IT Management Essentials
____ is an important aspect of the data management process a. consistent data hygiene process b. data mapping c. segmenting data d. data governance
C. Segmenting data
Short-term working memory, supports the CPU. Known as the primary storage. a. CPU b. RAM c. disk drive d. USB
RAM
Small tags used to label products for identification and have the product's information transmitted through radio waves.
RFID
What are the four components to consider when considering ROI from an IT perspective?
Speed of product to market, security of IT systems, IT security investments, impact to the public image of the business.
A federal law that provides data privacy and implements security provisions to safeguard an individual's medical information.
HIPPA - Health Insurance Portability and Accountability Act
What are the six components of IT infrastructure?
Hardware, software, networks, data, people, processes
True or False: Data need to be given context to become useful.
True
True or False: IoT can include people.
True
True or False: Microsoft, Amazon, Google are outsourcing their database servers via lease. In this manner, data can be managed by the experts and the experts can protect privacy.
True
True or False: Regardless of the brand of database, such as Oracle, MySql, or Microsoft Access - tables are known as tables, records are known as records and a field is a field.
True
True or False: Reporting systems facilitate daily, operational decision-making and longer-term strategic planning in business.
True
True or False: Structured Query Language (SQL) can be used to query data in nearly every type of database. True False
True
True or False: The use of technology has resulted in people being more productive in their day to day operations.
True
True or False: an operating system is also known as a platform.
True
A CRM is what three things to a business?
-Technology that captures the information -Strategy used to increase business -Process used by the company to manage relationships with customers.
This is how a server provides services to one or more clients (users). a. client-server relationship b. cloud based infrastructure c. cloud service provider d. computer security
A. Client-server relationship
This is a virus that is self-replicating but does not attach itself to an existing program to spread. a. computer worm b. trojan horse c. adware d. spyware
A. Computer worm
Designed to provide members with information about locations and experiences. TripAdvisor, Yelp are examples of this. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging
A. Social review sites
What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information? a. Chief information security officer b. Chief technology officer c. Chief operating officer d. Chief cybersecurity officer
A. Chief information security officer
______ endeavors to provide better business strategic decision-making and even claims to predict the future. a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables
A. Business intelligence (BI)
This role runs the organization's IT engineering group and serves as the company's top technology architect, they develop strategies to increase the business revenue. Determines whether or not the IT center is within the organization or outsourced to Amazon, Microsoft, etc. a. Chief Technology Officer (CTO) b. IT Manager c. Chief Information Officer (CIO) d. Chief Security Officer (CSO)
A. Chief Technology Officer (CTO)
Counts the number of values selected in the argument that contain numbers. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)
A. =COUNT(value1, [value2],...)
Which component must each client computer in the office have in order to install the new network? a. A network interface controller b. An internal network server c. A network switch d. An internal network
A. A network interface controller (NIC)
A technology business is growing rapidly and needs new systems to support a growing workforce. An IT manager is asked to create an IT department to support the growing business. This manager's first task is to make an inventory of essential items needed and their associated costs. The list includes office supplies such as desks, chairs, laptops, and a printer. The list also includes a server, a network operating system, cables, a hub, a router, and everything else it takes to set up a network for the business. The IT manager's boss has some concerns about the cost of a network and its impact on the company and employees. The manager explains that a network will allow employees to use shared peripheral devices on the network. Which example of a peripheral device can the manager provide based on the supply list? a. a printer b. a router c. a laptop d. a hub
A. A printer
Which category of software includes programs such as word processors and PDF document readers? a. Application software b. Project software c. System software d. Utility software
A. Application software
This type of research is a review of the subject and what has been completed in the world of business to determine whether any of it has a commercial application for business. This involves IT by searching the internet for research completed in a specific area. a. basic research b. applied research c. information systems d. development research
A. Basic research
Which methodology for sharing information would be most appropriate to the business in the scenario? a. Browser-based b. LAN-based c. Forward-facing d. WAN-based
A. Browser-based
Which observation about computing technology is expressed in Moore's law? a. computer processing power doubles every 18 months b. cloud based infrastructure is more reliable than host based c. points of failure exist in every computer system d. computing memory requirements double every 18 months
A. Computing processing power doubles every 18 months.
Having clean data starts when the database is created by include database field (columns) controls called validity checks, this refers to what? a. consistent data hygiene process b. data mapping c. segmenting data d. data governance
A. Consistent data hygiene process
A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area. Which legal protection prohibits unethical duplication of this computer program? a. Copyright b. Brand c. Trademark d. Registration
A. Copyright
The most valuable asset (after finances) that a company has, can help the company identify trends, do predictive analysis, etc. a. data b. people c. IT products d. network topology
A. Data
Large, centralized locations where many computers are housed for managing data gathered by organizations. a. data centers b. security c. BI housing d. none of the above
A. Data centers
This is where businesses implement processes to protect various information from getting stolen or tampered with. a. data level security b. user level security c. system level security d. BI security
A. Data level security
Companies use structured data, they know which system (CRM, ERP, accounting, etc.) The company askes for that specific data, not all of it, just specific information to go into to go into ______. a. data warehouse b. long-term storage c. off-site storage location d. all of the above
A. Data warehouse
Builds upon predictive analysis to make decisions about future industries and marketplaces. a. decision analytics b. descriptive analytics c. business analytics d. predictive analytics
A. Decision analytics
The company hopes to use cloud-based storage to allow employees to share all their work-related files. What is a common cloud-based storage solution for the company? a. DropBox b. PowerPoint c. Excel d. Photoshop
A. DropBox
A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse? a .ETL b. Hadoop c. Tableau d. SQL
A. ETL
Which restriction applies to the data in the primary field of a database? a. Each key must be unique. b. The primary field must be generated by the system. c. Each key must be numeric. d. The primary key must be the first attribute in the table.
A. Each key must be unique
Printers and scanners are examples of which one of the six components of IT infrastructure? a. hardware b. processes c. software d. networks
A. Hardware
They are in charge of the projects and activities of IT departments such as budget oversight, risk management, standardizing of software rules and plans. a. IT Portfolio Manager b. IT Manager c. IT Project Manager d. IT Chief Designer
A. IT Portfolio Manager
They design parts of computer applications like screen interfaces, middleware and programming infrastructure that comply with the head applications developer's design principles. Systems can't talk directly to each other, the middleware transforms data so that they talk. a. IT architects b. Computer systems analysts c. Computer support specialists d. Computer systems administrators
A. IT architects (aka applications architects)
A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. In the scenario above, who is responsible for designing a detailed plan to address the incompatibility issue? a. IT portfolio manager b. Chief information officer c. Computer systems administrator d. IT architect
A. IT portfolio manager
Databases are also known as what? a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software
A. Information repositories
Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices. What is the designation of this new protocol? a. Internet Protocol version 6 (IPv6) b. Hypertext transfer protocol (HTTP) c. User Datagram Protocol (UDP) d. Transmission Control Protocol
A. Internet Protocol version 6 (IPv6)
This is a private version of the internet within an organization. a. intranet b. knowledge management systems c. cloud based infrastructure d. firewall
A. Intranet
Oliver would like to integrate Internet of Things (IoT) technologies into his small bike manufacturing business. He has contracted with several different IoT system vendors to automate different aspects of the production process. What is the main potential flaw in Oliver's automation strategy? a. IoT systems may not integrate with each other. b. IoT is generally incompatible with robotic systems. c. IoT systems require significant factory floor space. d. IoT provides little benefit for manufacturing firms.
