D075

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the term used to refer to a massive, room-sized computer that processes and stores enormous amounts of bulk data and information? Hub Processor Mainframes Database

Mainframes Correct! Mainframes are designed to handle massive amounts of transactions and data.

Sparkit has developed a unique logo for their product. Which legal protection does Sparkit need to best protect the rights to its product logo? A trade secret A copyright A trademark A patent

A trademark Correct! Trademarks protect words and designs that identify the source of a product.

Businesses are expected to comply with ethical business practices in every department. What is an example of an information technology (IT) business practice that promotes ethical behavior? Selecting the least expensive software Running nightly data backups Auditing to remove unlicensed software Upgrading software to current versions

Auditing to remove unlicensed software Correct! Businesses have a responsibility to ensure that their computers do not have unlicensed software running on them.

Which methodology for sharing information would be most appropriate to the business in the scenario? WAN-based Browser-based LAN-based Forward-facing

Browser-based Correct! Browser-based means the project management software is web-based and well distributed.

Eva wants to make her own website for her real estate business. Which technology could she use to develop her own website without first acquiring programming skills? Browser-based web development JavaScript Web development tool kits Hypertext markup language

Browser-based web development Correct! Browser-based web development helps people with limited technical skill to develop their own websites simply using drag-and-drop tools and design interfaces.

The company's board of directors has expressed concerns about the software compatibility issue. Who is responsible for explaining and advocating for the new plan to the company's board of directors? IT manager CIO Programmer IT architect

CIO Correct! CIOs typically have the most responsibility within an organization

What is the term used to refer to end-user computers on a network? Nodes Servers Clients Routers

Clients Correct! Clients are computers that are requesting information from the network, such as accessing web pages.

How can the Internet of Things (IoT) be utilized in driverless or self-driving automobiles? Communication between vehicles Navigation information Passenger information Communication between devices within an automobile

Communication between vehicles Correct! IoT can allow vehicles to communicate with each other regarding location and speed. This is known as vehicle-to-vehicle (V2V) communications.

A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server? Computer System Administrator Computer System Analyst Computer Support Specialist Computer Programmer

Computer System Administrator Correct! Computer system administrators are responsible for setting up larger computer assets like network servers and maintaining them for smooth, error-free operation.

How can creators of new applications (apps) protect the computer programs used to run them? Copyright Patent Trademark Trade secret

Copyright Correct! Since an app is an original created work that is a written program, much like a book, it is protected by copyright.

Which advantage does a business gain by using cloud web hosting (CWH) rather than local hosting? Cost savings Customer access Speed of access Managing seasonal access

Cost savings Correct! CWH is implemented quickly and is easy to maintain without hiring IT specialists.

The business in the scenario frequently works with sensitive data, and it is important to ensure that the network is highly secure. Which network component is specifically designed to prevent unauthorized users from accessing the network? Network interface card (NIC) Switch Firewall MAC address

Firewall Correct! A firewall is designed to block unauthorized access by users outside the network.

What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards? Software Information Technology Operating System Hardware

Hardware Correct! Hardware is the physical components of a computer system.

A company's IT department is currently a subunit of the accounting department, reporting to the accounting manager. The reason for this is that accounting is the single largest consumer of the company's IT services. The company's president decides that due to widespread disorganization and poor communication, she wants to reorganize all business units. What is the best recommendation for placement of IT within the company? Move IT under the president's office. Move IT under human resources. Leave IT as part of accounting. Make the IT department independent.

Make the IT department independent. Correct! IT spans all departments and needs to be independent of other business units so that it can meet each division's needs while ensuring technology consistency across the company.

Freedom Rock Bicycles found that it has multiple records due to multiple sales to the same individual. This has caused access problems when looking for specific customers. What can Freedom Rock Bicycles do to alleviate this problem? Load the data Extract the data Scrub the database Normalize the database

Normalize the database Correct! Normalization will reduce redundancy in the database.

Oliver wants to share some company files with his colleague Alice, so they connect using a USB cable to network together securely and transfer the files between their computers. Which term is used to describe this methodology of file sharing? Cloud-based Client-server Peer-to-peer Bluetooth

Peer-to-peer Correct! This is when two computers are networked together to share files.

