An IT manager is asked to create an IT department to support the growing business. This manager's first task is to make an inventory of essential items needed and their associated costs. The list includes office supplies such as desks, chairs, laptops, and a printer. The list also includes a server, a network operating system, cables, a hub, a router, and everything else it takes to set up a network for the business. The IT manager's boss has some concerns about the cost of a network and its impact on the company and employees. The manager explains that a network will allow employees to use shared peripheral devices on the network. Which example of a peripheral device can the manager provide based on the supply list? a. a printer b. a router c. a laptop d. a hub

A. A printer

Which category of software includes programs such as word processors and PDF document readers? a. Application software b. Project software c. System software d. Utility software

A. Application software

This type of research is a review of the subject and what has been completed in the world of business to determine whether any of it has a commercial application for business. This involves IT by searching the internet for research completed in a specific area. a. basic research b. applied research c. information systems d. development research

A. Basic research

Which methodology for sharing information would be most appropriate to the business in the scenario? a. Browser-based b. LAN-based c. Forward-facing d. WAN-based

A. Browser-based

Which observation about computing technology is expressed in Moore's law? a. computer processing power doubles every 18 months b. cloud based infrastructure is more reliable than host based c. points of failure exist in every computer system d. computing memory requirements double every 18 months

A. Computing processing power doubles every 18 months.

Having clean data starts when the database is created by include database field (columns) controls called validity checks, this refers to what? a. consistent data hygiene process b. data mapping c. segmenting data d. data governance

A. Consistent data hygiene process

A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area. Which legal protection prohibits unethical duplication of this computer program? a. Copyright b. Brand c. Trademark d. Registration

A. Copyright

The most valuable asset (after finances) that a company has, can help the company identify trends, do predictive analysis, etc. a. data b. people c. IT products d. network topology

A. Data

Large, centralized locations where many computers are housed for managing data gathered by organizations. a. data centers b. security c. BI housing d. none of the above

A. Data centers

This is where businesses implement processes to protect various information from getting stolen or tampered with. a. data level security b. user level security c. system level security d. BI security

A. Data level security

Companies use structured data, they know which system (CRM, ERP, accounting, etc.) The company askes for that specific data, not all of it, just specific information to go into to go into ______. a. data warehouse b. long-term storage c. off-site storage location d. all of the above

A. Data warehouse

Builds upon predictive analysis to make decisions about future industries and marketplaces. a. decision analytics b. descriptive analytics c. business analytics d. predictive analytics

A. Decision analytics

The company hopes to use cloud-based storage to allow employees to share all their work-related files. What is a common cloud-based storage solution for the company? a. DropBox b. PowerPoint c. Excel d. Photoshop

A. DropBox

A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse? a .ETL b. Hadoop c. Tableau d. SQL

A. ETL

Which restriction applies to the data in the primary field of a database? a. Each key must be unique. b. The primary field must be generated by the system. c. Each key must be numeric. d. The primary key must be the first attribute in the table.

A. Each key must be unique

Printers and scanners are examples of which one of the six components of IT infrastructure? a. hardware b. processes c. software d. networks

A. Hardware

They are in charge of the projects and activities of IT departments such as budget oversight, risk management, standardizing of software rules and plans. a. IT Portfolio Manager b. IT Manager c. IT Project Manager d. IT Chief Designer

A. IT Portfolio Manager

They design parts of computer applications like screen interfaces, middleware and programming infrastructure that comply with the head applications developer's design principles. Systems can't talk directly to each other, the middleware transforms data so that they talk. a. IT architects b. Computer systems analysts c. Computer support specialists d. Computer systems administrators

A. IT architects (aka applications architects)

A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. In the scenario above, who is responsible for designing a detailed plan to address the incompatibility issue? a. IT portfolio manager b. Chief information officer c. Computer systems administrator d. IT architect

A. IT portfolio manager

Databases are also known as what? a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software

A. Information repositories

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices. What is the designation of this new protocol? a. Internet Protocol version 6 (IPv6) b. Hypertext transfer protocol (HTTP) c. User Datagram Protocol (UDP) d. Transmission Control Protocol

A. Internet Protocol version 6 (IPv6)

This is a private version of the internet within an organization. a. intranet b. knowledge management systems c. cloud based infrastructure d. firewall

A. Intranet

Oliver would like to integrate Internet of Things (IoT) technologies into his small bike manufacturing business. He has contracted with several different IoT system vendors to automate different aspects of the production process. What is the main potential flaw in Oliver's automation strategy? a. IoT systems may not integrate with each other. b. IoT is generally incompatible with robotic systems. c. IoT systems require significant factory floor space. d. IoT provides little benefit for manufacturing firms.

A. IoT systems may not integrate with each other

Why was the use of infrastructure like switches, routers and hubs considered the key to internet breakthrough in 1969? a. it prevented total failure when one part of the network failed b. it made personal computing devices more affordable c. it prevented viruses from spreading across the internet d. all of the above

A. It prevented total failure when one part of the network failed.

Which kind of system should be created to help a company organize, create, and distribute the collective experience and expertise of employees? a. Knowledge management system b. Project management system c. Human resource management system d. Customer relationship management system

A. Knowledge management system

A company produces a mobile app that provides recipes and cooking tutorials. Which category of app is this? a. Lifestyle b. Social networking c. Entertainment d. Utility

A. Lifestyle

After data are transformed and normalized, they are ready for this step of the ETL process. Typically data is being moved into a data warehouse or datamart. a. load b. extract c. transform

A. Load

This type of computer network is relatively small, building, house, room, department. a. local area network (LAN) b. metropolitan area network (MAN) c. peer-to-peer (P2P) d. campus area network (CAN)

A. Local area network (LAN)

On a day-to-day basis, what is the major focus and responsibility of a chief technology officer? a. Managing the IT group and designing the IT architecture b. Keeping the IT development projects on schedule c. Interfacing with the IT users and setting end-user policies d. Ensuring that the IT infrastructure is up to date

A. Managing the IT group and designing IT architecture

The least known social media category, this supports short written entries (often with links) which are posted on what are called "walls" to anyone who has subscribed to the account. Twitter is the most well-known example. a. microblogging b. social networking c. forums and blogs d. media sharing

A. Microblogging

They are directly responsible for, and in charge of, the smooth operations and maintenance of a business's networks and networking technology, including its hardware and software. They are the SME and all decisions go through them. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator

A. Network Administrator

Every device connected to a network is called a _____, with a ______number. (Think of this as a VIN number on your vehicle.) a. node, media access control (MAC) b. satellite, node c. satellite, radio waves d. node, LAN

A. Node, MAC (forensics uses the MAC number to track people by computer)

Any devices connected as part of a computer network, such a computer, printer, router, etc. a. nodes b. network topology c. IT connections d. all of the above

A. Nodes

Basic queries are run against the database to gain insight into elementary data relations. This is known as what? a. online analytical processing (OLAP) b. predictive analytics c. data mining d. analyzing big data

A. Online analytical processing (OLAP)

This type of network are computers networks that connect directly without the use of a server. a. peer-to-peer (P2P) b. wide area network (WAN) c. all of the above d. none of the above

A. Peer-to-peer (P2P)

The fraudulent practice of directing internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc. a. pharming b. phishing c. internet fraud d. shoulder surfing

A. Pharming

Attempts to reveal future patterns in a marketplace, essentially trying to predict the future by looking for data correlations. a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics

A. Predictive analytics

Using both historical data to forecast activity, behavior, and trends. a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics

A. Predictive analytics

Refers to what a product costs or at least what a business is willing to exchange for their product is which one of the 4Ps of marketing? a. pricing b. promotion c. placement d. product

A. Pricing

Uniquely identifies a record in the table. Example, student IDs. a. primary key b. schema c. foreign key

A. Primary key

Which type of software is designed to easily generate Gantt charts? Project management software? a. project management software b. Spreadsheet software c. Graphing software d. Database management software

A. Project management software

Digital database made up of tables that are related that have the option of using SQL to query and maintain the database. a. relational databases b. tables c. data governance d. business intelligence (BI) e. database management systems (DMS)