A. IoT systems may not integrate with each other
Why was the use of infrastructure like switches, routers and hubs considered the key to internet breakthrough in 1969? a. it prevented total failure when one part of the network failed b. it made personal computing devices more affordable c. it prevented viruses from spreading across the internet d. all of the above
A. It prevented total failure when one part of the network failed.
Which kind of system should be created to help a company organize, create, and distribute the collective experience and expertise of employees? a. Knowledge management system b. Project management system c. Human resource management system d. Customer relationship management system
A. Knowledge management system
A company produces a mobile app that provides recipes and cooking tutorials. Which category of app is this? a. Lifestyle b. Social networking c. Entertainment d. Utility
A. Lifestyle
After data are transformed and normalized, they are ready for this step of the ETL process. Typically data is being moved into a data warehouse or datamart. a. load b. extract c. transform
A. Load
This type of computer network is relatively small, building, house, room, department. a. local area network (LAN) b. metropolitan area network (MAN) c. peer-to-peer (P2P) d. campus area network (CAN)
A. Local area network (LAN)
On a day-to-day basis, what is the major focus and responsibility of a chief technology officer? a. Managing the IT group and designing the IT architecture b. Keeping the IT development projects on schedule c. Interfacing with the IT users and setting end-user policies d. Ensuring that the IT infrastructure is up to date
A. Managing the IT group and designing IT architecture
The least known social media category, this supports short written entries (often with links) which are posted on what are called "walls" to anyone who has subscribed to the account. Twitter is the most well-known example. a. microblogging b. social networking c. forums and blogs d. media sharing
A. Microblogging
They are directly responsible for, and in charge of, the smooth operations and maintenance of a business's networks and networking technology, including its hardware and software. They are the SME and all decisions go through them. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator
A. Network Administrator
Every device connected to a network is called a _____, with a ______number. (Think of this as a VIN number on your vehicle.) a. node, media access control (MAC) b. satellite, node c. satellite, radio waves d. node, LAN
A. Node, MAC (forensics uses the MAC number to track people by computer)
Any devices connected as part of a computer network, such a computer, printer, router, etc. a. nodes b. network topology c. IT connections d. all of the above
A. Nodes
Basic queries are run against the database to gain insight into elementary data relations. This is known as what? a. online analytical processing (OLAP) b. predictive analytics c. data mining d. analyzing big data
A. Online analytical processing (OLAP)
This type of network are computers networks that connect directly without the use of a server. a. peer-to-peer (P2P) b. wide area network (WAN) c. all of the above d. none of the above
A. Peer-to-peer (P2P)
The fraudulent practice of directing internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc. a. pharming b. phishing c. internet fraud d. shoulder surfing
A. Pharming
Attempts to reveal future patterns in a marketplace, essentially trying to predict the future by looking for data correlations. a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics
A. Predictive analytics
Using both historical data to forecast activity, behavior, and trends. a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics
A. Predictive analytics
Refers to what a product costs or at least what a business is willing to exchange for their product is which one of the 4Ps of marketing? a. pricing b. promotion c. placement d. product
A. Pricing
Uniquely identifies a record in the table. Example, student IDs. a. primary key b. schema c. foreign key
A. Primary key
Which type of software is designed to easily generate Gantt charts? Project management software? a. project management software b. Spreadsheet software c. Graphing software d. Database management software
A. Project management software
Digital database made up of tables that are related that have the option of using SQL to query and maintain the database. a. relational databases b. tables c. data governance d. business intelligence (BI) e. database management systems (DMS)
A. Relational databases
The same manager would also like to know the total commission paid to salespeople earning 60% or more of their pay in commission. Which function should the manager use to sum the commissions paid to salespeople that earn 60% or more of their pay from commission? a. SUMIF(D3:D16,">60%",C3:C16) b. SUMIF(D3:D16,>60%,C3:C16) c. SUM(D3:D16,">60%",C3:C16) d. SUM(D3:D16,>60%,C3:C16
A. SUMIF(D3:D16,">60%",C3:C16)
Which strategy includes purchasing paid advertisements that appear at the top of results pages in a web browser? a. Search engine marketing b. Landing page strategy c. Content marketing d. Search engine optimization
A. Search engine marketing
This allows for risk management to be able to audit and mitigate the risks involved in the business. a. security of IT systems b. Impact to the public image of the business c. speed of products to market d. IT security investments
A. Security of IT systems
While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers? a. Server b. Client c. Router d. Hub
A. Server
How will the maintenance of employee workstations be simplified by creating an office network? a. Software updates for client computers can be done at once from the server. b. Client computers will no longer need network interface cards. c. Software on client computers will have additional features. d. Client computers will no longer need application software.
A. Software updates for client computers can be done at once from the server.
This is installed covertly on a computer or takes control of the systems without the users knowledge. a. spyware b. adware c. malware d. virus
A. Spyware
Protecting the hardware that the database resides on. a. system level security b. data level security c. user level security
A. System level security
Which level of security is required to protect the hardware and communications equipment that support a database? a. system level security b. user level security c. data level security d. data center security
A. System level security
Type of software that supports computers basic functions, scheduling tasks, executing applications such as MS Windows, macOS-Apple, Unix, Linux. a. system software b. utility software c. application software d. CPU
A. System software
Also known as "piggybacking," involves an attacker seeking entry to a restricted area which lack the proper authentication. Example, using a badge to access building and someone walks in behind you. a. tailgating b. shoulder surfing c. computer worm d. denial of service
A. Tailgating
Which part of a computer executes the computations required by the software? a. The central processing unit b. The motherboard c. The operating system d. The random-access memory
A. The central processing unit (CPU)
A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS? a. The business intelligence (BI) system b. The customer relationship management system (CRM) c. The transaction processing system (TPS) d. The cloud web hosting (CWH) system
A. The transaction processing system (TPS)
_____ tries to catalog phrases of an organization's customer feedback into relevant topics. a. topic analytics b. summary analytics c. data mining d. text data mining
A. Topic analytics
____ is used to develop scenarios for businesses to evaluate. Day-to-day transactions, such as checking out at Walmart. a. transaction processing systems (TPS) b. decision support systems (DSS) c. executive information systems (EIS) d. management information systems (MIS)
A. Transaction processing systems (TPS)
Which part of the ETL process does this describe: normalizing data after it is pulled. Normalizing the data means your data are typically organized into the fields and records of a relational database. Normalization also reduces redundancy in storing data, which saves space and helps ensure that data are consistent. a. transform b. load c. extract d. not part of ETL
A. Transform
Hardware technology for attaching peripheral devices to a computer. a. USB b. RAM c. CPU d. NIC
A. USB - Universal Serial Bus Connection
This type of software performs a particular function in the background with little or no interaction with the user, it is essential to the functioning of the computer. a. utility software b. application software c. system software d. both a and c
A. Utility software
This type of software works on an exception basis. a. utility software b. application software c. system software d. all of the above
A. Utility software
Virus protection software and printer drivers are examples of what type of software? a. utility software b. system software c. application software d. none of the above
A. Utility software
This one of the four Vs of big data indicates that data come from both structured and unstructured area in different forms. If it is coming from something structured into big data, somebody is accessing that somehow. a. variety b. veracity c. velocity d. volume
A. Variety
How many data are presented that need to be stored or processed over a given time period. Streaming applications such as Amazon Web Services are an example of this. Which one of the four Vs does this define? a. velocity b. volume c. veracity d. variety
A. Velocity
They prepare, plan and implement web-based software applications. Frequently look a older legacy systems (old mainframe systems) and convert it to some kind of browser based to make it easier to use. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator
A. Web developer
Which type of data are referred to as decayed? a. data that have become outdated b. data that are not properly loaded c. data that have been altered d. data that do not fit a schema
A. data that have become outdated
Measure and provides financial information about an organization, primarily for its decision makers, investors and taxing authorities.
Accounting
What are the five interrelated business departments that are supported by IT?
Accounting, Marketing, HR, R&D, Productions
Which type of computer runs a network operating system (NOS)? a. a mainframe computer b. a server c. a router d. a client computer on a network
B. A server
What Excel formula adds all the values selected in the argument. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)
B. =SUM(number1,[nuber2],.....)
Self-contained program that serves a particular purpose, such as as calendar, a mapping program, or a game.
Application , "app"
Self-contained program that serves a particular purpose, such as a calendar, a mapping program, or a game.
