CSCI 321- McNeese Rhonda Anderson Quizzes 3 and 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules. Select one: A. informed, consent B. consent, informed C. consent, information D. informed, collaborate

a

Trust between companies, customers, partners, and suppliers are the support structure of which of the following? Select one: A. ebusiness B. eharmony C. epolicies D. esoftware

a

What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge, known as? Select one: A. hacker B. elevation of privilege C. worm D. virus

a

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment? Select one: A. epolicies B. emastery C. information systems policy D. technology applied policy

a

What are the first two lines of defense a company should take when addressing security risks? Select one: A. people first, technology second B. innovation first, technology second C. technology first, customers second D. technology first, people second Correct

a

What are the three business functions an MIS infrastructure supports? Select one: A. supports operations, change, and the environment or sustainability B. supports operations, clients, and servers C. supports information, change, and business continuity planning D. supports operations, customers, and ewaste

a

What are the two main objectives associated with data mining? Select one: A. uncovering trends and patterns B. uncovering competitors and market advantages C. uncovering tactics and plans D. uncovering intelligence and unstructured data issues

a

What compiles all of the metadata about the data elements in the data model? Select one: A. data dictionary B. data attribute C. data element D. data entity

a

What has the ability to recover information or systems in the event of catastrophic disasters? Select one: A. disaster recovery B. failback C. recovery D. backup

a

What is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate? Select one: A. network B. client C. server D. software

a

What is a computer dedicated to providing information in response to requests? Select one: A. server B. client C. hardware D. software

a

What is a content creator? Select one: A. the person responsible for creating the original website content B. the person responsible for updating and maintaining website content C. includes data that change based on user action D. includes fixed data incapable of change in the event of a user action

a

What is a hot site? Select one: A. a separate and fully equipped facility where the company can move immediately after a disaster and resume business B. a detailed process for recovering information or a system in the event of a catastrophic disaster C. a separate facility with computer equipment that requires installation and configuration D. a separate facility that does not have any computer equipment but is a place where employees can move after a disaster

a

What is a real-time system? Select one: A. provides real-time information in response to query requests B. encompasses all organization information, and its primary purpose is to support the performing of managerial analysis tasks C. encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks D. provides immediate, up-to-date information

a

What is a warm site? Select one: A. a separate facility with computer equipment that requires installation and configuration C. a separate and fully equipped facility where the company can move immediately after a disaster and resume business D. a detailed process for recovering information or a system in the event of a catastrophic disaster

a

If an organization implemented only one policy, which one would it want to implement? Select one: A. acceptable use policy B. ethical computer use policy C. information privacy policy D. internet use policy

b

In the information technology world, which of the following are examples of ethical issues that a company may have to manage? Select one: A. employees searching other employee's private information without consent B. All of these are correct. C. employees intentionally creating or spreading viruses to confuse IT D. employees copying and distributing company-owned software

b

What are forecasts? Select one: A. a statistical process that finds the way to make a design, system, or decision as effective as possible for example, finding the values of controllable variables that determine maximal productivity or minimal waste B. predictions based on time-series information C. a statistical process for estimating the relationships among variables D. a statement about what will happen or might happen in the future for example, predicting future sales or employee turnover

b

What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time? Select one: A. disaster financial costs B. disaster recovery cost curve C. disaster organizational cost analysis D. disaster recovery improvements

b

What consists of the physical devices associated with a computer system? Select one: A. server B. hardware C. client D. software

b

What displays information graphically so it can be easily understood? Select one: A. business intelligence dashboards B. infographics C. informing D. data visualization

b

What does a business continuity plan typically include? Select one: A. how frequently the system backup is performed B. which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems C. how quickly the system recovery needs to be performed D. where a hot site is located

b

What is a client? Select one: A. the set of instructions the hardware executes to carry out specific tasks B. a computer designed to request information from a server C. a computer dedicated to providing information in response to requests D. consists of the physical devices associated with a computer system

b

What is a cold site? Select one: A. a separate and fully equipped facility where the company can move immediately after a disaster and resume business B. a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C. a detailed process for recovering information or a system in the event of a catastrophic disaster D. a separate facility with computer equipment that requires installation and configuration

b

What is a group of computers on which a hacker has planted zombie programs? Select one: A. time bomb B. zombie farm C. zombie D. pharming attack