A. Relational databases

The same manager would also like to know the total commission paid to salespeople earning 60% or more of their pay in commission. Which function should the manager use to sum the commissions paid to salespeople that earn 60% or more of their pay from commission? a. SUMIF(D3:D16,">60%",C3:C16) b. SUMIF(D3:D16,>60%,C3:C16) c. SUM(D3:D16,">60%",C3:C16) d. SUM(D3:D16,>60%,C3:C16

A. SUMIF(D3:D16,">60%",C3:C16)

Which strategy includes purchasing paid advertisements that appear at the top of results pages in a web browser? a. Search engine marketing b. Landing page strategy c. Content marketing d. Search engine optimization

A. Search engine marketing

This allows for risk management to be able to audit and mitigate the risks involved in the business. a. security of IT systems b. Impact to the public image of the business c. speed of products to market d. IT security investments

A. Security of IT systems

While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers? a. Server b. Client c. Router d. Hub

A. Server

How will the maintenance of employee workstations be simplified by creating an office network? a. Software updates for client computers can be done at once from the server. b. Client computers will no longer need network interface cards. c. Software on client computers will have additional features. d. Client computers will no longer need application software.

A. Software updates for client computers can be done at once from the server.

This is installed covertly on a computer or takes control of the systems without the users knowledge. a. spyware b. adware c. malware d. virus

A. Spyware

Protecting the hardware that the database resides on. a. system level security b. data level security c. user level security

A. System level security

Which level of security is required to protect the hardware and communications equipment that support a database? a. system level security b. user level security c. data level security d. data center security

A. System level security

Type of software that supports computers basic functions, scheduling tasks, executing applications such as MS Windows, macOS-Apple, Unix, Linux. a. system software b. utility software c. application software d. CPU

A. System software

Also known as "piggybacking," involves an attacker seeking entry to a restricted area which lack the proper authentication. Example, using a badge to access building and someone walks in behind you. a. tailgating b. shoulder surfing c. computer worm d. denial of service

A. Tailgating

Which part of a computer executes the computations required by the software? a. The central processing unit b. The motherboard c. The operating system d. The random-access memory

A. The central processing unit (CPU)

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS? a. The business intelligence (BI) system b. The customer relationship management system (CRM) c. The transaction processing system (TPS) d. The cloud web hosting (CWH) system

A. The transaction processing system (TPS)

_____ tries to catalog phrases of an organization's customer feedback into relevant topics. a. topic analytics b. summary analytics c. data mining d. text data mining

A. Topic analytics

____ is used to develop scenarios for businesses to evaluate. Day-to-day transactions, such as checking out at Walmart. a. transaction processing systems (TPS) b. decision support systems (DSS) c. executive information systems (EIS) d. management information systems (MIS)

A. Transaction processing systems (TPS)

Which part of the ETL process does this describe: normalizing data after it is pulled. Normalizing the data means your data are typically organized into the fields and records of a relational database. Normalization also reduces redundancy in storing data, which saves space and helps ensure that data are consistent. a. transform b. load c. extract d. not part of ETL

A. Transform

Hardware technology for attaching peripheral devices to a computer. a. USB b. RAM c. CPU d. NIC

A. USB - Universal Serial Bus Connection

This type of software performs a particular function in the background with little or no interaction with the user, it is essential to the functioning of the computer. a. utility software b. application software c. system software d. both a and c

A. Utility software

This type of software works on an exception basis. a. utility software b. application software c. system software d. all of the above

A. Utility software

Virus protection software and printer drivers are examples of what type of software? a. utility software b. system software c. application software d. none of the above

A. Utility software

This one of the four Vs of big data indicates that data come from both structured and unstructured area in different forms. If it is coming from something structured into big data, somebody is accessing that somehow. a. variety b. veracity c. velocity d. volume

A. Variety

How many data are presented that need to be stored or processed over a given time period. Streaming applications such as Amazon Web Services are an example of this. Which one of the four Vs does this define? a. velocity b. volume c. veracity d. variety

A. Velocity

They prepare, plan and implement web-based software applications. Frequently look a older legacy systems (old mainframe systems) and convert it to some kind of browser based to make it easier to use. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator

A. Web developer

Which type of data are referred to as decayed? a. data that have become outdated b. data that are not properly loaded c. data that have been altered d. data that do not fit a schema

A. data that have become outdated

Measure and provides financial information about an organization, primarily for its decision makers, investors and taxing authorities.

Accounting

What are the five interrelated business departments that are supported by IT?

Accounting, Marketing, HR, R&D, Productions

Which type of computer runs a network operating system (NOS)? a. a mainframe computer b. a server c. a router d. a client computer on a network

B. A server

What Excel formula adds all the values selected in the argument. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)

B. =SUM(number1,[nuber2],.....)

Self-contained program that serves a particular purpose, such as as calendar, a mapping program, or a game.

Application , "app"

Self-contained program that serves a particular purpose, such as a calendar, a mapping program, or a game.

Application software "app"

A manager has a data set that contains the profits of 556 stores in the United States. In the data set, along with each store location, there is a column that specifies the regions of the United States that each location belongs to: East, South, Midwest, Mountain, and Pacific. Which function should the manager use to find the average profits of stores in each region? a. MAX b. AVERAGEIF c. AVERAGE d. IF

B. AVERAGEIF

The IT department of a company has been asked to provide systems for financial and investment management. Which business department has the greatest need for this type of system? a. Sales b. Accounting c. Operations d. Marketing

B. Accounting

This is irritating by not typically malicious. Causes ads to automatically display on the computer. a. malware b. adware c. virus d. spyware

B. Adware

ndothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed. Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week? a. An intranet at Endothon that the manufacturer can access b. An extranet that provides the manufacturer access to data at Endothon c. An intranet at the manufacturer that Endothon can access d. An extranet that provides Endothon access to data from the manufacturer

B. An extranet that provides the manufacturer access to data at Endothon

MS Excel or Adobe Photoshop are examples of what type of software? a. utility software b. application software c. system software d. none of the above

B. Application

Research that is focused on developing a commercial product or process to meet customer or industry requirements and needs. This is a methodology based research and heavily uses IT to determine possibilities. a. basic research b. applied research c. information systems d. development research

B. Applied research

This attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics

B. Business analytics

An analyst uses software to analyze data in the company's data warehouse and produce information to guide the organization. The information is presented in clearly understandable charts and graphs on a dashboard and is used to inform decisions in the organization. Which type of software is this analyst using? a. business productivity software b. business intelligence software c. data governance software d. database management software

B. Business intelligence software

Known as the brain of the computer and the director of the computer. a. RAM b. CPU c. motherboard d. disk drive

B. CPU

All of the data sits on a database server, so that database server can be connected to your computers and facilitates the sharing of the information whether the user is on the LAN or at home on the internet. Security is even more important when utilizing this. a. Business Intelligence Network (BIN) b. Cloud database c. I-Cloud database d. Business Cloud Database (BCDB)

B. Cloud database

Informally called coders, they produce both system and application software by writing lines of programming instructions for a computer to follow. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator

B. Computer programmer

A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server? a. Computer Support Specialist b. Computer System Administrator c. Computer System Analyst d. Computer Programmer

B. Computer system admininstrator

Must have great communication skills, they are highly trained with technology backgrounds and bridge the gap between IT and the rest of the organization. Ex. works with PM, talks to customer to gather requirements. They write the requirements in UML and pass to IT. Conduit between business and IT. a. IT architects b. Computer systems analysts c. Computer support specialists d. Computer systems administrators

B. Computer systems analysts

An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author. Which type of law prohibits this kind of unethical behavior? a. Trade secret b. Copyright c. Trademark d. Patent

B. Copyright

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer initial copyright protection of these marketing images? a. Publishing the marketing images b. Creating the marketing images c. Declaring the images to be copyrighted d. Registering the images with a copyright office

B. Creating the marketing images

One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data. What is the term that describes this effort? a. Master data management b. Data governance c. Database management d. Schema design