A hospital has installed a system that constantly provides the inventory status of emergency supplies. Tags added to each product contain the product information needed for inventory control and identification, and these tags can be read with a scanner. Which technology did the hospital implement to perform this service? Bluetooth HTTP Internet of Things RFID

RFID Correct! RFID transmits product identification over radio waves for inventory

Which core business department is primarily responsible for business intelligence? Sales and marketing Research and development Production Human resources

Research and development Correct! R&D gathers information on competitors and creation and sales of their own products.

Which technology is a critical component of customer relationship management (CRM) systems? Sales tracking The database The schema Data analysis software

The database Correct! The information about customers contained in the database is the most valuable.

IoT devices observe and gather data but have limited intelligence for analysis. With respect to the design of an IoT network, where are the IoT devices located? The network hub The data center The edge The cloud

The edge Correct! The edge is outside the data center and is connected to the internet.

What do Internet of Things (IoT) devices need to be able to communicate to other devices and the network? Cellular network information Wi-Fi connection information Incorrect. Unique identifier on the Internet MAC address

Unique identifier on the Internet Correct! IoT technology are unlimited. For this network of communication devices to work, each device needs its own unique identifier on the internet.

William and Jack have a web page, but it does not receive many visitors. How can they make their web page more visible to those who may be looking for a motorcycle repair shop? Use search engine optimization. Place marketing advertisements on web pages. Email web page links to their customers. Put the web address on all documents.

Use search engine optimization. Correct! SEO is a marketing tool to provide increased visibility in searches.

A data analyst is working with a very large set of data and trying to calculate the speed of the data being produced over a given period. Which attribute of big data is this analyst addressing? Veracity Volume Variety Velocity

Velocity Correct! Velocity relates to how many data are presented that need to be stored or processed over a given time period.

Which function or feature has allowed mobile phones to replace PCs for many small-business functions? Mobile apps Cloud-based data storage Wi-Fi GPS

Mobile apps Correct! Mobile apps replicate many programs previously only offered on PCs.

Which tool allows large data sets to be stored and processed across multiple servers? Hadoop Structured Query Language (SQL) Tableau Enterprise resource planning (ERP)

Hadoop Correct! Hadoop is an infrastructure for storing and processing large sets of data across multiple servers.

Questions 1-5 are based on the following scenario. A technology business is growing rapidly and needs new systems to support a growing workforce. An IT manager is asked to create an IT department to support the growing business. This manager's first task is to make an inventory of essential items needed and their associated costs. The list includes office supplies such as desks, chairs, laptops, and a printer. The list also includes a server, a network operating system, cables, a hub, a router, and everything else it takes to set up a network for the business. The IT manager's boss has some concerns about the cost of a network and its impact on the company and employees. The manager explains that a network will allow employees to use shared peripheral devices on the network. Which example of a peripheral device can the manager provide based on the supply list? A laptop A hub A router A printer

A Printer Correct! A printer is a peripheral device, which is a device that resides outside of the computer but is still considered hardware.

Eva wants to implement a tracking system of everyone who logs in and searches her listings of homes for sale, capturing information on who logs in, when, and what information they accessed. Which piece of IT infrastructure should she implement to help automate this process? Cloud web services A supply chain management system A customer relationship management system Browser-based web development

A customer relationship management system Correct! A CRM system can automate much of this process.

Charlotte considers installing automated external defibrillator (AED) machines at strategic locations in the airport for enhanced healthcare for patrons. What is an example of an IoT device that can be used to improve the effective use of AED devices? A device that displays the patient's vital signs on a screen on an AED A device that provides video instruction to the user of an AED A device to notify paramedics when an AED is being used A device that allows paramedics remote control of an AED

A device to notify paramedics when an AED is being used Correct! An IoT device could be installed on the AEDs to notify paramedics when the machines are being used.

The algorithms developed by Sparkit programmers need to be cataloged and shared among the programmers in all three locations and need to be easily accessible. Which type of software system can Sparkit use to enable this? A productivity software suite A knowledge management system (KMS) A document management system (DMS) A relational database

A knowledge management system (KMS) Correct! A KMS is designed to organize, create, and distribute a business's collective knowledge.

Which component must each client computer in the office have to connect to the new network? A network switch An internal network A network interface controller An internal network server

A network interface controller Correct! The NIC is plugged into a slot on the motherboard inside of each computer in the network and allows a network cable to be plugged in so the computer can interface or communicate with other computers.

Which type of computer runs a network operating system (NOS)? A client computer on a network A mainframe computer A server A router

A server Correct! A server runs a NOS.