b

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution? Select one: A. counterfeit software B. digital rights management C. pirated software D. privacy

b

What is an agile MIS infrastructure? Select one: A. identifies where and how important information, such as customer records, is maintained and secured B. includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals C. identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D. includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

b

What is another term for information cleansing? Select one: A. information mining B. information scrubbing C. information marts D. information scrapping

b

What is ediscovery? Select one: A. a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution B. refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. passed to protect minors from accessing inappropriate material on the Internet D. the unauthorized use, duplication, distribution, or sale of copyrighted software

b

What is erroneous or flawed data? Select one: A. information cleansing B. dirty data C. ETL D. information Scrubbing

b

What is extraction, transformation, and loading? Select one: A. It is a process of entering data, tracking data, and loading it into a database. B. It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse. C. It is a process that is performed at the beginning of the data mining model. D. It is a process that is performed at the end of the data warehouse model prior to putting the information in a cube. Correct

b

In terms of big data what is volume? Select one: A. includes the uncertainty of data, including biases, noise, and abnormalities B. includes the analysis of streaming data as it travels around the Internet C. includes the scale of data D. includes different forms of structured and unstructured data

c

What are rules that help ensure the quality of information? Select one: A. information ethics B. information integrity C. integrity constraints D. information quality

c

What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption? Select one: A. disaster recovery plan B. disaster recovery cost curve C. business continuity planning D. emergency notification system

c

What is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools? Select one: A. advanced analytics B. distributed computing C. big data D. data scientist

c

What is a content editor? Select one: A. the person responsible for creating the original website content B. includes data that change based on user action C. the person responsible for updating and maintaining website content D. includes fixed data incapable of change in the event of a user action

c

A DDoS stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for? Select one: A. distributed data online systems attack B. data denial-of-software attack C. data distribution of systems attack D. distributed denial-of-service attack

d

What are the two different categories for information type? Select one: A. transactional and analysis B. analytical and productive C. analytical and analysis D. transactional and analytical

d

What is an information MIS infrastructure? Select one: A. identifies where and how important information, such as customer records, is maintained and secured B. identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption C. includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals D. includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

a

What is clustering? Select one: A. segments a heterogeneous population of more homogeneous subgroups B. determines which things go together C. assigns records to one of a predefined set of classes D. determines values for an unknown continuous variable behavior or estimated future value

a

What is digital rights management? Select one: A. a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution B. refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. passed to protect minors from accessing inappropriate material on the Internet D. the unauthorized use, duplication, distribution, or sale of copyrighted software

a

What is dynamic information? Select one: A. includes data that change based on user action B. the person responsible for creating the original website content C. includes fixed data incapable of change in the event of a user action D. the person responsible for updating and maintaining website content

a

What is social media analytics? Select one: A. analyzes text flowing across the Internet, including unstructured text from blogs and messages B. analyzes unstructured data associated with websites to identify consumer behavior and website navigation C. analyzes unstructured data to find trends and patterns in words and sentences D. the process of analyzing recorded calls to gather information brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise

a

What is software? Select one: A. the set of instructions the hardware executes to carry out specific tasks B. a computer designed to request information from a server C. a computer dedicated to providing information in response to requests D. consists of the physical devices associated with a computer system

a

What is spyware? Select one: A. a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission B. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network C. experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge D. software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

a

What is static information? Select one: A. includes fixed data incapable of change in the event of a user action B. the person responsible for updating and maintaining website content C. the person responsible for creating the original website content D. includes data that change based on user action

a

What is the primary problem with redundant information? Select one: A. All of these are correct. B. It is difficult to determine which values are the most current. C. It is difficult to determine which values are the most accurate. D. It is often inconsistent.

a

What is web analytics? Select one: A. analyzes unstructured data associated with websites to identify consumer behavior and website navigation B. the process of analyzing recorded calls to gather information brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise C. analyzes unstructured data to find trends and patterns in words and sentences D. analyzes text flowing across the Internet, including unstructured text from blogs and messages

a

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry? Select one: A. ediscovery B. Child Online Protection Act C. digital rights management D. pirated software

a

Which of the choices below represents the definition of information compliance? Select one: A. the act of conforming, acquiescing, or yielding information B. a method or system of government for information management or control C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

a

Which of the following is a problem associated with dirty data? Select one: A. duplicate data B. accurate data C. correct data D. All of these are correct.