Application software "app"
A manager has a data set that contains the profits of 556 stores in the United States. In the data set, along with each store location, there is a column that specifies the regions of the United States that each location belongs to: East, South, Midwest, Mountain, and Pacific. Which function should the manager use to find the average profits of stores in each region? a. MAX b. AVERAGEIF c. AVERAGE d. IF
B. AVERAGEIF
The IT department of a company has been asked to provide systems for financial and investment management. Which business department has the greatest need for this type of system? a. Sales b. Accounting c. Operations d. Marketing
B. Accounting
This is irritating by not typically malicious. Causes ads to automatically display on the computer. a. malware b. adware c. virus d. spyware
B. Adware
ndothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed. Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week? a. An intranet at Endothon that the manufacturer can access b. An extranet that provides the manufacturer access to data at Endothon c. An intranet at the manufacturer that Endothon can access d. An extranet that provides Endothon access to data from the manufacturer
B. An extranet that provides the manufacturer access to data at Endothon
MS Excel or Adobe Photoshop are examples of what type of software? a. utility software b. application software c. system software d. none of the above
B. Application
Research that is focused on developing a commercial product or process to meet customer or industry requirements and needs. This is a methodology based research and heavily uses IT to determine possibilities. a. basic research b. applied research c. information systems d. development research
B. Applied research
This attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics
B. Business analytics
An analyst uses software to analyze data in the company's data warehouse and produce information to guide the organization. The information is presented in clearly understandable charts and graphs on a dashboard and is used to inform decisions in the organization. Which type of software is this analyst using? a. business productivity software b. business intelligence software c. data governance software d. database management software
B. Business intelligence software
Known as the brain of the computer and the director of the computer. a. RAM b. CPU c. motherboard d. disk drive
B. CPU
All of the data sits on a database server, so that database server can be connected to your computers and facilitates the sharing of the information whether the user is on the LAN or at home on the internet. Security is even more important when utilizing this. a. Business Intelligence Network (BIN) b. Cloud database c. I-Cloud database d. Business Cloud Database (BCDB)
B. Cloud database
Informally called coders, they produce both system and application software by writing lines of programming instructions for a computer to follow. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator
B. Computer programmer
A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server? a. Computer Support Specialist b. Computer System Administrator c. Computer System Analyst d. Computer Programmer
B. Computer system admininstrator
Must have great communication skills, they are highly trained with technology backgrounds and bridge the gap between IT and the rest of the organization. Ex. works with PM, talks to customer to gather requirements. They write the requirements in UML and pass to IT. Conduit between business and IT. a. IT architects b. Computer systems analysts c. Computer support specialists d. Computer systems administrators
B. Computer systems analysts
An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author. Which type of law prohibits this kind of unethical behavior? a. Trade secret b. Copyright c. Trademark d. Patent
B. Copyright
A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer initial copyright protection of these marketing images? a. Publishing the marketing images b. Creating the marketing images c. Declaring the images to be copyrighted d. Registering the images with a copyright office
B. Creating the marketing images
One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data. What is the term that describes this effort? a. Master data management b. Data governance c. Database management d. Schema design
B. Data governance
Businesses implement processes to protect the actual data from getting stolen or tampered with. a. system level security b. data level security c. user level security
B. Data level security
This is extra notes about the definition of a field, its data and its use. Known as the "rescue" in the data management process. a. consistent data hygiene process b. data mapping c. segmenting data d. data governance
B. Data mapping
The examination of huge sets of data to find patterns and connections and identify outliers is known as what? a. data integrity b. data mining c. data classification d. software programming
B. Data mining (aka data discovery)
Data that are queried from tables with tools to assist with business knowledge is known as what? a. data inputs b. data outputs c. data storage d. data congruity
B. Data outputs
Small tags used to label products for identification and have the product's information transmitted through radio waves. a. IoT b. RFID c. AI d. IT
B. RFID
The software to create databases. "Systems have many parts" when related to IT terms. Ex. its the data warehouse is sits in, software putting data into different tables, the query, etc. a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables
B. Database management systems (DBMS)
Information systems that are interactive software-based systems designed to assist decision makers. Higher level decision-making, not day-to-day, but looking at inventory on the way, how do I staff to unload trucks, do I need increase staffing, etc.? a. transaction processing systems (TPS) b. decision support systems (DSS) c. executive information systems (EIS) d. management information systems (MIS)
B. Decision based support systems (DSS)
The baseline that other types of analytics are build upon. Defines past data you already have that can be grouped into significant pieces. a. decision analytics b. descriptive analytics c. business analytics d. predictive analytics
B. Descriptive analytics
The company hopes to use cloud-based storage to allow employees to share all their work-related files. What is a common cloud-based storage solution for the company? Photoshop a. Excel b. DropBox c. PowerPoint d. Next
B. DropBox
After determining where the data reside, you can start this part of the ETL process. The data are often coming from CRMs or ERP systems. a. load b. extract c. transform
B. Extract
Examples include google docs, MS Sharepoint, Teams a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software
B. File sharing systems
The business in the scenario frequently works with sensitive data, and it is important to ensure that the network is highly secure. Which network component is specifically designed to prevent unauthorized users from accessing the network? a. Network interface card (NIC) b. Firewall c. Switch d. MAC address
B. Firewall
This is a combination of specialized hardware and software that ensures only authorized personnel can access an organizations intranet. a. computer security b. firewall c. knowledge management systems d. cloud based infrastructure
B. Firewall
A field in a database table that provides a link between two tables in a rational database. a. SQL trilogy b. foreign key c. schema d. primary key
B. Foreign key
What is the purpose of a universal serial bus (USB) on a laptop or desktop computer? a. It provides a wired ethernet connection to the network. b. It allows the computer to connect peripheral devices. c. It serves as an internal transmission bus between components within the computer. d. It allows for universal data transmission to various types of wireless networks.
B. It allows the computer to connect to peripheral devices.
What makes IT unique compared to other departments in businesses? a. The IT department is given monitoring authority over other departments. b. The IT department provides services and support to the other departments. c. The IT department reports directly to the managers of other departments. d. The IT department is funded through the budgets of the other departments.
B. It provides services and support
By segmenting data in a data management system, a business achieves a significant advantage over non-segmentation. What is that advantage? a. It makes SQL easier. b. It targets the right customers. c. It keeps data valid. d. It increases return on investment (ROI).
B. It targets the right customers
This is a collaborative system that organizes, creates and distributes the organization's collective knowledge to its employees. a. intranet b. knowledge management systems (KMS) c. cloud based infrastructure d. cloud service provider (CSP)
B. Knowledge management systems (KMS)
After data are normalized, it is ready to finally be transferred into the data warehouse or DataMart. This is which part of the ETL process? a. transform b. load c. extract d. not part of ETL
B. Load
This type of network connects two or more LANs or CANs together within boundary of town or city. a. peer-to-peer (P2P) b. metropolitan area network (MAN) c. wide area network (WAN) d. both a and c
B. Metropolitan area network (MAN)
Which software feature could help address the problem described in the scenario? a. Salary management b. Milestone tracking c. Available memory d. Head count analysis
B. Milestone tracking
Which software feature could help address the problem described in the scenario? a. Salary management b. Milestone tracking c. Head count analysis d. Available memory
B. Milestone tracking
Which type of device is an ethernet card? a. Network operating system (NOS) b. Network interface controller (NIC) c. Network server hardware d. Network firewall hardware
B. Network interface controller (NIC)
Which file format is suitable to use when sharing a legal contract that requires a digital signature? a. DOCX b. PDF c. HTML d. XML
B. PDF
What is the main financial benefit of using cloud web services? a. Reduce the number of IT staff b. Pay for specific services as needed c. Pay for software and hardware separately d. Reduce the number of IT products used
B. Pay for specific services as needed
The fraudulent practice of sending emails to be from supposedly reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. a. pharming b. phishing c. internet fraud d. shoulder surfing
B. Phishing
Using new and historical data to forecast activity, behavior and trends is an example of that type of data management? a. online analytical processing (OLAP) b. predictive analytics c. data mining d. big data analytics
B. Predictive analytics
Which type of reporting will provide Jack and William with the right information for making strategic decisions? a. Management reporting b. Predictive reporting c. Transaction reporting d. Executive reporting
B. Predictive reporting
The advertisement of products and services, as well as publicity is which one of the 4Ps of marketing? a. pricing b. promotion c. placement d. product
B. Promotion
Which approach facilitates communication when a business has employees that are in different locations and telecommute for work? a. Peer-to-peer communication b. Real-time communication c. Offline communication d. Face-to-face communication
B. Real-time communication
An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law. Which law should the IT manager become familiar with? a. Fair Labor Standards Act b. Sarbanes-Oxley Act c. Santini-Burton Act d. Freedom of Information Act
B. Sarbanes-Oxley Act (SOX)
Defines the tables, fields and constraints, keys and integrity of the database. "blueprint of the database" a. primary key b. schema c. foreign key
B. Schema
A component of search engine marketing. SEO is organic results and not paid advertisements. a. the 4Ps of marketing b. search engine optimization (SEO) c. search engine marketing (SEM) d. GAAP analysis
B. Search engine optimization (SEO)
This is paramount at data centers and investments in backup systems are made to protect assets. A large Google data center like the one in Dallas or Oregon, uses more electricity than a small city. a. data centers b. security c. BI housing d. none of the above
B. Security
Refers to the act of obtaining personal or private information through direct observation, can be done with a camera such as at a gas station watching you put your ATM code in. a. tailgating b. shoulder surfing c. dumpster diving d. phishing
B. Shoulder surfing
This type of site allows individuals to connect with others who have similar interests and backgrounds, such as families, hobbies, educational studies, and even products and brands. The main platforms are Facebook, Twitter, and Instagram. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging
B. Social networking
This type of social media allow a user to post links and other information regarding any topic, usually controlled by a forum. a. forums and blogs b. social news c. social networking d. microblogging
B. Social news
Microsoft 365 is an example of what? a. software b. software suite c. operating system d. none of the above
B. Software suite
The most common of all topologies, nodes that radiate around a central node. This is known as what topology? (Taking one laptop / server off does not impact the rest). a. network topology b. star topology c. ring topology d. bus topology
B. Star topology (shaped like a star)
_____ resides in fixed formats. This data is typically well labeled and often with traditional fields and records of common data tables. a. big data b. structured data c. unstructured data d. semi-structured data e. data mining
B. Structured data
This type of data is is typically well-labeled, often with traditional fields and records common to data tables. a. semi-structured data b. structured data c. unstructured data d. flexible data
B. Structured data (aka normalized data)
Microsoft Windows is an example of what type of software? a. utility software b. system software c. application software d. all of the above
B. System software
A business analyst wants to use the social media data to create and present business intelligence. She will create visualizations that will be used by the executive team. Which tool is appropriate for creating and presenting this business intelligence? a. Hadoop b. Tableau c. Data mining d. Data mart
B. Tableau
Consist of records (rows) separated by fields (columns) that can be queried (questioned) to produce subsets of information. a. relational databases b. tables c. data governance d. business intelligence (BI) e. database management systems (DMS)
B. Tables
Where does IoT data collection begin? a. The database b. The edge c. The cloud d. The internet
B. The edge
William and Jack have a web page, but it does not receive many visitors. How can they make their web page more visible to those who may be looking for a motorcycle repair shop? a. Email web page links to their customers. b. Use search engine optimization. c. Place marketing advertisements on web pages. d. Put the web address on all documents.