B. Data governance

Businesses implement processes to protect the actual data from getting stolen or tampered with. a. system level security b. data level security c. user level security

B. Data level security

This is extra notes about the definition of a field, its data and its use. Known as the "rescue" in the data management process. a. consistent data hygiene process b. data mapping c. segmenting data d. data governance

B. Data mapping

The examination of huge sets of data to find patterns and connections and identify outliers is known as what? a. data integrity b. data mining c. data classification d. software programming

B. Data mining (aka data discovery)

Data that are queried from tables with tools to assist with business knowledge is known as what? a. data inputs b. data outputs c. data storage d. data congruity

B. Data outputs

Small tags used to label products for identification and have the product's information transmitted through radio waves. a. IoT b. RFID c. AI d. IT

B. RFID

The software to create databases. "Systems have many parts" when related to IT terms. Ex. its the data warehouse is sits in, software putting data into different tables, the query, etc. a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables

B. Database management systems (DBMS)

Information systems that are interactive software-based systems designed to assist decision makers. Higher level decision-making, not day-to-day, but looking at inventory on the way, how do I staff to unload trucks, do I need increase staffing, etc.? a. transaction processing systems (TPS) b. decision support systems (DSS) c. executive information systems (EIS) d. management information systems (MIS)

B. Decision based support systems (DSS)

The baseline that other types of analytics are build upon. Defines past data you already have that can be grouped into significant pieces. a. decision analytics b. descriptive analytics c. business analytics d. predictive analytics

B. Descriptive analytics

The company hopes to use cloud-based storage to allow employees to share all their work-related files. What is a common cloud-based storage solution for the company? Photoshop a. Excel b. DropBox c. PowerPoint d. Next

B. DropBox

After determining where the data reside, you can start this part of the ETL process. The data are often coming from CRMs or ERP systems. a. load b. extract c. transform

B. Extract

Examples include google docs, MS Sharepoint, Teams a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software

B. File sharing systems

The business in the scenario frequently works with sensitive data, and it is important to ensure that the network is highly secure. Which network component is specifically designed to prevent unauthorized users from accessing the network? a. Network interface card (NIC) b. Firewall c. Switch d. MAC address

B. Firewall

This is a combination of specialized hardware and software that ensures only authorized personnel can access an organizations intranet. a. computer security b. firewall c. knowledge management systems d. cloud based infrastructure

B. Firewall

A field in a database table that provides a link between two tables in a rational database. a. SQL trilogy b. foreign key c. schema d. primary key

B. Foreign key

What is the purpose of a universal serial bus (USB) on a laptop or desktop computer? a. It provides a wired ethernet connection to the network. b. It allows the computer to connect peripheral devices. c. It serves as an internal transmission bus between components within the computer. d. It allows for universal data transmission to various types of wireless networks.

B. It allows the computer to connect to peripheral devices.

What makes IT unique compared to other departments in businesses? a. The IT department is given monitoring authority over other departments. b. The IT department provides services and support to the other departments. c. The IT department reports directly to the managers of other departments. d. The IT department is funded through the budgets of the other departments.

B. It provides services and support

By segmenting data in a data management system, a business achieves a significant advantage over non-segmentation. What is that advantage? a. It makes SQL easier. b. It targets the right customers. c. It keeps data valid. d. It increases return on investment (ROI).

B. It targets the right customers

This is a collaborative system that organizes, creates and distributes the organization's collective knowledge to its employees. a. intranet b. knowledge management systems (KMS) c. cloud based infrastructure d. cloud service provider (CSP)

B. Knowledge management systems (KMS)

After data are normalized, it is ready to finally be transferred into the data warehouse or DataMart. This is which part of the ETL process? a. transform b. load c. extract d. not part of ETL

B. Load

This type of network connects two or more LANs or CANs together within boundary of town or city. a. peer-to-peer (P2P) b. metropolitan area network (MAN) c. wide area network (WAN) d. both a and c

B. Metropolitan area network (MAN)

Which software feature could help address the problem described in the scenario? a. Salary management b. Milestone tracking c. Available memory d. Head count analysis

B. Milestone tracking

Which software feature could help address the problem described in the scenario? a. Salary management b. Milestone tracking c. Head count analysis d. Available memory

B. Milestone tracking

Which type of device is an ethernet card? a. Network operating system (NOS) b. Network interface controller (NIC) c. Network server hardware d. Network firewall hardware

B. Network interface controller (NIC)

Which file format is suitable to use when sharing a legal contract that requires a digital signature? a. DOCX b. PDF c. HTML d. XML

B. PDF

What is the main financial benefit of using cloud web services? a. Reduce the number of IT staff b. Pay for specific services as needed c. Pay for software and hardware separately d. Reduce the number of IT products used

B. Pay for specific services as needed

The fraudulent practice of sending emails to be from supposedly reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. a. pharming b. phishing c. internet fraud d. shoulder surfing

B. Phishing

Using new and historical data to forecast activity, behavior and trends is an example of that type of data management? a. online analytical processing (OLAP) b. predictive analytics c. data mining d. big data analytics

B. Predictive analytics

Which type of reporting will provide Jack and William with the right information for making strategic decisions? a. Management reporting b. Predictive reporting c. Transaction reporting d. Executive reporting

B. Predictive reporting

The advertisement of products and services, as well as publicity is which one of the 4Ps of marketing? a. pricing b. promotion c. placement d. product

B. Promotion

Which approach facilitates communication when a business has employees that are in different locations and telecommute for work? a. Peer-to-peer communication b. Real-time communication c. Offline communication d. Face-to-face communication

B. Real-time communication

An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law. Which law should the IT manager become familiar with? a. Fair Labor Standards Act b. Sarbanes-Oxley Act c. Santini-Burton Act d. Freedom of Information Act

B. Sarbanes-Oxley Act (SOX)

Defines the tables, fields and constraints, keys and integrity of the database. "blueprint of the database" a. primary key b. schema c. foreign key

B. Schema

A component of search engine marketing. SEO is organic results and not paid advertisements. a. the 4Ps of marketing b. search engine optimization (SEO) c. search engine marketing (SEM) d. GAAP analysis

B. Search engine optimization (SEO)

This is paramount at data centers and investments in backup systems are made to protect assets. A large Google data center like the one in Dallas or Oregon, uses more electricity than a small city. a. data centers b. security c. BI housing d. none of the above

B. Security

Refers to the act of obtaining personal or private information through direct observation, can be done with a camera such as at a gas station watching you put your ATM code in. a. tailgating b. shoulder surfing c. dumpster diving d. phishing

B. Shoulder surfing

This type of site allows individuals to connect with others who have similar interests and backgrounds, such as families, hobbies, educational studies, and even products and brands. The main platforms are Facebook, Twitter, and Instagram. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging

B. Social networking

This type of social media allow a user to post links and other information regarding any topic, usually controlled by a forum. a. forums and blogs b. social news c. social networking d. microblogging

B. Social news

Microsoft 365 is an example of what? a. software b. software suite c. operating system d. none of the above

B. Software suite

The most common of all topologies, nodes that radiate around a central node. This is known as what topology? (Taking one laptop / server off does not impact the rest). a. network topology b. star topology c. ring topology d. bus topology

B. Star topology (shaped like a star)

_____ resides in fixed formats. This data is typically well labeled and often with traditional fields and records of common data tables. a. big data b. structured data c. unstructured data d. semi-structured data e. data mining

B. Structured data

This type of data is is typically well-labeled, often with traditional fields and records common to data tables. a. semi-structured data b. structured data c. unstructured data d. flexible data

B. Structured data (aka normalized data)

Microsoft Windows is an example of what type of software? a. utility software b. system software c. application software d. all of the above

B. System software

A business analyst wants to use the social media data to create and present business intelligence. She will create visualizations that will be used by the executive team. Which tool is appropriate for creating and presenting this business intelligence? a. Hadoop b. Tableau c. Data mining d. Data mart

B. Tableau

Consist of records (rows) separated by fields (columns) that can be queried (questioned) to produce subsets of information. a. relational databases b. tables c. data governance d. business intelligence (BI) e. database management systems (DMS)

B. Tables

Where does IoT data collection begin? a. The database b. The edge c. The cloud d. The internet

B. The edge

William and Jack have a web page, but it does not receive many visitors. How can they make their web page more visible to those who may be looking for a motorcycle repair shop? a. Email web page links to their customers. b. Use search engine optimization. c. Place marketing advertisements on web pages. d. Put the web address on all documents.