a

Which of the following would not be considered part of the accurate characteristic of high-quality information? Select one: A. Is aggregate information in agreement with detailed information? B. Is the email address invalid? C. Do the name and the phone values have the exact same information? D. Is the name spelled correctly?

a

Within the sites that support disaster recovery, a ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. Select one: A. hot site B. cold site C. warm site D. disaster site

a

What is optimization? Select one: A. a statement about what will happen or might happen in the future for example, predicting future sales or employee turnover B. a statistical process that finds the way to make a design, system, or decision as effective as possible for example, finding the values of controllable variables that determine maximal productivity or minimal waste C. a statistical process for estimating the relationships among variables D. predictions based on time-series information

b

What is structured data? Select one: A. data that humans, in interaction with computers, generate B. has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address C. not defined, does not follow a specified format, and is typically freeform text such as emails, Twitter tweets, and text messages D. created by a machine without human intervention

b

What is the primary difference between a worm and a virus? Select one: A. All of these are correct. B. a virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer C. a virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites D. a worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer

b

What is the primary reason a company has a failover system? Select one: A. to use different systems continuously at the same time B. to take down the primary system for maintenance, while the secondary system activates to ensure continuous operations C. to allow employees to work virtually D. All of these are correct.

b

What is the unauthorized use, duplication, distribution, or sale of copyrighted software? Select one: A. ediscovery B. pirated software C. Child Online Protection Act D. digital rights management

b

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? Select one: A. junk mail B. mail bomb C. spam D. intellectual spam

b

Which of the choices below represents the definition of information property? Select one: A. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity B. an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged C. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively D. a method or system of government for information management or control

b

Which of the following definitions represents Internet censorship? Select one: A. an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam B. government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens C. the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner D. a problem that occurs when someone registers purposely misspelled variations of well-known domain names

b

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information? Select one: A. information policies B. information ethics C. information technology D. ethical information

b

Which of the following illustrates the primary concepts of the relational database model? Select one: A. early, after, before, and future B. entities, attributes, keys, and relationships C. ethics, applications, keys, and relationships D. endeavor, aspire, control, and regulate

b

Which of the following is not a common form of data mining analysis? Select one: A. clustering B. division organization C. estimation D. classification

b

Which of the following refers to the extent of detail within the information? Select one: A. knowledge information B. information granularity C. chance information D. information analytics

b

Which of the following represents the different information granularities? Select one: A. document, presentation, spreadsheet, database B. detail, summary, aggregate C. executives, managers, operational employees D. individual, department, enterprise

b

Which of the following represents the two fundamental building blocks that protect organizational information? Select one: A. security and sales B. ethics and security C. ethics and technology D. human resources and security

b

Which of the following would not be considered part of the complete characteristic of high-quality information? Select one: A. Is the area code missing for the phone information? B. Is each transaction represented only once in the information? C. Is a value missing from the personal information? D. Is the address incomplete?

b

Who is a person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business? Select one: A. MIS Infrastructure manager B. enterprise architect C. MIS specialist D. enterprise manager

b

Accessibility, availability, maintainability, portability, reliability, scalability, usability are all elements of a(n) ________ MIS infrastructure. Select one: A. virtualized B. sustainable C. agile D. information

c

What is a disaster recovery plan? Select one: A. a separate and fully equipped facility where the company can move immediately after a disaster and resume business B. a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C. a detailed process for recovering information or a system in the event of a catastrophic disaster D. a separate facility with computer equipment that requires installation and configuration

c

What is a prediction? Select one: A. predictions based on time-series information B. a statistical process for estimating the relationships among variables C. a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover D. a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste

c

What is a primary key? Select one: A. a field (or group of fields) that uniquely identifies a given entity in a table B. characteristics or properties of an entity C. a field (or group of fields) that uniquely identifies a given attribute in a table D. a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables

c

What is adware? Select one: A. experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge B. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network C. software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user D. a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

c

What is availability? Select one: A. refers to the varying levels that define what a user can access, view, or perform when operating a system B. refers to how quickly a system can transform to support environmental changes C. refers to the time frames when the system is operational D. performs functions such as resetting passwords, deleting accounts, and shutting down entire systems

c

What is big data? Select one: A. focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization B. processes and manages algorithms across many machines in a computing environment C. a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools D. extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