B. Use search engine optimization
What is the main reason marketing return on investment (ROI) is easier to measure with social media marketing than with traditional marketing? a. User behavior is highly predictable in social media. b. User behavior can be tracked in social media. c. Social media users often submit product reviews. d. Social media surveys provide customer feedback.
B. User behavior can be tracked in social media
Examples of this are logon IDs and passwords. a. data level security b. user level security c. system level security d. BI security
B. User level security
Type of software that performs a particular function in the background, such as virus protections software and printer drivers, things that you need for your computer to work - like utilities in your home. a. system software b. utility software c. application software d. CPU
B. Utility software
Which attribute of big data relates to whether the data are structured or unstructured? a. velocity b. variety c. veracity d. volume
B. Variety
This one of the four Vs is the "trustworthiness" of the data. Do the data represent what you believe they should? And, are there discrepancies within the data that must be flushed out and "scrubbed" to make the data worthwhile and valuable? a. variety b. veracity c. velocity d. volume
B. Veracity
Which one of the four Vs of Big Data is the main characteristic of big data is that it is big and the remarkable volume it takes just to hold and manage it can be an effort in itself. The total amount is growing exponentially year over year. a. velocity b. volume c. veracity d. variety
B. Volume
Concerned with data policies, data procedures, and standards to govern business-critical data. a. relational databases b. tables c. data governance d. business intelligence (BI) e. database management systems (DMS)
C. Data governance
Wildland fires are often difficult to map and assess while they are active, and this creates difficulties for wildland firefighters. Which IoT solution can be used to address this problem? a. Satellite mapping systems with real-time updates b. Wi-Fi-connected drones with GPS and camera c. Airplanes that use heat sensors and GPS to map fires d. Wi-Fi headsets that facilitate real-time communication
B. Wi-fi connected drones with GPS and camera
This type of network encompasses a large geographical area and connects LANs, CANs, MANs, together. Often rely on telephone company's transmission facilities to connect. a. peer-to-peer (P2P) b. wide area network (WAN) c. all of the above d. none of the above
B. Wide area network (WAN)
Which three benefits does a customer relationship management system (CRM) provide to a business? Choose 3 answers. a. It is a process for returns and customer service. b. It provides communication tools and channels. c. It is a primary sales channel to existing customers. d. It facilitates marketing strategies to increase business. e. It is a process to capture information about the business's customers. f. It is an order processing system.
B. provides communication tools D. facilitates marketing strategies E. captures customer information
Data that come from everywhere. Smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources - to be sifted for patterns and trends.
Big Data
The underlying technology that powers Bitcoin and other cryptocurrencies - list of records (blcoks) linked using cryptography (has, timestamp, transaction data).
Blockchain
This network is built into mobile phones so they can communicate with other devices within approximately 30 feet.
Bluetooth network
They install and perform minor repairs to hardware such as, trouble- shooting. They make sure peripheral equipment like printers work properly. Commonly referred to as "help desk." (Below the administrator in the hierarchy.) a. IT architects b. Computer systems analysts c. Computer support specialists d. Computer systems administrators
C. Computer support specialists
What are the three elements that decisions support systems need for accurate decision-making?
Business intelligence, data analytics, data management capabilities
A manager has a data set that contains salespeople's commissions for the last quarter. In the data set, each salesperson's commission is listed along with the percent of their pay that is made up of commission money (column D). Which function should the manager use to count the number of salespeople that earn 50% or more of their pay from commission? a. =COUNTIF(D3:D16,>=50%) b. =COUNT(D3:D16,">=50%") c. =COUNTIF(D3:D16,">=50%") d. =COUNT(D3:D16,>50%)
C. =COUNTIF(D3:D16,">=50%")
Finds the minimum value of all the values selected in the argument. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)
C. =MIN(number1,[number2],...)
A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated? a. A digital signature b. A MAC address c. A password d. An encryption key
C. A password
Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail? a. A star topology b. A mesh topology c. A ring topology d. A linear bus topology
C. A ring topology
Type of software that is chosen by the end user to do one thing, such as a specific task, such as MS Word, MS Excel apps on phones, pictures, calendars, internal customer service workflow and other internal systems. a. system software b. utility software c. application software d. CPU
C. Application software
What are the three categories of software?
C. Application, system, utility
William and Jack are motorcyclists. They ride to work each day and own a motorcycle repair shop. They started their business fixing friends' motorcycles, and before long they found they had more work than they could handle. Customers began to ask for services such as a website to buy parts and accessories and information on safety and maintenance. William and Jack believe they could expand their business and increase their revenue by adding these services and selling used motorcycles. To make this possible, they need to install and gain expertise in the use of IT. In addition, they have ideas about converting gas-powered motorcycles to electric motorcycles to differentiate their shop from other shops. This would necessitate the collection of new data and connection with additional suppliers and systems. IT will be key to the growth of their company. Which type of research should William and Jack do to understand the electric motorcycles needed to meet customer and industry requirements and needs? a. development research b. basic research c. applied research d. business intelligence research
C. Applied research
Data that comes from everywhere! Examples: smartphone metadata, internet usage records, social media activity, computer usage records, and other data sources - to be sifted for patterns and trends. a. structured data b. data management c. big data d. software
C. Big data
Attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage. a. decision analytics b. descriptive analytics c. business analytics d. predictive analytics
C. Business analytics
What is a key way that social media marketing has simplified the calculation of return on investment (ROI) in marketing? a. By providing companies with the opportunity to easily solicit customer feedback and interaction b. By providing companies with transparent pricing on all advertising offerings c. By allowing companies to track which sales can be connected directly to a specific advertisement d. By allowing companies to utilize user-generated content as an advertising tool
C. By allowing companies to track which sales can be connected directly to a specific advertisement
This role is a board-level head of an information technology department within a business organization, reports to the CEO or COO. They essentially runs business internal IT operations, makes tactical business decisions on IT for the organization. a. Chief Technology Officer (CTO) b. IT Manager c. Chief Information Officer (CIO) d. Chief Security Officer (CSO)
C. Chief Information Officer
This is on demand cloud computing (ODC) is platforms for storage software and data backup that resides in the cloud. a. intranet b. knowledge management systems (KMS) c. cloud based infrastructure d. cloud service provider (CSP)
C. Cloud based infrastructure
A company decides to turn its networks and databases over to a third party to manage and to provide access. What term describes the specific solution used by this company? a. Relational database b. Managed database c. Cloud database d. Distributed database
C. Cloud database
Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory? a. Object embedding b. Object linking c. Cut and paste d. File transfer
C. Cut and paste
________ is concerned with data policies, data procedures, and standards to govern business-critical data a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables
C. Data governance
What is the major function of a computer operating system? a. Application program management b. Computer resource management c. Data management d. Network management
C. Data management
Reading and sorting through a large amount of data to look for patterns, trends, and relationships to help predict future trends is what type of data management? "Digging for data" a. online analytical processing (OLAP) b. predictive analytics c. data mining d. big data analytics
C. Data mining
What is the distinguishing feature that differentiates data from information? a. Data that have been recorded in a computer become information. b. Data that have been structured become information. c. Data that have been given context become information. d. Data that have been verified for correctness become information.