B. Use search engine optimization

What is the main reason marketing return on investment (ROI) is easier to measure with social media marketing than with traditional marketing? a. User behavior is highly predictable in social media. b. User behavior can be tracked in social media. c. Social media users often submit product reviews. d. Social media surveys provide customer feedback.

B. User behavior can be tracked in social media

Examples of this are logon IDs and passwords. a. data level security b. user level security c. system level security d. BI security

B. User level security

Type of software that performs a particular function in the background, such as virus protections software and printer drivers, things that you need for your computer to work - like utilities in your home. a. system software b. utility software c. application software d. CPU

B. Utility software

Which attribute of big data relates to whether the data are structured or unstructured? a. velocity b. variety c. veracity d. volume

B. Variety

This one of the four Vs is the "trustworthiness" of the data. Do the data represent what you believe they should? And, are there discrepancies within the data that must be flushed out and "scrubbed" to make the data worthwhile and valuable? a. variety b. veracity c. velocity d. volume

B. Veracity

Which one of the four Vs of Big Data is the main characteristic of big data is that it is big and the remarkable volume it takes just to hold and manage it can be an effort in itself. The total amount is growing exponentially year over year. a. velocity b. volume c. veracity d. variety

B. Volume

Concerned with data policies, data procedures, and standards to govern business-critical data. a. relational databases b. tables c. data governance d. business intelligence (BI) e. database management systems (DMS)

C. Data governance

Wildland fires are often difficult to map and assess while they are active, and this creates difficulties for wildland firefighters. Which IoT solution can be used to address this problem? a. Satellite mapping systems with real-time updates b. Wi-Fi-connected drones with GPS and camera c. Airplanes that use heat sensors and GPS to map fires d. Wi-Fi headsets that facilitate real-time communication

B. Wi-fi connected drones with GPS and camera

This type of network encompasses a large geographical area and connects LANs, CANs, MANs, together. Often rely on telephone company's transmission facilities to connect. a. peer-to-peer (P2P) b. wide area network (WAN) c. all of the above d. none of the above

B. Wide area network (WAN)

Which three benefits does a customer relationship management system (CRM) provide to a business? Choose 3 answers. a. It is a process for returns and customer service. b. It provides communication tools and channels. c. It is a primary sales channel to existing customers. d. It facilitates marketing strategies to increase business. e. It is a process to capture information about the business's customers. f. It is an order processing system.

B. provides communication tools D. facilitates marketing strategies E. captures customer information

Data that come from everywhere. Smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources - to be sifted for patterns and trends.

Big Data

The underlying technology that powers Bitcoin and other cryptocurrencies - list of records (blcoks) linked using cryptography (has, timestamp, transaction data).

Blockchain

This network is built into mobile phones so they can communicate with other devices within approximately 30 feet.

Bluetooth network

They install and perform minor repairs to hardware such as, trouble- shooting. They make sure peripheral equipment like printers work properly. Commonly referred to as "help desk." (Below the administrator in the hierarchy.) a. IT architects b. Computer systems analysts c. Computer support specialists d. Computer systems administrators

C. Computer support specialists

What are the three elements that decisions support systems need for accurate decision-making?

Business intelligence, data analytics, data management capabilities

A manager has a data set that contains salespeople's commissions for the last quarter. In the data set, each salesperson's commission is listed along with the percent of their pay that is made up of commission money (column D). Which function should the manager use to count the number of salespeople that earn 50% or more of their pay from commission? a. =COUNTIF(D3:D16,>=50%) b. =COUNT(D3:D16,">=50%") c. =COUNTIF(D3:D16,">=50%") d. =COUNT(D3:D16,>50%)

C. =COUNTIF(D3:D16,">=50%")

Finds the minimum value of all the values selected in the argument. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)

C. =MIN(number1,[number2],...)

A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated? a. A digital signature b. A MAC address c. A password d. An encryption key

C. A password

Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail? a. A star topology b. A mesh topology c. A ring topology d. A linear bus topology

C. A ring topology

Type of software that is chosen by the end user to do one thing, such as a specific task, such as MS Word, MS Excel apps on phones, pictures, calendars, internal customer service workflow and other internal systems. a. system software b. utility software c. application software d. CPU

C. Application software

What are the three categories of software?

C. Application, system, utility

William and Jack are motorcyclists. They ride to work each day and own a motorcycle repair shop. They started their business fixing friends' motorcycles, and before long they found they had more work than they could handle. Customers began to ask for services such as a website to buy parts and accessories and information on safety and maintenance. William and Jack believe they could expand their business and increase their revenue by adding these services and selling used motorcycles. To make this possible, they need to install and gain expertise in the use of IT. In addition, they have ideas about converting gas-powered motorcycles to electric motorcycles to differentiate their shop from other shops. This would necessitate the collection of new data and connection with additional suppliers and systems. IT will be key to the growth of their company. Which type of research should William and Jack do to understand the electric motorcycles needed to meet customer and industry requirements and needs? a. development research b. basic research c. applied research d. business intelligence research

C. Applied research

Data that comes from everywhere! Examples: smartphone metadata, internet usage records, social media activity, computer usage records, and other data sources - to be sifted for patterns and trends. a. structured data b. data management c. big data d. software

C. Big data

Attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage. a. decision analytics b. descriptive analytics c. business analytics d. predictive analytics

C. Business analytics

What is a key way that social media marketing has simplified the calculation of return on investment (ROI) in marketing? a. By providing companies with the opportunity to easily solicit customer feedback and interaction b. By providing companies with transparent pricing on all advertising offerings c. By allowing companies to track which sales can be connected directly to a specific advertisement d. By allowing companies to utilize user-generated content as an advertising tool

C. By allowing companies to track which sales can be connected directly to a specific advertisement

This role is a board-level head of an information technology department within a business organization, reports to the CEO or COO. They essentially runs business internal IT operations, makes tactical business decisions on IT for the organization. a. Chief Technology Officer (CTO) b. IT Manager c. Chief Information Officer (CIO) d. Chief Security Officer (CSO)

C. Chief Information Officer

This is on demand cloud computing (ODC) is platforms for storage software and data backup that resides in the cloud. a. intranet b. knowledge management systems (KMS) c. cloud based infrastructure d. cloud service provider (CSP)

C. Cloud based infrastructure

A company decides to turn its networks and databases over to a third party to manage and to provide access. What term describes the specific solution used by this company? a. Relational database b. Managed database c. Cloud database d. Distributed database

C. Cloud database

Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory? a. Object embedding b. Object linking c. Cut and paste d. File transfer

C. Cut and paste

________ is concerned with data policies, data procedures, and standards to govern business-critical data a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables

C. Data governance

What is the major function of a computer operating system? a. Application program management b. Computer resource management c. Data management d. Network management

C. Data management

Reading and sorting through a large amount of data to look for patterns, trends, and relationships to help predict future trends is what type of data management? "Digging for data" a. online analytical processing (OLAP) b. predictive analytics c. data mining d. big data analytics

C. Data mining

What is the distinguishing feature that differentiates data from information? a. Data that have been recorded in a computer become information. b. Data that have been structured become information. c. Data that have been given context become information. d. Data that have been verified for correctness become information.