Which aspect of human resource management is supported by the IT department? Developing online employee training resources Analyzing which benefits to offer employees Recruitment of new employees online. Administration of information on employees

Administration of information on employees Correct! IT provides software and system services to administer employee information

What is a native app? An app that will function only on a single platform An app that targets a specific user group An app that is updated frequently An app that is preinstalled on a mobile device

An app that is preinstalled on a mobile device Correct! Native apps come with the device, such as calculators or calendars.

A large company uses a system that provides information to its suppliers to maintain the supply chain process. Which type of system is this company using? Project management software An extranet An intranet Collaboration software

An extranet Correct! Extranets allow access by suppliers to key manufacturing information.

Questions 1-6 are based on the following scenario. William and Jack are motorcyclists. They ride to work each day and own a motorcycle repair shop. They started their business fixing friends' motorcycles, and before long they found they had more work than they could handle. Customers began to ask for services such as a website to buy parts and accessories and information on safety and maintenance. William and Jack believe they could expand their business and increase their revenue by adding these services and selling used motorcycles. To make this possible, they need to install and gain expertise in the use of IT. In addition, they have ideas about converting gas-powered motorcycles to electric motorcycles to differentiate their shop from other shops. This would necessitate the collection of new data and connection with additional suppliers and systems. IT will be key to the growth of their company. Which type of research should William and Jack do to understand the electric motorcycles needed to meet customer and industry requirements and needs? Applied research Basic research Development research Business intelligence research

Applied research Correct! Applied research is focused on developing a customer product.

Questions 1-5 are based on the following scenario. Charlotte is the operations manager at one of the nation's busiest airports. More than 600 flights depart or arrive at her airport every single day. Safety is not only critical but it is defined and monitored by government agencies. Food supply and baggage conveyor systems, maintenance and service vehicles, and, of course, airplanes must all move around the airport's runways and roads without creating hazards or delays for workers or passengers. Airport services including restaurants, shops, medical response, screening and security, and more must all work together seamlessly to ensure the airport runs smoothly and efficiently in order to get passengers to their destinations. Charlotte's job is to make sure that happens. The following questions are about how Internet of Things (IoT) could affect the various businesses and organizations working together at the airport. What is an example of IoT technology being used to aid airport functions? Automatic parking payment stations that accept credit cards Monitors that display flight delays and gate changes in real time Baggage tags that record data about each piece of luggage Menus at airport restaurants that allow passengers to order food using a tablet computer

Baggage tags that record data about each piece of luggage Correct! Baggage tags that record data about luggage destination and location are an example of IoT.

Sparkit wants to be successful with social media to develop trust among its customers. How should Sparkit use social media to successfully develop trust among its customers? Build an online virtual community application Advertise products using mass media Use search engine advertising Use bulletin boards to communicate to customers

Build an online virtual community application Correct! Examples of social media are computer-based applications whose purpose is to create and share ideas such as career interests, artistic expression, and relationship status through virtual worldwide communities.

What is the most important qualification that a Chief Information Officer (CIO) must possess? Information technology knowledge Business and leadership experience IT project management proficiency Programming and network design skill

Business and leadership experience Correct! CIOs sometimes make tactical business decisions, but their expertise and focus is typically their strategic decision and project management skills.

A company's data warehouse is time consuming to manage. During a discovery, the data analyst determines specific departments only used 20 percent of the data warehouse capacity. How can this company reduce the time associated with data management and better support the needs of individual departments? By processing the data with Tableau By configuring the data warehouse with SQL By switching to a data mart By using a relational database

By switching to a data mart Correct! A data mart is a smaller and more targeted version of a data warehouse.

A data analyst wants to use software to look for useful patterns and hidden relationships in this large set of social media data. Which process can be used to look for these patterns and relationships? Data scrubbing Data mining Data management Data normalization

Data mining Correct! Data mining is the process of looking for meaningful patterns in data.

Which term is used to refer to the process of combining structured, unstructured and semi structured data into a data warehouse structure? Data mining Data normalizing Data governance Data extraction

Data normalizing Correct! Normalizing data means that your data are typically organized into the fields and records of a relational database

Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts? Presentation software Word processor software Spreadsheet software Database software

Database software Correct! A database is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) that can be queried to produce populations of information.