c

What is competitive click-fraud? Select one: A. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser B. the electronic defacing of an existing website C. a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link D. an act or object that poses a danger to assets

c

What is data mining? Select one: A. a particular attribute of information B. the common term for the representation of multidimensional information C. process of analyzing data to extract information not offered by the raw data alone D. uses a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making

c

What is distributed computing? Select one: A. a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools B. extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information C. processes and manages algorithms across many machines in a computing environment D. focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization

c

What is maintainability? Select one: A. ensures that a system is functioning correctly and providing accurate information B. performs functions such as resetting passwords, deleting accounts, and shutting down entire systems C. refers to how quickly a system can transform to support environmental changes D. refers to the varying levels that define what a user can access, view, or perform when operating a system

c

What is performance? Select one: A. a system that is not operating and cannot be used B. the degree to which a system is easy to learn and efficient and satisfying to use C. measures how quickly a system performs a process or transaction D. refers to the ability of an application to operate on different devices or software platforms, such as different operating systems

c

What is phishing? Select one: A. reroutes requests for legitimate websites to false websites. B. a phishing expedition in which the emails are carefully designed to target a particular person or organization C. a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses D. a masquerading attack that combines spam with spoofing

c

What is reliability? Select one: A. refers to the varying levels that define what a user can access, view, or perform when operating a system B. performs functions such as resetting passwords, deleting accounts, and shutting down entire systems C. ensures that a system is functioning correctly and providing accurate information D. refers to how quickly a system can transform to support environmental changes

c

What is the difference between phishing and pharming? Select one: A. Phishing is the right of the company, where pharming is the right of the individual. B. Phishing is not illegal, and pharming is illegal. C. Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites. D. All of these are correct.

c

What is the logical view of information? Select one: A. deals with the physical storage of information on a storage device such as a hard disk B. deals with the logical storage of information on a storage device such as a hard disk C. focuses on how users logically access information to meet their particular business needs D. focuses on how users physically access information to meet their particular business needs

c

What is the primary difference between an entity and an attribute? Select one: A. an attribute is a table, an entity is a column from the attribute table B. an entity is specific, whereas an attribute is not data at all but brainstorming ideas that take place before the entity is created C. an entity is a table that stores information about people, places, or events, whereas an attribute is a column or specific field of the data elements associated with an entity D. an attribute refers to applications, and an entity refers to executives

c

What is the role of a foreign key? Select one: A. Is a field that uniquely identifies a give record in a table. B. It is a unique way to identify each record. C. It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables. D. All of these are correct.

c

What is two-factor authentication? Select one: A. requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification) B. the traditional security process, which requires a user name and password C. requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) D. the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting

c

What provides real-time information in response to query requests? Select one: A. information quality B. information level C. real-time systems D. real-time information Correct

c

Which characteristics support an information MIS infrastructure? Select one: A. storage, network, and server virtualization B. accessibility, availability, maintainability, portability, reliability, scalability, usability C. backup and recovery plan, disaster recovery plan, business continuity planning D. grid computing, cloud computing, and virtualization

c

Which of the choices below defines information security? Select one: A. a broad term encompassing the protection of information B. protects information from accidental misuse C. All of these are correct. D. protects information from intentional misuse

c

Which of the choices below represents the definition of information secrecy? Select one: A. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively B. a method or system of government for information management or control C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity D. the act of conforming, acquiescing, or yielding information

c

Which of the following is an example of an emergency notification system? Select one: A. wireless alerts for promotional discounts B. text messages from your local grocery store C. radio stations' occasional tests of the national alert system D. All of these are correct.

c

Which of the following key terms represents the principles and standards that guide our behavior toward other people? Select one: A. standards of living B. intellectual property C. ethics D. security

c

Which of the following reflects Moore's law? Select one: A. a company's ability to acquire small amounts of capital for spending on innovative ideas every two years B. the computer chip performance per dollar doubles every 6 months C. the computer chip performance per dollar doubles every 18 months. D. a company's ability to acquire small amounts of MIS equipment for cheaper cost

c

Which of the following would not be considered part of the unique characteristic of high-quality information? Select one: A. Are there any duplicate customers? B. Is each transaction and event represented only once in the information? C. Is aggregate information in agreement with detailed information? D. Are there any duplicate orders?