C. Data that have been given context become information
Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts? a. Presentation software b. Spreadsheet software c. Database software d. Word processor software
C. Database software
This is the baseline that other types of analytics are built upon; defines past data you already have that can be grouped into significant pieces. a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics
C. Descriptive analytics
This is a device that allows a computer to read from and write on computer disks. a. keyboard and mouse b. motherboard c. disk drive d. peripheral devices
C. Disk drive
Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business? a. Systems analyst b. IT professional c. End-users d. Operator
C. End-users
Information gathered from sources internally and externally for strategic decisions. Example: what are the high demand months, where are sales happening, etc. as well as external competition or market share. Where should I open / close stores, etc. a. transaction processing systems (TPS) b. decision support systems (DSS) c. executive information systems (EIS) d. management information systems (MIS)
C. Executive information systems (EIS)
Which part of the ETL process does this describe: once you have determined where your data reside, you can initiate this process. The data are often ____ from customer relationship management (CRM) or enterprise resource planning (ERP) systems. a. transform b. load c. extract d. not part of ETL
C. Extract
Which kind of system should be created to specifically help a company collect and distribute important electronic documents via a computer network as PDF files? a. Cloud database system b. Project management system c. File-sharing system d. Knowledge management system
C. File-sharing system
A field that provides a link between two tables in a relational database. a. primary key b. schema c. foreign key
C. Foreign key
This type of social media allows users to correspond with others in a community available for all registered users to read. a. social review sites b. microblogging c. forums and blogs d. social news
C. Forums and blogs
Examples include stock market management software to manage your portfolio, group teaching software such as Adobe Connect, desktop publishing and webinar software. a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software
C. Function-specific software
They use software tools such as systems development life cycle (SDLC) and Unified Modeling Language (UML) to create and alter computer applications through step-by-step approach. IT Portfolio Manager b. IT Manager c. IT Project Manager d. IT Chief Designer
C. IT Project Manager
How have online web development tools benefitted small businesses? a. Simplified programming education for business owners b. Increased search engine rankings for small businesses c. Increased user control of the organization's website d. Simplified HTML coding on business websites
C. Increased user control over the organization's website
Similar to collaboration software, _____ plays a key role in R&D. Global enterprises often have R&D departmental meetings using video conferencing, webcasts, and "whiteboard" software that allow participation from people spread across the world. a. basic research b. applied research c. information systems d. development research
C. Information systems
What term refers to the study, design, development, implementation, support, and management of computer-based information systems? a. Computer Information Systems b. Technology Studies c. Information Technology d. Software Governance
C. Information technology
William has a fleet of 60 trucks that deliver products within 100 miles of his distribution center. He would like to know where his trucks are at all times. How can he efficiently manage this? a. Use radio signals to track location b. Use cell phone tower geolocation c. Install GPS tracking on his trucks d. Install RFID tags in his vehicles
C. Install GPS tracking on his trucks
William manages the repair department of the business and is frustrated with the process of acquiring parts. Which IT methodology can William use to help manage this process? a. Connect suppliers with the company's accounting system. b. Install a database to manage parts inventory. c. Install an extranet to the company's suppliers. d. Create an intranet connection for the company's suppliers.
C. Install an extranet to the company's suppliers
Use of the internet to connect digital devices, widely used technologies, and control systems in order to more fully automate many aspects of life is referred to as ___. a. modern artificial intelligence (AI) b. national network c. internet of things (IoT) d. all of the above
C. Internet of things (IoT)
The use of paid advertisements and organic search results that appear on a search engine results page refers to what? a. the 4Ps of marketing b. search engine optimization (SEO) c. search engine marketing (SEM) d. GAAP analysis
C. Search engine marketing
Freedom Rock Bicycles is considering adopting a cloud-database system. What is the primary advantage of a cloud database? a. It is inherently secure because it is stored offsite. b. It requires no software installed on client computers. c. It can be accessed from anywhere there is an internet connection. d. Database management is not required by the company.
C. It can be accessed from anywhere there is an internet connection
How does a Gantt chart facilitate project management? a. It helps calculate the projected and actual costs of a project. b. It graphically shows the organization of a project team. c. It identifies and sequences the tasks of a project. d. It maps the flow of communication and decisions for a project
C. It identifies and sequences the tasks of a project
What is the purpose of a dashboard in business intelligence (BI) software? a. It is a user tool for inputting queries into the software. b. It is a graphical display of raw data to assist in data consolidation. c. It is a visual presentation of graphs, charts, and diagrams. d. It is a graphical user interface for controlling the execution of the software.
C. It is a visual presentation of graphs, charts, and diagrams
How does a knowledge management system (KMS) help a company? a. It creates rules for sharing company knowledge. b. It evaluates company knowledge for decision-making. c. It provides access to collective company knowledge. d. It generates knowledge from outside data.
C. It provides access to collective company knowledge
What is the purpose of the primary key in a database? a. It is the record number of each record in a table. b. It uniquely identifies the tables in a database. c. It uniquely identifies the records in a specific table. d. It is the primary encryption key for a secure database.