Questions 1-5 are based on the following scenario. Eva is a realtor and owns her own real estate business. She has six employees: an administrative assistant at her small office and five real estate agents. She is successful and has 28 current listings of houses for sale. Eva does not believe that real estate agents should be in an office but should be meeting with prospective buyers and sellers since mobility and being visible to her customers is key to their success. To accomplish this, Eva has investigated mobile technology to assist her in her business. Which system should Eva use to leverage business intelligence and analytics to gain insights into her real estate data? Transaction processing system (TPS) Supply chain management system (SCM) Decision support system (DSS) Global positioning system (GPS)

Decision support system (DSS) Correct! Decision support systems are used to conduct analytics and business intelligence activities to gain insights into business through data.

The company hopes to use cloud-based storage to allow employees to share all their work-related files. What is a common cloud-based storage solution for the company? Photoshop DropBox Excel PowerPoint

DropBox Correct! DropBox is in the cloud.

A company has recently discovered that unauthorized users have accessed data on the company intranet. Which IT professional should investigate this concern? Computer System Analyst Information security analyst Computer System Administrator Network Administrator

Information security analyst Correct! Information security analysts are responsible for protecting all sensitive information within an organization.

Alice has written and published a novel, and she is deciding whether to publish it in the traditional way or publish a digital ebook. However, she is concerned about whether the book will be successful or not. What is the largest financial advantage of publishing the novel as an e-book? E-books require less advertising. E-books can be read in all reader apps in PDF format. E-books require less investment to publish. E-books sell for the same amount as traditional books.

E-books require less investment to publish. Correct! She will not incur printing and distribution costs.

Questions 1-5 are based on the following scenario. A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse? Hadoop Tableau SQL ETL

ETL Correct! ETL is the process of extracting, transforming, and loading the data into the database.

Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business? IT professional Operator End-users Systems analyst

End-users Correct! End-users are the people that use an IT product or service.

What did the Sarbanes-Oxley Act of 2002 require of IT departments in American companies? Ensure the accuracy and fair reporting of financial statements Protect students' educational data privacy Ensure medical patients have access to their health data Allow employees to miss work for medical reasons

Ensure the accuracy and fair reporting of financial statements Correct! The Sarbanes-Oxley Act of 2002 (SOX) was enacted to address fraudulent accounting reporting practices. Information systems hardware and software play a critical role in adherence to this law.

Smart homes with voice controlled light switches, app-connected video doorbells, and internet-enabled appliances are changing the nature of Eva's work selling real estate. Which improvement in IT infrastructure has enabled these real-time devices to function properly? Additional password-level security Faster internet speeds Additional MAC address support Additional device protocol support

Faster internet speeds Correct! In order for real-time devices to function properly, they need to communicate via the internet without delays.

What is the term used to describe a file sharing system that uses cloud-based technology? Client-server system File synchronization service Peer-to-peer service Local area network

File synchronization service Correct! File synchronization services update files from a sharing directory on each networked device.

Maria has accumulated on her PC a lot of data that are pertinent to her job. She is investigating automated backup functions, rather than the manual systems she is currently using, to make sure her data are safe. What is the term for these automated systems? Digital file sharing systems Information repositories Peer-to-peer services File synchronization services

File synchronization services Correct! They are cloud-based services

The data analyst at Freedom Rock Bicycles wants to link two tables in the database. What is the name of the field in a database table that is used to connect or link two tables together? Linking key Common key Foreign key Connection key

Foreign key Correct! A foreign key is the field in a database that links two tables together.

Which type of software is supply chain management software? General purpose software Function-specific software Mobile software Communications software

Function-specific software Correct! Function-specific software is tailored to an industry or a particular business application.

Delivery drones do not depend on guidance by a human but on information technology systems to run autonomously. Which key network system would a self-guided drone system rely on? GPS Bluetooth Cellular network Wi-Fi

GPS Correct! GPS is available everywhere, and the drone can use GPS to find the correct location.

A company is planning several major software development projects. Which IT professional leads the software applications development team that will develop, design, program, and test the software applications? IT Architect Chief Technology Officer IT Manager Computer Systems Analyst

IT Manager Correct! IT managers are in charge of software application development teams that develop, design, program, and test software applications.

Questions 1-5 are based on the following scenario. A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. In the scenario above, who is responsible for designing a detailed plan to address the incompatibility issue? Chief information officer Computer systems administrator IT architect IT portfolio manager

IT portfolio manager Correct! IT portfolio managers are responsible for the standardization of software rules and plans.