c

What is a data scientist? Select one: A. a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools B. focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization C. processes and manages algorithms across many machines in a computing environment D. extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

d

What is a dynamic website? Select one: A. the person responsible for creating the original website content B. includes data that change based on user action C. an interactive website kept constantly updated and relevant to the needs of its customers using a database D. information stored in a dynamic catalog, or an area of a website that stores information about products in a database

d

What is a field that uniquely identifies a given record in a table? Select one: A. data mining key B. foreign key C. DBMS key D. primary key

d

What is accessibility? Select one: A. refers to how quickly a system can transform to support environmental changes B. refers to the time frames when the system is operational C. performs functions such as resetting passwords, deleting accounts, and shutting down entire systems D. refers to the varying levels that define what a user can access, view, or perform when operating a system

d

What is an act or object that poses a danger to assets? Select one: A. click-fraud B. competitive click-fraud C. cyberbullying D. threat

d

What is information inconsistency? Select one: A. refers to the overall management of the availability, usability, integrity, and security of company data B. the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems C. occurs when a system produces incorrect, inconsistent, or duplicate data D. occurs when the same data element has different values

d

What is information redundancy? Select one: A. storing duplicate data in multiple places B. storing the same data in multiple places C. duplication of data D. All of these are correct.

d

What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup? Select one: A. reliability B. failure tolerance C. capacity planning D. recovery

d

What is usability? Select one: A. describes how well a system can scale up, or adapt to the increased demands of growth B. a system that is not operating and cannot be used C. refers to the ability of an application to operate on different devices or software platforms, such as different operating systems D. the degree to which a system is easy to learn and efficient and satisfying to use

d

What occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to a secondary server? Select one: A. disaster recovery cost curve B. maintainability C. reliability D. failover

d

Which of the following is a benefit of a solid MIS infrastructure? Select one: A. optimizes business operations B. improves productivity C. reduces costs D. All of these are correct.

d

Which of the following is a business-critical integrity constraint? Select one: A. System will not allow shipping a product to a customer who does not have a valid address. B. System will not allow an entry for an order for a nonexistent customer. C. system will not allow shipping of a nonexistent product to a customer. D. System will not allow returns of fresh produce after 15 days past delivery.

d

Which of the following is a disadvantage of database-stored information? Select one: A. increased information integrity B. increased flexibility C. increased performance D. increased information redundancy

d

Which of the following is a problem associated with dirty data? Select one: A. violates business rules B. duplicate data C. incorrect data D. All of these are correct.

d

Which of the following is considered a type of biometrics? Select one: A. iris B. voice C. face D. All of these are considered biometrics.

d

Which of the following is not an example of an advantage of using a relational database? Select one: A. decreased information redundancy B. increased information quality C. increased flexibility D. decreased information security

d

Which of the following offers an advantage of using a data-driven website? Select one: A. easy to store large amounts of data B. easy to manage content C. easy to eliminate human errors D. All of these are correct

d

Which of the following questions would a company need to answer when first establishing a backup and recovery plan? Select one: A. What types of recovery systems does the company infrastructure need? B. How often does the company need to back up its information? C. What types of storage mechanism will meet the needs of the company? D. All of these are correct.

d

Which of the following represents the different information levels? Select one: A. document, presentation, spreadsheet, database B. executives, managers, operational employees C. detail, summary, aggregate D. individual, department, enterprise

d

Why do relational databases use primary keys and foreign keys? Select one: A. to create an entity B. to create an attribute C. to create physical relationships D. to create logical relationships

d

Within the beginning stage of the data warehouse models process, which of the following are included in the internal databases? Select one: A. marketing information, and stock market analysis numbers B. data mart 1, data mart 2, data mart 3 C. competitor and industry information, mailing lists, amp stock market analysis D. marketing, sales, inventory, and billing

d


Set pelajaran terkait

Commonlit - The Landlady Assesment Questions

View Set

Professional Conduct and Fiduciary Responsibility

View Set

1.1 Solving One Step and Two Step Equations

View Set

FINAL EXAM History of Rock and Roll

View Set

Focus on Personal Finance: Chapter 2

View Set

Testing and Remediation Beginning Test

View Set

Quiz #27 Chest & Abdominal Trauma

View Set

Chapter 2- AP Classroom Questions

View Set

Questions-- Image production (CTB) -- Image Quality

View Set