C. Data that have been given context become information

Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts? a. Presentation software b. Spreadsheet software c. Database software d. Word processor software

C. Database software

This is the baseline that other types of analytics are built upon; defines past data you already have that can be grouped into significant pieces. a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics

C. Descriptive analytics

This is a device that allows a computer to read from and write on computer disks. a. keyboard and mouse b. motherboard c. disk drive d. peripheral devices

C. Disk drive

Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business? a. Systems analyst b. IT professional c. End-users d. Operator

C. End-users

Information gathered from sources internally and externally for strategic decisions. Example: what are the high demand months, where are sales happening, etc. as well as external competition or market share. Where should I open / close stores, etc. a. transaction processing systems (TPS) b. decision support systems (DSS) c. executive information systems (EIS) d. management information systems (MIS)

C. Executive information systems (EIS)

Which part of the ETL process does this describe: once you have determined where your data reside, you can initiate this process. The data are often ____ from customer relationship management (CRM) or enterprise resource planning (ERP) systems. a. transform b. load c. extract d. not part of ETL

C. Extract

Which kind of system should be created to specifically help a company collect and distribute important electronic documents via a computer network as PDF files? a. Cloud database system b. Project management system c. File-sharing system d. Knowledge management system

C. File-sharing system

A field that provides a link between two tables in a relational database. a. primary key b. schema c. foreign key

C. Foreign key

This type of social media allows users to correspond with others in a community available for all registered users to read. a. social review sites b. microblogging c. forums and blogs d. social news

C. Forums and blogs

Examples include stock market management software to manage your portfolio, group teaching software such as Adobe Connect, desktop publishing and webinar software. a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software

C. Function-specific software

They use software tools such as systems development life cycle (SDLC) and Unified Modeling Language (UML) to create and alter computer applications through step-by-step approach. IT Portfolio Manager b. IT Manager c. IT Project Manager d. IT Chief Designer

C. IT Project Manager

How have online web development tools benefitted small businesses? a. Simplified programming education for business owners b. Increased search engine rankings for small businesses c. Increased user control of the organization's website d. Simplified HTML coding on business websites

C. Increased user control over the organization's website

Similar to collaboration software, _____ plays a key role in R&D. Global enterprises often have R&D departmental meetings using video conferencing, webcasts, and "whiteboard" software that allow participation from people spread across the world. a. basic research b. applied research c. information systems d. development research

C. Information systems

What term refers to the study, design, development, implementation, support, and management of computer-based information systems? a. Computer Information Systems b. Technology Studies c. Information Technology d. Software Governance

C. Information technology

William has a fleet of 60 trucks that deliver products within 100 miles of his distribution center. He would like to know where his trucks are at all times. How can he efficiently manage this? a. Use radio signals to track location b. Use cell phone tower geolocation c. Install GPS tracking on his trucks d. Install RFID tags in his vehicles

C. Install GPS tracking on his trucks

William manages the repair department of the business and is frustrated with the process of acquiring parts. Which IT methodology can William use to help manage this process? a. Connect suppliers with the company's accounting system. b. Install a database to manage parts inventory. c. Install an extranet to the company's suppliers. d. Create an intranet connection for the company's suppliers.

C. Install an extranet to the company's suppliers

Use of the internet to connect digital devices, widely used technologies, and control systems in order to more fully automate many aspects of life is referred to as ___. a. modern artificial intelligence (AI) b. national network c. internet of things (IoT) d. all of the above

C. Internet of things (IoT)

The use of paid advertisements and organic search results that appear on a search engine results page refers to what? a. the 4Ps of marketing b. search engine optimization (SEO) c. search engine marketing (SEM) d. GAAP analysis

C. Search engine marketing

Freedom Rock Bicycles is considering adopting a cloud-database system. What is the primary advantage of a cloud database? a. It is inherently secure because it is stored offsite. b. It requires no software installed on client computers. c. It can be accessed from anywhere there is an internet connection. d. Database management is not required by the company.

C. It can be accessed from anywhere there is an internet connection

How does a Gantt chart facilitate project management? a. It helps calculate the projected and actual costs of a project. b. It graphically shows the organization of a project team. c. It identifies and sequences the tasks of a project. d. It maps the flow of communication and decisions for a project

C. It identifies and sequences the tasks of a project

What is the purpose of a dashboard in business intelligence (BI) software? a. It is a user tool for inputting queries into the software. b. It is a graphical display of raw data to assist in data consolidation. c. It is a visual presentation of graphs, charts, and diagrams. d. It is a graphical user interface for controlling the execution of the software.

C. It is a visual presentation of graphs, charts, and diagrams

How does a knowledge management system (KMS) help a company? a. It creates rules for sharing company knowledge. b. It evaluates company knowledge for decision-making. c. It provides access to collective company knowledge. d. It generates knowledge from outside data.

C. It provides access to collective company knowledge

What is the purpose of the primary key in a database? a. It is the record number of each record in a table. b. It uniquely identifies the tables in a database. c. It uniquely identifies the records in a specific table. d. It is the primary encryption key for a secure database.

C. It uniquely identifies records in a specific table

Which valuable business intelligence (BI) can Freedom Rock Bicycles acquire from the database that directly relates to overall revenue and profitability based on this scenario? a. Knowing the manufacturing cost of each product b. Knowing who is the best salesperson c. Knowing which products sell the best in each region d. Knowing the sales price of each product

C. Knowing which products sell the best in each region

A small business has a single network that allows every employee to connect through a central server when they are in the company's main office. What type of network is the business using? a. Peer-to-peer Network (P2P) b. Campus Area Network (CAN) c. Local area network (LAN) d. Wide Area Network (WAN)

C. Local area network (LAN)

What is the final step in the deployment and use of an app? a. Market the app using focused marketing to reach the desired audience b. Track the technical performance and user reviews of the app c. Maintain and upgrade the app based on use and user feedback d. Launch the app in the app stores for all applicable platforms

C. Maintain and upgrade the app based on use and user feedback

These types of social media websites provide a foundation for sharing both video and still images. Examples: YouTube, Pinterest, Vimeo. a. social review sites b. social networking c. media sharing d. social news

C. Media sharing

Main circuit board, where CPU and the circuits sit. a. RAM b. USB c. motherboard d. NIC

C. Motherboard

This connects a computer to a network. a. CPU b. LAN c. NIC d. UBS

C. NIC - Network Interface Card

Freedom Rock Bicycles found that it has multiple records due to multiple sales to the same individual. This has caused access problems when looking for specific customers. What can Freedom Rock Bicycles do to alleviate this problem? a. Extract the data b. Scrub the database c. Normalize the database d. Load the data

C. Normalize the database

A method of sharing information and data are called ______ which is proprietary software developed by MS that allows embedded and linking to documents. a. operating systems b. software suite c. object linking and embedding (OLE) d. all of the above

C. Object linking and embedding (OLE)

Freedom Rock Bicycles has installed a new database to keep track of sales by region, salesperson, product, and sales prices, among other items, to keep information on business processes. After installation, Freedom Rock Bicycles discovered additional benefits of the information accumulated in the database and how the information can improve the business profitability and future plans. Freedom Rock Bicycles found that daily reports could be run using SQL to indicate product and parts inventory and sales for the day. Which approach can be used to retrieve this information efficiently? a. Data mining b. Business intelligence (BI) c. Online analytical processing (OLAP) d. Data analytics

C. Online analytical processing (OLAP)

How a product or service is delivered to a customer. How, where, and to whom a product is delivered describes which of the 4 Ps of marketing? a. pricing b. promotion c. placement d. product

C. Placement

A company uses data on its past call volumes to determine call center staffing. Which type of reporting should the company utilize? a. Strategic reporting b. Financial reporting c. Predictive reporting d. Executive reporting

C. Predictive reporting

William and Jack believe that their large selection of rare parts and motorcycles should be the main focus of messaging to customers. Which of the four Ps of marketing should they focus on when they analyze customer needs and customer support? a. Promotion b. Pricing c. Products d. Placement

C. Products

What is the process of normalization of a database? a. Using "load" to place data in the data warehouse b. Improving database performance c. Removing redundancies within the database d. Creating the schema of the database

C. Removing redundancies within the database

Each node (computer) is connected to another with the first and last computer, data is transmitted in a circular manner. (Not commonly used anymore because if you take one laptop / server offline they all break down) a. network topology b. star topology c. ring topology d. bus topology