Policies must be enacted and enforced to protect corporate assets. These policies include strong passwords, safe web browsing protocols, firewall implementations, and malware protection. Who is the IT professional responsible for enacting these policies? Information Security Analyst (ISA) Chief Information Officer (CIO) Network Administrator Chief Technology Officer (CTO)

Information Security Analyst (ISA)

What term refers to the study, design, development, implementation, support, and management of computer-based information systems? Software Governance Information Technology Computer Information Systems Technology Studies

Information Technology Correct! Information Technology contains all of the defined elements.

An additional problem that the consultant identified was that unauthorized external users could easily access data on the company's internal network. Which IT professional is responsible for addressing this issue? Computer systems administrator Database administrator Information security analyst Web developer

Information security analyst Correct! The information security analyst has the responsibility for assigning access and monitoring unauthorized access.

There are many airport vehicles at Charlotte's airport, and time and movement of planes and baggage are of primary importance. Because of this, IoT is used to track the location of baggage vehicles at the airport. When the airport purchases a new baggage vehicle, what must be done to connect it to the IoT system? Install a device with a small Wi-Fi router in the vehicle. Install a Bluetooth-enabled tracking system. Install a global positioning system (GPS) navigation system. Install a sensor with a unique identifier (UID).

Install a sensor with a unique identifier (UID). Correct! All vehicles must have a unique sensor to transmit their location to a central computer.

William manages the repair department of the business and is frustrated with the process of acquiring parts. Which IT methodology can William use to help manage this process? Install a database to manage parts inventory. Install an extranet to the company's suppliers. Create an intranet connection for the company's suppliers. Connect suppliers with the company's accounting system.

Install an extranet to the company's suppliers. Correct! This will establish a supply chain system that will help manage the supplies needed.

Transaction processing systems (TPSs) are used by grocery stores to gather data on which products are sold and when they are sold, and customer information. If all TPS data are related to a grocery store's finances, inventory, and customers, which type of network configuration would be most appropriate for the implementation of a TPS? Extranet Wireless Intranet Internet

Intranet Correct! An intranet is a private network for company access only and would be appropriate since this information is private.

Bullzai Meat Company has freezer warehouses across the southern United States to hold meat until it is purchased by restaurants and schools. Bullzai needs to monitor the atmosphere and temperature quality of each of its freezers but cannot afford to have personnel perform this on a continual basis. Which technology implementation will allow the company to accomplish this goal? Wi-Fi Mobile app IoT RFID

IoT Correct! IoT can monitor and send information via the internet.

A hospital issues new patients a wristband that is not just a barcode but has monitoring and communications properties. Which technology is the hospital using for these wristbands? RFID IoT Bluetooth Cloud services

IoT Correct! IoT has the capability to monitor and collect information and transmit it.

How is IoT used in manufacturing to make the process more efficient and effective? IoT determines logistics of the production line. IoT in manufacturing makes decisions on productivity. IoT devices monitor employee time and productivity. IoT sensors attached to devices are connected to the internet and communicate the device's status to technicians.

IoT sensors attached to devices are connected to the internet and communicate the device's status to technicians. Correct! The manufacturing robot has IoT sensors connected to the internet that communicate its status. IoT sensors can alert technicians before failures so they can conduct maintenance, allowing the robot to run at maximum efficiency.

Freedom Rock Bicycles is considering adopting a cloud-database system. What is the primary advantage of a cloud database? Database management is not required by the company. It can be accessed from anywhere there is an internet connection. It requires no software installed on client computers. It is inherently secure because it is stored offsite.

It can be accessed from anywhere there is an internet connection. Correct! Cloud databases are not located on a physical server within a corporation.

What is the defining characteristic of function-specific software? It is designed to support the Internet of Things (IoT). It is designed to send data through the internet. It is designed to be tailored to an industry or a certain group of people. It is designed to interface with a certain operating system.

It is designed to be tailored to an industry or a certain group of people. Correct! Most function-specific software is tailored to either an industry or a certain group of people trained in a specific technical area.

Which valuable business intelligence (BI) can Freedom Rock Bicycles acquire from the database that directly relates to overall revenue and profitability based on this scenario? Knowing who is the best salesperson Knowing which products sell the best in each region Manufacturing cost of each product Knowing the sales price of each product

Knowing which products sell the best in each region Correct! This is valuable BI for marketing that would increase revenue and profitability.