C. It uniquely identifies records in a specific table
Which valuable business intelligence (BI) can Freedom Rock Bicycles acquire from the database that directly relates to overall revenue and profitability based on this scenario? a. Knowing the manufacturing cost of each product b. Knowing who is the best salesperson c. Knowing which products sell the best in each region d. Knowing the sales price of each product
C. Knowing which products sell the best in each region
A small business has a single network that allows every employee to connect through a central server when they are in the company's main office. What type of network is the business using? a. Peer-to-peer Network (P2P) b. Campus Area Network (CAN) c. Local area network (LAN) d. Wide Area Network (WAN)
C. Local area network (LAN)
What is the final step in the deployment and use of an app? a. Market the app using focused marketing to reach the desired audience b. Track the technical performance and user reviews of the app c. Maintain and upgrade the app based on use and user feedback d. Launch the app in the app stores for all applicable platforms
C. Maintain and upgrade the app based on use and user feedback
These types of social media websites provide a foundation for sharing both video and still images. Examples: YouTube, Pinterest, Vimeo. a. social review sites b. social networking c. media sharing d. social news
C. Media sharing
Main circuit board, where CPU and the circuits sit. a. RAM b. USB c. motherboard d. NIC
C. Motherboard
This connects a computer to a network. a. CPU b. LAN c. NIC d. UBS
C. NIC - Network Interface Card
Freedom Rock Bicycles found that it has multiple records due to multiple sales to the same individual. This has caused access problems when looking for specific customers. What can Freedom Rock Bicycles do to alleviate this problem? a. Extract the data b. Scrub the database c. Normalize the database d. Load the data
C. Normalize the database
A method of sharing information and data are called ______ which is proprietary software developed by MS that allows embedded and linking to documents. a. operating systems b. software suite c. object linking and embedding (OLE) d. all of the above
C. Object linking and embedding (OLE)
Freedom Rock Bicycles has installed a new database to keep track of sales by region, salesperson, product, and sales prices, among other items, to keep information on business processes. After installation, Freedom Rock Bicycles discovered additional benefits of the information accumulated in the database and how the information can improve the business profitability and future plans. Freedom Rock Bicycles found that daily reports could be run using SQL to indicate product and parts inventory and sales for the day. Which approach can be used to retrieve this information efficiently? a. Data mining b. Business intelligence (BI) c. Online analytical processing (OLAP) d. Data analytics
C. Online analytical processing (OLAP)
How a product or service is delivered to a customer. How, where, and to whom a product is delivered describes which of the 4 Ps of marketing? a. pricing b. promotion c. placement d. product
C. Placement
A company uses data on its past call volumes to determine call center staffing. Which type of reporting should the company utilize? a. Strategic reporting b. Financial reporting c. Predictive reporting d. Executive reporting
C. Predictive reporting
William and Jack believe that their large selection of rare parts and motorcycles should be the main focus of messaging to customers. Which of the four Ps of marketing should they focus on when they analyze customer needs and customer support? a. Promotion b. Pricing c. Products d. Placement
C. Products
What is the process of normalization of a database? a. Using "load" to place data in the data warehouse b. Improving database performance c. Removing redundancies within the database d. Creating the schema of the database
C. Removing redundancies within the database
Each node (computer) is connected to another with the first and last computer, data is transmitted in a circular manner. (Not commonly used anymore because if you take one laptop / server offline they all break down) a. network topology b. star topology c. ring topology d. bus topology
C. Ring topology (shaped like a ring)
The organization or layout of a database that defines the tables, fields, and constraints, keys and integrity of the database. It is the reference or blueprint of the database. a. SQL trilogy b. foreign key c. schema d. primary key
C. Schema
These sites allow a user to post links and other information regarding any topic, usually controlled by a forum. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging
C. Social news
The advantages of IT collaboration in business initiatives cannot be measured but are obvious to all involved. a. security of IT systems b. Impact to the public image of the business c. speed of products to market d. IT security investments
C. Speed of products to market
Which level of management gets the most detailed reports directly from the transaction processing system? a. Executive b. Managers c. Supervisors d. Laborers
C. Supervisors
IoT devices that track inventories no matter where they are built, shipped, or kept are found primarily in which business unit? a. Manufacturing b. Marketing c. Supply chain d. Operations
C. Supply chain
This refers to protecting the hardware that the database resides on. For example, firewall. a. data level security b. user level security c. system level security d. BI security
C. System level security
Which category of software is Microsoft Office? a. Network software b. Database software c. System software d. Productivity software
C. Systems software
A data analyst wants to search through unstructured data from social media posts to look for useful customer behavior patterns and sentiments. Which type of analytics is appropriate for this task? a. Predictive analytics b. Topic analytics c. Text analytics d. Decision analytics
C. Text analytics
Normalizing data reduces redundancy in storing data, which saves space and helps ensure that data are consistent. Normalizing will typically be organizing into files and records of a relational database. a. load b. extract c. transform
C. Transform
Seemingly harmless when executed, may release a harmful virus or worm. a. spyware b. adware c. trojan horse d. computer worm
C. Trojan horse
This is the most common type of data, it is disorganized and cannot be easily read or processed by a computer because it is not stored in rows and columns like other types of data. a. semi-structured data b. structured data c. unstructured data d. flexible data
C. Unstructured data
_____ is unorganized and cannot be easily read of processed by a computer because it is not stored in rows and columns like more traditional data tables. a. big data b. structured data c. unstructured data d. semi-structured data e. data mining
C. Unstructured data
This one of the four Vs is how many data are presented that need to be stored or processed over a given time period. Streaming applications such as Amazon Web Services are a good example of this. a. variety b. veracity c. velocity d. volume
C. Velocity
This is the "trustworthiness" of the data. Does it represent what you believe it should? Are there discrepancies within the data that must be ferreted out and scrubbed to make data worthwhile and valuable? This defines which one of the four Vs? a. velocity b. volume c. veracity d. variety
C. Veracity
Definitive right given to the owner of an original work. That original work can be a drawing or painting, a novel, song, poem, or computer program that was created by a person as an original and protects their rights of ownership.
Copyrights - registered with US Copyright Office
Information systems that manage the information on a company's customers, including all interactions with each customer is known as what?
Customer relationship systems (CRM)
Calculates the average of all the values selected in the argument. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)
D. =AVERAGE(number1,[number2],...)
A business organization can increase collaboration if it has a database of its internal reports, articles, documents, policies, and decisions. Which tool helps manage this type of information? a. A business information system b. A collaborative database c. A data warehouse d. A knowledge management system
D. A knowledge management system
A discussion board facilitates communication between geographically dispersed group members. What is the correct term to describe an initial post and its subsequent comments? a. Linked comments b. Linked posts c. A stream d. A thread
D. A thread
Keeping track of where customers and users clink on links on a web page is an example of what type of data management? a. online analytical processing (OLAP) b. predictive analytics c. data mining d. big data analytics
D. Big data analytics
Often these data are not in an easy form to analyze, but there are tools and techniques that make it easier to analyze. For example, keeps track of where customers and users click links on a web page. a. predictive analytics b. business analytics c. descriptive analytics d. big data analytics
D. Big data analytics
Each node is connected to a common linear backbone that had two endpoints. This is known as what type of topology? a. network topology b. star topology c. ring topology d. bus topology
D. Bus topology (shaped like bus)
Endeavors to provide better business strategic decision-making and even claims to predict the future. a. relational databases b. tables c. data governance d. business intelligence (BI) e. database management systems (DMS)
D. Business intelligence
This department uses data to provide historical, current, and predictive analyses for organization. a. data center b. unstructured data c. structured data d. business intelligence
D. Business intelligence (BI)
The "Count" column (column G) is intended to show the number of cities (column B) in each region (column C). Which functions and input variables should be used to return the correct value for cell G3? a. =COUNTIF(D$3:D$21,F3) b. =COUNTIF(F$3:F$7,D3) c. =COUNTIF(F$3:F$7,C3) d. =COUNTIF(C$3:C$21,F3)
D. COUNTIF(C$3:C$21,F3)
What hardware component performs most of the calculations for a computer? a. hard drive b. motherboard c. operating system d. CPU
D. CPU
This type of computer network connects two or more LANs, like a university campus. a. wide area network (WAN) b. metropolitan area network (MAN) c. peer-to-peer (P2P) d. campus area network (CAN)
D. Campus area network (CAN)
An executive person who is responsible for overall corporate and IT security, they oversee physical security, safety of employees, facilities, corporate assets as well as IT security. Follows legal mandates for security of data - such as social security numbers, personal information, credit card, etc. If there is a breach, this is the accountable. a. Chief Technology Officer (CTO) b. IT Manager c. Chief Information Officer (CIO) d. Chief Security Officer (CSO)
D. Chief Security Officer (CSO)
Servicers that provide cloud infrastructure and services, such as Amazon, MS, Apple, Google. a. intranet b. knowledge management systems (KMS) c. cloud based infrastructure d. cloud service provider (CSP)
D. Cloud service providers (CSPs)
This allows the computer systems to communicate with each other no matter distance of locations, includes routers, switches, and communication links. a. radio waves b. nodes c. wires d. computer networks
D. Computer networks
This is concerned with risk management, confidentiality, integrity, and availability in a computer system. a. client-server relationship b. cloud based infrastructure c. cloud service provider d. computer security
D. Computer security
They are responsible for setting up larger computer assets and maintaining them. Any changes to the computer goes through them. They are responsible to maintain and make sure everything is still compliant and that they have developed a disaster plan. Also known as system administrators or Sys Admins. a. IT architects b. Computer systems analysts c. Computer support specialists d. Computer systems administrators
D. Computer systems administrators