C. Ring topology (shaped like a ring)

The organization or layout of a database that defines the tables, fields, and constraints, keys and integrity of the database. It is the reference or blueprint of the database. a. SQL trilogy b. foreign key c. schema d. primary key

C. Schema

These sites allow a user to post links and other information regarding any topic, usually controlled by a forum. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging

C. Social news

The advantages of IT collaboration in business initiatives cannot be measured but are obvious to all involved. a. security of IT systems b. Impact to the public image of the business c. speed of products to market d. IT security investments

C. Speed of products to market

Which level of management gets the most detailed reports directly from the transaction processing system? a. Executive b. Managers c. Supervisors d. Laborers

C. Supervisors

IoT devices that track inventories no matter where they are built, shipped, or kept are found primarily in which business unit? a. Manufacturing b. Marketing c. Supply chain d. Operations

C. Supply chain

This refers to protecting the hardware that the database resides on. For example, firewall. a. data level security b. user level security c. system level security d. BI security

C. System level security

Which category of software is Microsoft Office? a. Network software b. Database software c. System software d. Productivity software

C. Systems software

A data analyst wants to search through unstructured data from social media posts to look for useful customer behavior patterns and sentiments. Which type of analytics is appropriate for this task? a. Predictive analytics b. Topic analytics c. Text analytics d. Decision analytics

C. Text analytics

Normalizing data reduces redundancy in storing data, which saves space and helps ensure that data are consistent. Normalizing will typically be organizing into files and records of a relational database. a. load b. extract c. transform

C. Transform

Seemingly harmless when executed, may release a harmful virus or worm. a. spyware b. adware c. trojan horse d. computer worm

C. Trojan horse

This is the most common type of data, it is disorganized and cannot be easily read or processed by a computer because it is not stored in rows and columns like other types of data. a. semi-structured data b. structured data c. unstructured data d. flexible data

C. Unstructured data

_____ is unorganized and cannot be easily read of processed by a computer because it is not stored in rows and columns like more traditional data tables. a. big data b. structured data c. unstructured data d. semi-structured data e. data mining

C. Unstructured data

This one of the four Vs is how many data are presented that need to be stored or processed over a given time period. Streaming applications such as Amazon Web Services are a good example of this. a. variety b. veracity c. velocity d. volume

C. Velocity

This is the "trustworthiness" of the data. Does it represent what you believe it should? Are there discrepancies within the data that must be ferreted out and scrubbed to make data worthwhile and valuable? This defines which one of the four Vs? a. velocity b. volume c. veracity d. variety

C. Veracity

Definitive right given to the owner of an original work. That original work can be a drawing or painting, a novel, song, poem, or computer program that was created by a person as an original and protects their rights of ownership.

Copyrights - registered with US Copyright Office

Information systems that manage the information on a company's customers, including all interactions with each customer is known as what?

Customer relationship systems (CRM)

Calculates the average of all the values selected in the argument. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)

D. =AVERAGE(number1,[number2],...)

A business organization can increase collaboration if it has a database of its internal reports, articles, documents, policies, and decisions. Which tool helps manage this type of information? a. A business information system b. A collaborative database c. A data warehouse d. A knowledge management system

D. A knowledge management system

A discussion board facilitates communication between geographically dispersed group members. What is the correct term to describe an initial post and its subsequent comments? a. Linked comments b. Linked posts c. A stream d. A thread

D. A thread

Keeping track of where customers and users clink on links on a web page is an example of what type of data management? a. online analytical processing (OLAP) b. predictive analytics c. data mining d. big data analytics

D. Big data analytics

Often these data are not in an easy form to analyze, but there are tools and techniques that make it easier to analyze. For example, keeps track of where customers and users click links on a web page. a. predictive analytics b. business analytics c. descriptive analytics d. big data analytics

D. Big data analytics

Each node is connected to a common linear backbone that had two endpoints. This is known as what type of topology? a. network topology b. star topology c. ring topology d. bus topology

D. Bus topology (shaped like bus)

Endeavors to provide better business strategic decision-making and even claims to predict the future. a. relational databases b. tables c. data governance d. business intelligence (BI) e. database management systems (DMS)

D. Business intelligence

This department uses data to provide historical, current, and predictive analyses for organization. a. data center b. unstructured data c. structured data d. business intelligence

D. Business intelligence (BI)

The "Count" column (column G) is intended to show the number of cities (column B) in each region (column C). Which functions and input variables should be used to return the correct value for cell G3? a. =COUNTIF(D$3:D$21,F3) b. =COUNTIF(F$3:F$7,D3) c. =COUNTIF(F$3:F$7,C3) d. =COUNTIF(C$3:C$21,F3)

D. COUNTIF(C$3:C$21,F3)

What hardware component performs most of the calculations for a computer? a. hard drive b. motherboard c. operating system d. CPU

D. CPU

This type of computer network connects two or more LANs, like a university campus. a. wide area network (WAN) b. metropolitan area network (MAN) c. peer-to-peer (P2P) d. campus area network (CAN)

D. Campus area network (CAN)

An executive person who is responsible for overall corporate and IT security, they oversee physical security, safety of employees, facilities, corporate assets as well as IT security. Follows legal mandates for security of data - such as social security numbers, personal information, credit card, etc. If there is a breach, this is the accountable. a. Chief Technology Officer (CTO) b. IT Manager c. Chief Information Officer (CIO) d. Chief Security Officer (CSO)

D. Chief Security Officer (CSO)

Servicers that provide cloud infrastructure and services, such as Amazon, MS, Apple, Google. a. intranet b. knowledge management systems (KMS) c. cloud based infrastructure d. cloud service provider (CSP)

D. Cloud service providers (CSPs)

This allows the computer systems to communicate with each other no matter distance of locations, includes routers, switches, and communication links. a. radio waves b. nodes c. wires d. computer networks

D. Computer networks

This is concerned with risk management, confidentiality, integrity, and availability in a computer system. a. client-server relationship b. cloud based infrastructure c. cloud service provider d. computer security

D. Computer security

They are responsible for setting up larger computer assets and maintaining them. Any changes to the computer goes through them. They are responsible to maintain and make sure everything is still compliant and that they have developed a disaster plan. Also known as system administrators or Sys Admins. a. IT architects b. Computer systems analysts c. Computer support specialists d. Computer systems administrators

D. Computer systems administrators

These are text files that stay on the client computer so the next time the client visits the website information such as user ID and password are automatically filled. Can be tracked and compromise your privacy. a. spyware b. malware c. adware d. cookies

D. Cookies

This refers to policies and procedures that are established that define the program, such as who has access, who has update capabilities, etc. a. consistent data hygiene process b. data mapping c. segmenting data d. data governance

D. Data governance

Which term refers to managing the availability, integrity, and security of an organization's data to ensure that the data remain high quality and valid? a. Data scrubbing b. Data normalization c. Data analytics d. Data governance

D. Data governance

_____ can be defined as acquiring data, making sure the data are valid, and then storing and processing the data into usable information for a business. a. big data b. structured data c. unstructured data d. data management processes e. data mining

D. Data management processes

A data analyst wants to use software to look for useful patterns and hidden relationships in this large set of social media data. Which process can be used to look for these patterns and relationships? a. Data scrubbing b. Data normalization c. Data management d. Data mining

D. Data mining

Ahmed works for an online retailer, and one of his responsibilities is to make sure every item in each distribution center can be located quickly. What is the appropriate tool to use for this purpose? a. A knowledge management system (KMS) b. A customer relationship management (CRM) system c. A spreadsheet d. A database

D. Database

This builds on predictive analysis to make decisions about future industries and marketplaces. a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics

D. Decision analytics

Cyber attack to make machine or network disrupt services. a. tailgating b. shoulder surfing c. computer worm d. denial of service

D. Denial of service

The stage of R&D where the findings of the research are utilized for the production of products, including the results of simulations run using IT to develop material requirements and methodologies of production. a. basic research b. applied research c. information systems d. development research

D. Development research

A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse? a. ETL b. Hadoop c. Tableau d. SQL