Charlotte finds that the airport spends more than $100,000 each month on electricity for lighting and the heating and cooling system in the airport. How could Charlotte use IoT to reduce her airport's power bill? Door sensors that beep when a door is left open Motion sensors to turn the lights on and off in restrooms Thermostats that turn down the heat at 10 p.m. each night. Light dimmers and thermostats that report passenger traffic through the terminals in real time

Light dimmers and thermostats that report passenger traffic through the terminals in real time Correct! Devices that connect and respond to data traffic are IoT technologies that can reduce energy consumption.

While the business in the scenario is growing, it is still a small business. There are just 25 employees, and they all work in the same location. Which type of network will the business use? Metropolitan area network (MAN) Local area network (LAN) Campus area network (CAN) Wide area network (WAN)

Local area network (LAN) Correct! A local area network is for users who are located in close proximity to each other.

A small business has a single network that allows every employee to connect through a central server when they are in the company's main office. What type of network is the business using? Local area network (LAN) Peer-to-peer Network (P2P) Campus Area Network (CAN) Wide Area Network (WAN)

Local area network (LAN) Correct! A LAN computer network is relatively small, typically in a single building, but sometimes as small as a single room.

Each computer attached to the internet or a corporate network is uniquely identified so that it can be sent the information directed to it. What is this unique identifier known as? Media Access Control address (MAC) Network Interface Controller (NIC) Network Operating System (NOS) Transmission Control Protocol / Internet Protocol (TCP/IP)

Media Access Control address (MAC) Correct! This MAC address is unique to every computer on the network.

There are a number of different social media platforms that are categorized into distinct types. Which type of social media platform features short written entries posted for anyone who has subscribed to the account? Microblogging Media sharing Social networking Social news

Microblogging Correct! Microblogging supports short, frequent posts of words, pictures, videos, and links.

Lucas uses project management software for managing all his projects. Which output of project management software is used to assign tasks? System development life cycle (SDLC) Milestones Gantt charts Unified Modeling Language (UML)

Milestones Correct! Project management software defines the steps on how to complete a project based on input parameters, such as milestones.

A mobile app developer has developed a game that users can download and play for free. However, once users reach the one hundredth level, they must pay to unlock additional levels. What has the developer done by requiring app users to unlock additional levels? Monetized the app Used sponsored advertising Licensed the app Created a network effect

Monetized the app Correct! Monetizing an app refers to generating income from the app. In this case the developer is using content upgrades to generate revenue.

The data are full of missing, misplaced, or duplicate data, which the data analyst needs to remove. Which process can this data analyst use to remove such data? Normalization Extraction Schema design Data governance

Normalization Correct! Normalization is the process of removing redundancies in data.

Questions 1-5 are based on the following scenario. Freedom Rock Bicycles has installed a new database to keep track of sales by region, salesperson, product, and sales prices, among other items, to keep information on business processes. After installation, Freedom Rock Bicycles discovered additional benefits of the information accumulated in the database and how the information can improve the business profitability and future plans. Freedom Rock Bicycles found that daily reports could be run using SQL to indicate product and parts inventory and sales for the day. Which approach can be used to retrieve this information efficiently? Business intelligence (BI) Data mining Online analytical processing (OLAP) Data analytics

Online analytical processing (OLAP) Correct! OLAP is basic processing to determine counts of information from the database.

Cell phones, IoT devices, and GPS have been major technological changes in the IT infrastructure. What is the term used to describe an important change that happens when the usual way of thinking about or doing something is replaced by a completely new and different way? Paradigm shift Leverage Emerging technology Collaborative networking

Paradigm shift Correct! New technologies cause paradigm shifts, like the mobile phone.

An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent? Phishing Spyware Key logging Click fraud

Phishing Correct! Phishing usually involves attempts to deceptively gain private information, like usernames and passwords, typically in a legitimate-looking email.

Which type of reporting will provide Jack and William with the right information for making strategic decisions? Executive reporting Predictive reporting Transaction reporting Management reporting

Predictive reporting Correct! Predictive analytics and forecasting reports reveal trends in a business to aid in decision-making.

Which type of software can help address this problem? Database management Knowledge management system Project management Productivity suite

Project management Correct! Fast internet speeds have made it possible for project management software to evolve into browser-based software. Once project management software started residing on the web, it could be used by global teams.

Questions 1-5 are based on the following scenario. Scenario: A design business has employees based in different parts of the United States, with all employees working remotely from home. This allows the business to attract the best expertise, which is a great benefit to the business. One problem, however, is that employees are often waiting for other employees to complete certain tasks before they can complete their own. This lack of coordination causes significant delays in meeting deadlines. Which type of software is designed specifically to address the coordination problem in the scenario? Spreadsheet software Project management software Graphing software Database software

Project management software Correct! Project management software will let you set milestones to increase workflow.