These are text files that stay on the client computer so the next time the client visits the website information such as user ID and password are automatically filled. Can be tracked and compromise your privacy. a. spyware b. malware c. adware d. cookies
D. Cookies
This refers to policies and procedures that are established that define the program, such as who has access, who has update capabilities, etc. a. consistent data hygiene process b. data mapping c. segmenting data d. data governance
D. Data governance
Which term refers to managing the availability, integrity, and security of an organization's data to ensure that the data remain high quality and valid? a. Data scrubbing b. Data normalization c. Data analytics d. Data governance
D. Data governance
_____ can be defined as acquiring data, making sure the data are valid, and then storing and processing the data into usable information for a business. a. big data b. structured data c. unstructured data d. data management processes e. data mining
D. Data management processes
A data analyst wants to use software to look for useful patterns and hidden relationships in this large set of social media data. Which process can be used to look for these patterns and relationships? a. Data scrubbing b. Data normalization c. Data management d. Data mining
D. Data mining
Ahmed works for an online retailer, and one of his responsibilities is to make sure every item in each distribution center can be located quickly. What is the appropriate tool to use for this purpose? a. A knowledge management system (KMS) b. A customer relationship management (CRM) system c. A spreadsheet d. A database
D. Database
This builds on predictive analysis to make decisions about future industries and marketplaces. a. predictive analytics b. business analytics c. descriptive analytics d. decision analytics
D. Decision analytics
Cyber attack to make machine or network disrupt services. a. tailgating b. shoulder surfing c. computer worm d. denial of service
D. Denial of service
The stage of R&D where the findings of the research are utilized for the production of products, including the results of simulations run using IT to develop material requirements and methodologies of production. a. basic research b. applied research c. information systems d. development research
D. Development research
A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse? a. ETL b. Hadoop c. Tableau d. SQL
D. ETL
A database manager is setting up a relational database. The manager creates a field in a table that links to the primary key in a different table in the database. What is this field called? a. function b. schema c. absolute reference d. foreign key
D. Foreign key
The data analyst at Freedom Rock Bicycles wants to link two tables in the database. What is the name of the field in a database table that is used to connect or link two tables together? a. Common key b. Linking key c. Connection key d. Foreign key
D. Foreign key
The internet didn't become widely used until the early 90's when access to these three things became available. a. personal computing devices, operating systems, b. MS Office, AOL, anti-virus software c. personal computing devices, application software, developers d. HTML, HTTP, web browsers
D. HTML, HTTP, web browsers
CPU chip, RAM memory and Motherboard are examples of which of the six components of IT infrastructure? a. software b. processes c. networks d. hardware
D. Hardware
What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards? a. Operating System b. Information Technology c. Software d. Hardware
D. Hardware
Three assets that help a business obtain, sort through, create and store data; manage projects and communicate with other employees and clients; and remain connected to periphery devices needed to facilitate business. a. IT personnel, hardware, software b. LAN, CPU, Motherboards c. networks, utility software, people d. hardware, software, computer networks
D. Hardware, software, computer networks
These investments are designed to thwart hacking of systems that can cause major outages of systems. a. security of IT systems b. Impact to the public image of the business c. speed of products to market d. IT security investments
D. IT security investments
They are responsible for protecting all sensitive information within an organization, also known as cybersecurity analysts. Audit new software, suppliers, interfaces, etc. are tested and safe. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator
D. Information Security Analyst
An additional problem that the consultant identified was that unauthorized users could easily access data on the company's internal network. Which IT professional is responsible for addressing this issue? a. Web developer b. Database administrator c. Computer systems administrator d. Information security analyst
D. Information security analyst
This is broad, it is any term that refers to fraudulent activity in an online setting such as email, media boards, chat rooms, websites etc. a. dumpster diving b. pharming c. phishing d. internet fraud
D. Internet fraud
In today's environment, more and more companies are providing "smart" household items such as lights, doorbells, and refrigerators that can be controlled via applications on consumers' phones or tablets. What is the common term for this type of technology? a. Distributed systems b. Linked devices c. Cloud services d. Internet of Things
D. Internet of Things (IoT)
What is the purpose of a foreign key in a database? a. It is used to link multiple databases together. b. It is a key that connects to the wrong data. c. It is a key that has invalid or decayed data. d. It is used to link two tables together.
D. It is used to link two tables together
Used for input of the computer. a. disk drive b. peripheral devices c. motherboard d. keyboard and mouse
D. Keyboard and mouse
While the business in the scenario is growing, it is still a small business. There are just 25 employees, and they all work in the same location. Which type of network will the business use? a. Metropolitan area network (MAN) b. Campus area network (CAN) c. Wide area network (WAN) d. Local area network (LAN)
D. LAN
This is often used for financial gain, can plant spyware that can monitor other computers actions. a. adware b. trojan horse c. spyware d. malware
D. Malware
The use of internal reports and TPS to make managerial decisions. a. transaction processing systems (TPS). Looking at TPS data to review staffing levels for periods of demand, etc. a. transaction processing system (TPS) b. decision support systems (DSS) c. executive information systems (EIS) d. management information systems (MIS)
D. Management information systems (MIS)
These websites are very familiar, as they provide a foundation for sharing both video and still images. YouTube is the most well-known media sharing website, with Pinterest and Vimeo also in this category. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging
D. Media sharing
In the report, the consultant noted that the company's network is in need of maintenance. Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software? a. Network analyst b. Network installer c. Network programmer d. Network administrator
D. Network administrator
What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software? a. Network engineer b. Network development c. Network architect d. Network administrator
D. Network administrator
_____ is a mapping of a physical network and logical interconnections between nodes (computers - laptops, phones, etc.). It is the way a network is arranged and laid out. a. bus topology b. star topology c. ring topology d. network topology
D. Network topology
Known as the backbone of IT infrastructure, two or more devices that connect. a. nodes b. radio waves c. satellite d. networks
D. Networks
A data analyst is using the ETL process to enter data into the company's relational database. The data contain many redundancies. Which process will the data analyst need to use before loading the extracted data into the database? a. data governance b. topic analysis c. segmentation d. normalization
D. Normalization
The data are full of redundancies, which the data analyst needs to remove. Which process can the data analyst use to remove the redundancies? a. Schema design b. Data governance c. Extraction d. Normalization
D. Normalization
Examples include printers and scanners connect to a computer via USB connections. a. keyboard and mouse b. motherboard c. disk drive d. peripheral devices
D. Peripheral devices
An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent? a. Click fraud b. Keylogging c. Spyware d. Phishing
D. Phishing
Attempts to reveal future patterns in a marketplace, essentially trying to predict the future by looking for data correlations. Ex. Credit report is looking at the past to indicate whether or not you would pay back a car loan. a. decision analytics b. descriptive analytics c. business analytics d. predictive analytics
D. Predictive analytics
A field in a database table that uniquely identifies a record in the table. For example, every student at a university has a unique student ID number. a. SQL trilogy b. foreign key c. schema d. primary key
D. Primary key
The actual goods and services a business produces and how they relate to customers' needs, including warranties, guarantees, and customer support. This is which one of the 4 Ps of marketing? a. pricing b. promotion c. placement d. product
D. Product
A design business has employees based in different parts of the country, with all employees working remotely from home. This allows the business to attract the best expertise, which is a great benefit to the business. One problem, however, is that employees are often waiting for other employees to complete certain tasks before they can complete their own. This lack of coordination causes significant delays in projects. Which type of software is designed specifically to address the coordination problem in the scenario? a. Spreadsheet software b. Database software c. Graphing software d. Project management software
D. Project management software
____ spread themselves attaching to legitimate files and infection websites, emails, can disable systems. a. adware b. trojan horse c. spyware d. virus
D. Virus
This is a digital database mad up of tables that are related to have the option of using SQL to query and maintain the database a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables
D. Relational databases
When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost. What is this metric called? a. Profitability ratio b. Profit and loss c. Cost benefit analysis d. Return on investment
D. Return on investment
This is a mix of two other types of data. a. structured data b. flexible data c. unstructured data d. semi-structured data
D. Semi-structured data
____ can possible be converted to structured data, but not without a lot of work. a. big data b. structured data c. unstructured data d. semi-structured data e. data mining
D. Semi-structured data
While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers? a. Router b. Hub c. Client d. Server
D. Server
One of the most impactful technologies of the twenty-first century is ____. a. IoT b. mobile apps c. wireless networks d. social media
D. Social media
This type of social media allows individuals to connect with others who have similar interests and backgrounds, such as families, hobbies, educational studies, and even products and brands. Examples: Facebook, Twitter, Instagram. a. microblogging b. forums and blogs c. social review sites d. social networking
D. Social networking
This type of social media is designed to provide members with information about locations and experiences. Examples: TripAdvisor, Yelp, etc. a. social news b. microblogging c. forums and blogs d. social review sites
D. Social review sites
A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. How should the IT department resolve the incompatibility issue? a. implement a process that translates data from one software to another b. hold a training on how to use each software product to remove incompatibility c. increase helpdesk support for various software packages d. standardize software throughout the organizaiton.