D. ETL

A database manager is setting up a relational database. The manager creates a field in a table that links to the primary key in a different table in the database. What is this field called? a. function b. schema c. absolute reference d. foreign key

D. Foreign key

The data analyst at Freedom Rock Bicycles wants to link two tables in the database. What is the name of the field in a database table that is used to connect or link two tables together? a. Common key b. Linking key c. Connection key d. Foreign key

D. Foreign key

The internet didn't become widely used until the early 90's when access to these three things became available. a. personal computing devices, operating systems, b. MS Office, AOL, anti-virus software c. personal computing devices, application software, developers d. HTML, HTTP, web browsers

D. HTML, HTTP, web browsers

CPU chip, RAM memory and Motherboard are examples of which of the six components of IT infrastructure? a. software b. processes c. networks d. hardware

D. Hardware

What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards? a. Operating System b. Information Technology c. Software d. Hardware

D. Hardware

Three assets that help a business obtain, sort through, create and store data; manage projects and communicate with other employees and clients; and remain connected to periphery devices needed to facilitate business. a. IT personnel, hardware, software b. LAN, CPU, Motherboards c. networks, utility software, people d. hardware, software, computer networks

D. Hardware, software, computer networks

These investments are designed to thwart hacking of systems that can cause major outages of systems. a. security of IT systems b. Impact to the public image of the business c. speed of products to market d. IT security investments

D. IT security investments

They are responsible for protecting all sensitive information within an organization, also known as cybersecurity analysts. Audit new software, suppliers, interfaces, etc. are tested and safe. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator

D. Information Security Analyst

An additional problem that the consultant identified was that unauthorized users could easily access data on the company's internal network. Which IT professional is responsible for addressing this issue? a. Web developer b. Database administrator c. Computer systems administrator d. Information security analyst

D. Information security analyst

This is broad, it is any term that refers to fraudulent activity in an online setting such as email, media boards, chat rooms, websites etc. a. dumpster diving b. pharming c. phishing d. internet fraud

D. Internet fraud

In today's environment, more and more companies are providing "smart" household items such as lights, doorbells, and refrigerators that can be controlled via applications on consumers' phones or tablets. What is the common term for this type of technology? a. Distributed systems b. Linked devices c. Cloud services d. Internet of Things

D. Internet of Things (IoT)

What is the purpose of a foreign key in a database? a. It is used to link multiple databases together. b. It is a key that connects to the wrong data. c. It is a key that has invalid or decayed data. d. It is used to link two tables together.

D. It is used to link two tables together

Used for input of the computer. a. disk drive b. peripheral devices c. motherboard d. keyboard and mouse

D. Keyboard and mouse

While the business in the scenario is growing, it is still a small business. There are just 25 employees, and they all work in the same location. Which type of network will the business use? a. Metropolitan area network (MAN) b. Campus area network (CAN) c. Wide area network (WAN) d. Local area network (LAN)

D. LAN

This is often used for financial gain, can plant spyware that can monitor other computers actions. a. adware b. trojan horse c. spyware d. malware

D. Malware

The use of internal reports and TPS to make managerial decisions. a. transaction processing systems (TPS). Looking at TPS data to review staffing levels for periods of demand, etc. a. transaction processing system (TPS) b. decision support systems (DSS) c. executive information systems (EIS) d. management information systems (MIS)

D. Management information systems (MIS)

These websites are very familiar, as they provide a foundation for sharing both video and still images. YouTube is the most well-known media sharing website, with Pinterest and Vimeo also in this category. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging

D. Media sharing

In the report, the consultant noted that the company's network is in need of maintenance. Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software? a. Network analyst b. Network installer c. Network programmer d. Network administrator

D. Network administrator

What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software? a. Network engineer b. Network development c. Network architect d. Network administrator

D. Network administrator

_____ is a mapping of a physical network and logical interconnections between nodes (computers - laptops, phones, etc.). It is the way a network is arranged and laid out. a. bus topology b. star topology c. ring topology d. network topology

D. Network topology

Known as the backbone of IT infrastructure, two or more devices that connect. a. nodes b. radio waves c. satellite d. networks

D. Networks

A data analyst is using the ETL process to enter data into the company's relational database. The data contain many redundancies. Which process will the data analyst need to use before loading the extracted data into the database? a. data governance b. topic analysis c. segmentation d. normalization

D. Normalization

The data are full of redundancies, which the data analyst needs to remove. Which process can the data analyst use to remove the redundancies? a. Schema design b. Data governance c. Extraction d. Normalization

D. Normalization

Examples include printers and scanners connect to a computer via USB connections. a. keyboard and mouse b. motherboard c. disk drive d. peripheral devices

D. Peripheral devices

An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent? a. Click fraud b. Keylogging c. Spyware d. Phishing

D. Phishing

Attempts to reveal future patterns in a marketplace, essentially trying to predict the future by looking for data correlations. Ex. Credit report is looking at the past to indicate whether or not you would pay back a car loan. a. decision analytics b. descriptive analytics c. business analytics d. predictive analytics

D. Predictive analytics

A field in a database table that uniquely identifies a record in the table. For example, every student at a university has a unique student ID number. a. SQL trilogy b. foreign key c. schema d. primary key

D. Primary key

The actual goods and services a business produces and how they relate to customers' needs, including warranties, guarantees, and customer support. This is which one of the 4 Ps of marketing? a. pricing b. promotion c. placement d. product

D. Product

A design business has employees based in different parts of the country, with all employees working remotely from home. This allows the business to attract the best expertise, which is a great benefit to the business. One problem, however, is that employees are often waiting for other employees to complete certain tasks before they can complete their own. This lack of coordination causes significant delays in projects. Which type of software is designed specifically to address the coordination problem in the scenario? a. Spreadsheet software b. Database software c. Graphing software d. Project management software

D. Project management software

____ spread themselves attaching to legitimate files and infection websites, emails, can disable systems. a. adware b. trojan horse c. spyware d. virus

D. Virus

This is a digital database mad up of tables that are related to have the option of using SQL to query and maintain the database a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables

D. Relational databases

When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost. What is this metric called? a. Profitability ratio b. Profit and loss c. Cost benefit analysis d. Return on investment

D. Return on investment

This is a mix of two other types of data. a. structured data b. flexible data c. unstructured data d. semi-structured data

D. Semi-structured data

____ can possible be converted to structured data, but not without a lot of work. a. big data b. structured data c. unstructured data d. semi-structured data e. data mining

D. Semi-structured data

While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers? a. Router b. Hub c. Client d. Server

D. Server

One of the most impactful technologies of the twenty-first century is ____. a. IoT b. mobile apps c. wireless networks d. social media

D. Social media

This type of social media allows individuals to connect with others who have similar interests and backgrounds, such as families, hobbies, educational studies, and even products and brands. Examples: Facebook, Twitter, Instagram. a. microblogging b. forums and blogs c. social review sites d. social networking

D. Social networking

This type of social media is designed to provide members with information about locations and experiences. Examples: TripAdvisor, Yelp, etc. a. social news b. microblogging c. forums and blogs d. social review sites

D. Social review sites

A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. How should the IT department resolve the incompatibility issue? a. implement a process that translates data from one software to another b. hold a training on how to use each software product to remove incompatibility c. increase helpdesk support for various software packages d. standardize software throughout the organizaiton.