Which type of software is designed to easily generate Gantt charts? Database management software Graphing software Project management software Spreadsheet software

Project management software Correct! Gantt charts are key features of project management software.

An analyst at a furniture company wants to use the company's relational database to find out which customers have made purchases in the past six months. What is an appropriate tool for the data analyst to use to find this information? ETL SQL Data mining Data structuring

SQL Correct! SQL is used to perform queries within a database.

Which technique is used to ensure data accuracy for marketing such as a mailing campaign? Creating data marts Indexing of data Normalization Segmentation

Segmentation Correct! Segmentation makes it possible to section off data

While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers? Router Hub Client Server

Server Correct! The server communicates with all clients and can distribute software to each.

Jack meets with the university dean to discuss his 18-year-old son's progress. Jack's son is a freshman at the university. Jack wants to know if his son is performing well in his classes. The dean has access to the computer systems containing the academic records for Jack's son but is also aware of constraints set by the Family Educational Rights and Privacy Act (FERPA). What should the dean do? Share the records only after receiving authorization from Jack's son. Share the records only after receiving authorization from the professors who have taught Jack's son. Share the records only after receiving authorization from the university president. Share the records only after receiving authorization from the university registrar.

Share the records only after receiving authorization from Jack's son. Correct! Only Jack's son can authorize his father to know his school information due to FERPA requirements.

What is the term used to describe technologies that enable, facilitate, and enhance people's ability to share digital content? Social media Mobile technology Social networking Mobile apps

Social media Correct! Social media allows for sharing independent of time or location.

How will the maintenance of employee workstations be simplified by creating an office network? Client computers will no longer need application software. Client computers will no longer need network interface cards. Software on client computers will have additional features. Software updates for client computers can be done at once from the server.

Software updates for client computers can be done at once from the server. Correct! Network administrators only need to update software on the server instead of every client computer.

In the scenario above, how should the IT department resolve the incompatibility issue? Increase help desk support for various software packages. Hold a training on how to use each software product to remove incompatibility. Standardize software throughout the organization. Implement a process that translates data from one software to another.

Standardize software throughout the organization. Correct! Standardization will increase process improvement and collaboration.

In which network topology is each client computer connected directly to the hub? Star Ring Bus P2P

Star Correct! In star topology has computers that are connected to a central hub.

Which function of a customer relationship management system helps a company identify opportunities to increase its business? Process Technology Data collection Strategy

Strategy Correct! A CRM's strategy function helps a company understand customers' concerns and desires and respond in ways that encourage more and better customer activity.

Jack and William want to hire a person to write code to access their database in order to build management reports. Which skill should a successful applicant possess? Search engine optimization (SEO) Data analytics Structured Query Language (SQL) Data administration

Structured Query Language (SQL) Correct! Structured Query Language (SQL) is the primary language used to write database queries that can retrieve data for reports.

A business analyst wants to use the social media data to create and present business intelligence. She will create visualizations that will be used by the executive team. Which tool is appropriate for creating and presenting this business intelligence? Data mart Tableau Data mining Hadoop

Tableau Correct! Tableau is business intelligence software.

A transaction processing system (TPS) enables the entry and recording of sale-related data such as item purchased, price, and date and time of sale. Which kind of decisions does management use these data for? Predictive decisions Tactical decisions Executive decisions Strategic decisions

Tactical decisions Correct! Detailed operational data created from the sale of individual items are used to make operational and short term decisions.

A company creates a new product in response to demand from a small but diverse group of customers with a specific shared interest. What is the most important reason to advertise this product on social media? Customer feedback Targeted advertising Large audience Low cost

Targeted advertising Correct! Social media allows for targeted advertising.

Which technology necessitated the development and implementation of Internet Protocol version 6 (IPv6)? Browser-based web development Cloud-based software Fiber-optic networks The Internet of Things (IoT)

The Internet of Things (IoT) Correct! An influx of millions of devices connected to the internet required a new addressing scheme

What is the major issue that hinders the effective use of decision support systems (DSS)? Poor data governance decisions and administration The collection of too much data Incorrectly distinguishing between viable and nonviable data Offering multiple solutions to a problem

The collection of too much data Correct! Collecting too much data, especially data that may not be relevant, elongates the DSS process and leads to ambiguous DSS outputs.