D. Standardize software throughout the organization
Jack and William want to hire a person to write code to access their database in order to build management reports. Which skill should a successful applicant possess? a. Data administration b. Search engine optimization (SEO) c. Data analytics d. Structured Query Language (SQL)
D. Structured Query Language (SQL)
What is the standard programming language that is used to extract and update data in most relational databases? a. Hypertext markup language (HTML) b. Python c. JavaScript d. Structured Query Language (SQL)
D. Structured Query Language (SQL)
The data warehouse is very costly and time-consuming to manage, and the data analyst notices that the data warehouse only used 20 percent of its capacity during discovery. How can the company reduce the cost and time associated with managing the data warehouse? a. configure the data warehouse with SQL b. process the data with Tableau c. use a relational database d. switch to a data mart
D. Switch to a data mart
The data warehouse is very costly and time-consuming to manage, and the data analyst notices that the data warehouse only used 20 percent of its capacity during discovery. How can the company reduce the cost and time associated with managing the data warehouse? a. Configure the data warehouse with SQL b. Process the data with Tableau c. Use a relational database d. Switch to a data mart
D. Switch to data mart
One of the main tools for data output is a software known as _____, which produces interactive data visualization products focused on business intelligence. a. Oracle b. MySQL c. Microsoft Access d. Tableau e. SQL
D. Tableau
This process hunts through unstructured data to look for useful patterns such as whether their customers on Facebook or Instagram are unsatisfied with the organization's product or services. a. data mining b. summary analytics c. text data mining d. text analytics
D. Text analytics
When using extract, transform, and load (ETL), what is done during the "transform" step? a. The database schema is designed and created. b. The database is queried for relevant data. c. The data are given context and relevance. d. The data are normalized and structured.
D. The data are normalized and structured
A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario? a. The exterior light b. The interior light c. The camera d. The door lock
D. The door lock
What is the definition of the term "best practice?" a. the attainment of a competitive advantage b. the fastest way to complete a required task c. the application of information technology to improve a process d. the most effective way of arriving at a desired outcome
D. The most effective way of arriving at a desired outcome.
What is the purpose of a MAC address? a. To uniquely identify a computer motherboard b. To uniquely identify an internet URL c. To uniquely identify an email client d. To uniquely identify a computer on a network
D. To uniquely identify a computer on a network
Many websites keep track of a user's actions and information. They store much of this information on the user's computer in a private folder on the hard drive. What are these very small files called? a. Tracking packages b. Tracking data c. Tracking URLs d. Tracking cookies
D. Tracking cookies
Which one of the four V's of big data is defined as the main characteristic of big data is that it is big, and the remarkable amount of ____ it takes just to hold and manage it can take quite an effort. Companies like marketers will purchase part of this data, such as location, brand, etc. you may have referenced on social media, and target that consumer with specific ads related to their interests. This is growing exponentially year after year. a. variety b. veracity c. velocity d. volume
D. Volume
Software for input, edit, format, output. a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software
D. Word processing
What are the three levels of security related to IT? a. data level security b. customer identity security c. user level security d. system level security
Data level, User level, System level
Software to create databases.
Database Management Systems (DBMS)
This is the process of searching trash to obtain useful information about a person / business that can later be used for hacking purposes. a. pharming b. phishing c. dumpster diving d. shoulder surfing
Dumpster diving
Finds the maximum value of all the values selected in the argument. a. =COUNT(value1, [value2],...) b. =SUM(number1,[nuber2],.....) c. =MIN(number1,[number2],...) d. =AVERAGE(number1,[number2],...) e. =MAX(number1,[number2],...)
E. =MAX(number1,[number2],...)
Collaboration software, such as MS Teams. a. information repositories b. file sharing systems c. function-specific software d. word processing e. communications software
E. Communications software
This term is the examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships. a. big data b. structured data c. unstructured data d. semi-structured data e. data mining
E. Data mining (AKA data discovery)
They categorize data requirements and create the database entities and models, such as tables, that ensure accurate and smooth-flowing information through a business. They develop the tables based on whatever the Business Intelligence (BI) team wants, or the managers want. They "normalize" the data and pull data from other systems into the database, and know exactly where it's going to go. They are charge of databases, relational databases, mostly the data warehouse and organizations. a. Web developer b. Computer programmer c. Network administrator d. Information security analyst e. Database administrator
E. Database Administrator (DBA)
This allows users to correspond with others in a community forum available for all registered users to read, more focused than forums. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging
E. Forums and blogs
This is a programming language specifically for querying and manipulating relational databases; one of the few languages that works on almost every brand of database. a. Oracle b. MySQL c. Microsoft Access d. Tableau e. SQL
E. SQL
_____ consist of records (rows) separated by fields (columns) that can be queried (questioned) to produce subsets of information. a. business intelligence (BI) b. database management systems (DBMS) c. data governance d. relational databases e. tables
E. Tables
What does ETL stand for?
Extract, Transform, Load
The least known category, it supports short written entries (often with links), which are posted on what are called "walls" to anyone who has subscribed to the account. Twitter is the most well-known in this category. a. social review sites b. social networking c. social news d. media sharing e. forums and blogs f. microblogging
F. Microblogging
A federal law that protects the rights of students' educational records.
FERPA - Family Educational Rights and Privacy Act
True or False: Big data and structured data are the same thing.
False
True or False: Microsoft Project is classified as presentation software.
False
True or False: Written posts extracted from a social media feed are generally classified as structured data.
False
True of False: Lack of data governance is not a problem.
False !!
The accounting rules for preparing, presenting and reporting. Investors can have a standard set of reports regarding a business's well-being.
Generally accepted accounting principles (GAAP)
This is designed to receive signals from an app on a phone and geostationary satellites so taht precise location can be determined, WiFi.
Global positioning systems (GPS)
True or False: Wireless sensors, software, robotics, and computer devices are all what type of devices?
Internet of Things (IoT)
Use of internet to connect digital devices, widely used technologies, and control systems in order to more fully automate many aspects of life is referred to as _____.
Internet of Things (IoT)
This is a private version of the internet within an organization.
Intranet
Established to encourage innovation and technological advances and protect the rights of the inventory. This protects new products, upgrades to existing products and some functional aspects of computer software.
Patents
What are the three parts of structured query language (SQL)?
Primary key, Foreign key and Schema
What are the 4 Ps of marketing?
Products, pricing, promotion, placement
This department takes a creative and systematic approach to evolve a business's original idea and devise new ones. Their goal is to enhance existing products or create new products.
Research and development (R&D)
An accounting industry act passed by the federal government to oversee the accounting practices of a business and industry; makes the CEO accountable for accurate reporting.
SOX - Sarbanes-Oxley act of 2002
What law was enacted to counter fraudulent reporting?
Sarbanes-Oxley Act of 2002 (SOX)
What is the difference between application and system software?
System software requires little if any user intervention and application software is designed to serve the user and carry out any task the user requests such as creating spreadsheets or documents. Users do not turn on systems software but users must start applications, such as Excel or Photoshop.
True of False: Acquiring dat, making sure the data are valid, and then storing and processing the data into usable information for business is known as data management processes.
True
True of False: Circuit boards, chipsets and keyboards are the examples of the physical aspects of business computer hardware.
True
True of False: Data warehouse is where all of your data sits.
True
True of False: Hardware rarely changes during the life of a computer, but certain components can be added to enhance the computer's power and usability.
True
True of False: IT is a core competency in business, regardless of position.
True
True of False: On-demand cloud computing (OCD) platforms can be used to reduce data storage costs.
True
True or False: A challenge of IT systems is that they can capture too much data.
True
True or False: Attitudes toward information technology play a pivotal role in gaining computer competency.
True
What are four examples of IT challenges?
Too much data, too many options, unskilled team members, technical support.
Information that is private or not known outside of the company and if disclosed would cause harm or loss to the corporation. This gives an advantage to a company over its competitors.
Trade Secret
Words, designs, etc. that identify a source of a product. Mickey Mouse and Nike swoosh are examples; highly protected.
Trademarks - registered with US Patent and Trademark Office (USPTO).
True or False: CRMs interface with many internal business centers.
True
What are the four V's of Big Data?
Volume, Variety, Veracity, Velocity
Nodes communicate in three ways: a. LAN, CPU, MAC b. wires, radio waves, satellite c. wires, satellites, networks d. radio waves, cellular towers, fiber optics
Wires (ethernet, coaxial cable, fiber optics) Radio waves (wi-fi, cellular towers) Satellite, such as GPS or satellite radio
This person is in charge of software application development teams that develop, design, program, and test software applications. The manager in charge of all the managers within IT. a. IT Portfolio Manager b. IT Manager c. IT Project Manager d. IT Chief Designer
b. IT Manager
A computer is made up of ___ that uses ____ to make it work.
hardware, software