D. Standardize software throughout the organization

Jack and William want to hire a person to write code to access their database in order to build management reports. Which skill should a successful applicant possess? a. Data administration b. Search engine optimization (SEO) c. Data analytics d. Structured Query Language (SQL)

D. Structured Query Language (SQL)

What is the standard programming language that is used to extract and update data in most relational databases? a. Hypertext markup language (HTML) b. Python c. JavaScript d. Structured Query Language (SQL)

D. Structured Query Language (SQL)

The data warehouse is very costly and time-consuming to manage, and the data analyst notices that the data warehouse only used 20 percent of its capacity during discovery. How can the company reduce the cost and time associated with managing the data warehouse? a. configure the data warehouse with SQL b. process the data with Tableau c. use a relational database d. switch to a data mart

D. Switch to a data mart

The data warehouse is very costly and time-consuming to manage, and the data analyst notices that the data warehouse only used 20 percent of its capacity during discovery. How can the company reduce the cost and time associated with managing the data warehouse? a. Configure the data warehouse with SQL b. Process the data with Tableau c. Use a relational database d. Switch to a data mart

D. Switch to data mart

One of the main tools for data output is a software known as _____, which produces interactive data visualization products focused on business intelligence. a. Oracle b. MySQL c. Microsoft Access d. Tableau e. SQL

D. Tableau

This process hunts through unstructured data to look for useful patterns such as whether their customers on Facebook or Instagram are unsatisfied with the organization's product or services. a. data mining b. summary analytics c. text data mining d. text analytics

D. Text analytics

When using extract, transform, and load (ETL), what is done during the "transform" step? a. The database schema is designed and created. b. The database is queried for relevant data. c. The data are given context and relevance. d. The data are normalized and structured.

D. The data are normalized and structured

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario? a. The exterior light b. The interior light c. The camera d. The door lock

D. The door lock

What is the definition of the term "best practice?" a. the attainment of a competitive advantage b. the fastest way to complete a required task c. the application of information technology to improve a process d. the most effective way of arriving at a desired outcome

D. The most effective way of arriving at a desired outcome.

What is the purpose of a MAC address? a. To uniquely identify a computer motherboard b. To uniquely identify an internet URL c. To uniquely identify an email client d. To uniquely identify a computer on a network

D. To uniquely identify a computer on a network

Many websites keep track of a user's actions and information. They store much of this information on the user's computer in a private folder on the hard drive. What are these very small files called? a. Tracking packages b. Tracking data c. Tracking URLs d. Tracking cookies

D. Tracking cookies

Which one of the four V's of big data is defined as the main characteristic of big data is that it is big, and the remarkable amount of ____ it takes just to hold and manage it can take quite an effort. Companies like marketers will purchase part of this data, such as location, brand, etc. you may have referenced on social media, and target that consumer with specific ads related to their interests. This is growing exponentially year after year. a. variety b. veracity c. velocity d. volume

D. Volume

Software for input, edit, format, output. a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software

D. Word processing

What are the three levels of security related to IT? a. data level security b. customer identity security c. user level security d. system level security

Data level, User level, System level

Software to create databases.

Database Management Systems (DBMS)

This is the process of searching trash to obtain useful information about a person / business that can later be used for hacking purposes. a. pharming b. phishing c. dumpster diving d. shoulder surfing

Dumpster diving

Finds the maximum value of all the values selected in the argument. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)

E. =MAX(number1,[number2],...)

Collaboration software, such as MS Teams. a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software

E. Communications software

This term is the examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships. a. big data b. structured data c. unstructured data d. semi-structured data e. data mining

E. Data mining (AKA data discovery)

They categorize data requirements and create the database entities and models, such as tables, that ensure accurate and smooth-flowing information through a business. They develop the tables based on whatever the Business Intelligence (BI) team wants, or the managers want. They "normalize" the data and pull data from other systems into the database, and know exactly where it's going to go. They are charge of databases, relational databases, mostly the data warehouse and organizations. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator

E. Database Administrator (DBA)

This allows users to correspond with others in a community forum available for all registered users to read, more focused than forums. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging

E. Forums and blogs

This is a programming language specifically for querying and manipulating relational databases; one of the few languages that works on almost every brand of database. a. Oracle b. MySQL c. Microsoft Access d. Tableau e. SQL

E. SQL

_____ consist of records (rows) separated by fields (columns) that can be queried (questioned) to produce subsets of information. a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables

E. Tables

What does ETL stand for?

Extract, Transform, Load

The least known category, it supports short written entries (often with links), which are posted on what are called "walls" to anyone who has subscribed to the account. Twitter is the most well-known in this category. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging

F. Microblogging

A federal law that protects the rights of students' educational records.

FERPA - Family Educational Rights and Privacy Act

True or False: Big data and structured data are the same thing.

False

True or False: Microsoft Project is classified as presentation software.

False

True or False: Written posts extracted from a social media feed are generally classified as structured data.

False

True of False: Lack of data governance is not a problem.

False !!

The accounting rules for preparing, presenting and reporting. Investors can have a standard set of reports regarding a business's well-being.

Generally accepted accounting principles (GAAP)

This is designed to receive signals from an app on a phone and geostationary satellites so taht precise location can be determined, WiFi.

Global positioning systems (GPS)

True or False: Wireless sensors, software, robotics, and computer devices are all what type of devices?

Internet of Things (IoT)

Use of internet to connect digital devices, widely used technologies, and control systems in order to more fully automate many aspects of life is referred to as _____.

Internet of Things (IoT)

This is a private version of the internet within an organization.

Intranet

Established to encourage innovation and technological advances and protect the rights of the inventory. This protects new products, upgrades to existing products and some functional aspects of computer software.

Patents

What are the three parts of structured query language (SQL)?

Primary key, Foreign key and Schema

What are the 4 Ps of marketing?

Products, pricing, promotion, placement

This department takes a creative and systematic approach to evolve a business's original idea and devise new ones. Their goal is to enhance existing products or create new products.

Research and development (R&D)

An accounting industry act passed by the federal government to oversee the accounting practices of a business and industry; makes the CEO accountable for accurate reporting.

SOX - Sarbanes-Oxley act of 2002

What law was enacted to counter fraudulent reporting?

Sarbanes-Oxley Act of 2002 (SOX)

What is the difference between application and system software?

System software requires little if any user intervention and application software is designed to serve the user and carry out any task the user requests such as creating spreadsheets or documents. Users do not turn on systems software but users must start applications, such as Excel or Photoshop.

True of False: Acquiring dat, making sure the data are valid, and then storing and processing the data into usable information for business is known as data management processes.

True

True of False: Circuit boards, chipsets and keyboards are the examples of the physical aspects of business computer hardware.

True

True of False: Data warehouse is where all of your data sits.

True

True of False: Hardware rarely changes during the life of a computer, but certain components can be added to enhance the computer's power and usability.

True

True of False: IT is a core competency in business, regardless of position.

True

True of False: On-demand cloud computing (OCD) platforms can be used to reduce data storage costs.

True

True or False: A challenge of IT systems is that they can capture too much data.

True

True or False: Attitudes toward information technology play a pivotal role in gaining computer competency.

True

What are four examples of IT challenges?

Too much data, too many options, unskilled team members, technical support.

Information that is private or not known outside of the company and if disclosed would cause harm or loss to the corporation. This gives an advantage to a company over its competitors.

Trade Secret

Words, designs, etc. that identify a source of a product. Mickey Mouse and Nike swoosh are examples; highly protected.

Trademarks - registered with US Patent and Trademark Office (USPTO).

True or False: CRMs interface with many internal business centers.

True

What are the four V's of Big Data?

Volume, Variety, Veracity, Velocity

Nodes communicate in three ways: a. LAN, CPU, MAC b. wires, radio waves, satellite c. wires, satellites, networks d. radio waves, cellular towers, fiber optics

Wires (ethernet, coaxial cable, fiber optics) Radio waves (wi-fi, cellular towers) Satellite, such as GPS or satellite radio

This person is in charge of software application development teams that develop, design, program, and test software applications. The manager in charge of all the managers within IT. a. IT Portfolio Manager b. IT Manager c. IT Project Manager d. IT Chief Designer

b. IT Manager

A computer is made up of ___ that uses ____ to make it work.

hardware, software


Conjuntos de estudio relacionados

EMT Chapter 16: Cardiovascular Emergencies Quiz

View Set

Compensation and Benefits Chapter 5

View Set

Fluid/Electrolytes: Hypervolemia

View Set

Chapter 14- Consumer Decision Process and Problem Recognition

View Set

EMT - Unit 1 Practice Exam Questions

View Set

21st Century Literature Q2 Week 7 (European Literature)

View Set