In the report, the consultant noted that the company's network is in need of maintenance. Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software? The network programmer The network analyst The network installer The network administrator

The network administrator Correct! Network administrators are responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software.

What do all the applications in a productivity software suite have in common? The same default file format The same keyboard commands The same graphical user interface The same data structure

The same graphical user interface Correct! The same graphical user interface allows data to be easily exchanged across programs in the software suite.

What is the purpose of a network switch? To categorize unstructured data on the network. To direct data to the intended target location. To manage access to the network operating system. To convert data to a universal data type.

To direct data to the intended target location. Correct! A network switch filters information to the correct part of a network.

What is the main purpose of a firewall? To prevent employees from sharing data outside the network. To prevent unauthorized users from accessing the network. To stop denial-of-service attacks from spreading to the network. To stop malware from causing damage within the network.

To prevent unauthorized users from accessing the network. Correct! Firewalls ensure that only authorized personnel can access and use an organization's intranet.

A manufacturing company has decided to request RFID (radio-frequency identification) tags on the parts it receives from a supplier to become more efficient and effective. What is the purpose of an RFID tag? Tracking the inventory of the parts from a supplier Improving the functionality of a supplier's parts Increasing the speed of a manufacturer's production line Expanding a manufacturer's parts selection from a supplier

Tracking the inventory of the parts from a supplier Correct! RFID tags can be tracked with an RFID reader and stored in a database.

One of Eva's realtors, Alice, creates a web page of her own and places pictures of the houses she has for sale on the page. Alice took the pictures herself; however, she copies the logo from a local hospital and places it on her website to show how close some of the houses are to medical facilities. Which type of law did Alice violate? Copyright Trademark Patent Trade secret

Trademark Correct! The logo for the local hospital is a trademark, which cannot be used without permission.

Maria designs a website for her small business using a browser-based web development platform. She copies an image file of a large company's logo and places the words "Just Buy It" underneath the logo. She places the logo prominently on her website. Which intellectual property law does Maria's website violate? Trade secret Patent Trademark Copyright

Trademark Correct! The logo is a trademark of the large company and needs approval to be used. Images available on the internet cannot be used by individuals or other companies without permission.

A company makes personal computers and sells them directly to the public. At present, all business processes are completed manually by employees, lengthening the time from customer order to shipment. Which business process would deliver the most immediate customer satisfaction and reduced costs if automated? Customer relationships Production Transaction processing Communications

Transaction processing Correct! Using IT to replace manual transaction processing with automated processing would increase speed of delivery and immediately reduce costs.

William and Jack believe that their large selection of rare parts and motorcycles should be the main focus of messaging to customers. Which tool will provide data regarding sales transactions and customer orders to confirm if this assumption is correct? Hadoop Relational database Customer relationship management (CRM) system Transaction processing system (TPS)

Transaction processing system (TPS) Correct! A TPS is a system that collects and stores customer transactions data.

Questions 1-5 are based on the following scenario. Lucas owns a medium-sized computer programming firm named Sparkit with 12 computer programmers and computer analysts with offices in three cities. The firm's specialty is point-of-sale systems programming. Many times, the firm's customers have unique needs during an implementation, and collaboration among the programmers and analysts is key to the firm's success. Lucas, as a manager, understands the benefits of business information technology. However, he has not adequately implemented IT solutions to benefit Sparkit. Which type of application can Lucas implement to allow for real-time business collaboration? File sharing Video conferencing Discussion boards Email

Video conferencing Correct! This allows for an audience and presenter.

A farmer has placed IoT rain sensors in all owned fields to provide rain density information by field location. Which transmission methodology should the farmer use to gather this information? RFID Client-server Wi-Fi Bluetooth

Wi-Fi Correct! Wi-Fi will allow the devices to communicate with the farmer's home office computer.

The airport installs sensors along the runways, and the sensors provide air traffic controllers with real-time information about the location of every plane on the ground. Which technology allows these sensors to transmit data to the air traffic controllers' server? Wi-Fi signal Cellular network Peer-to-peer network Bluetooth signal

Wi-Fi signal Correct! IoT devices use Wi-Fi to transmit data from sensors to a server.


Set pelajaran terkait

AP Art History Chapter 5: Ancient Greece

View Set

abeka 7th grade science section review 12.6

View Set

Chapter 1: The basics of Nutrition

View Set

Chapter 49: Nursing Care of the Child With an Alteration in Genetics

View Set