Mangt 366 Exam 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Provides transmission speeds over 100 mbps using MIMO technology (multiple wireless signals and antennas) - Also known as wifi 4

802.11n

What is at the heart of all ERP systems and what role does it play?

A database, when a user enters or updates information in one module, it is immediately and automatically updated throughout the entire system: ERP systems automate business processes.

Uses a different radio frequency than standards b & g and other electronic devices (kinda like taking a less crowded route: it will be faster since no one is using it) - Also known as Wifi 2

802.11a

Provides transmission speeds of up to 11 mbps, 300 feet inside, 800 feet outside. - Also known as Wifi 1

802.11b

Provides transmission speeds of up to 54 mbps, at a 35 foot indoor range - Also known as Wifi 3

802.11g

Uses dual-band technology, supporting simultaneous connections. - Also known as Wifi 5

802.11ac

In a relational database, the customer record contains information regarding the customer's last name. The words "Last Name" is a(n) ___________. A. Attribute B. Instance C. Entity class D. Primary key E. Object

A. Attribute

This is a fill in the blank question. Please type in your response, just like you would type in Access if you were creating this item. You are creating a query where you want to find all company names that have an oa side-by-side somewhere in the company name. You don't care what is before the oa, or after the oa, as long as you have an oa side-by-side somewhere in the company name. How would you create that criteria? A. Like *oa* B. LIKE *oa*

A. Like *oa*

Which of the following statements regarding TCP/IP and "How the Internet Works" is NOT CORRECT? A. TCP is used to break a URL into 3 parts. B. A GET request is used to retrieve HTML code for a web page. C. The IP portion of TCP/IP assigns a unique address to each computer to facilitate communication. D. A name server translates a server name into an IP address. E. TCP/IP provides the technical foundation that enables Internet communications.

A. TCP is used to break a URL into 3 parts.

The key thing to keep in mind when making a pivot table is that the pivot table should be easy to read and easy for the user to interpret. For instance, if a pivot table has multiple data points but only a row/column (but not the other), then the pivot table may be easier to read if you don't move values to rows. A. True B. False

A. True

When you create the structure for an Access database, you specify field names and characteristics of the data. A. True B. False

A. True

A characteristic of the data is also referred to as a(n): A. attribute B. Record C. Table D. Byte E. Instance

A. attribute

The logical structure of information in a database is contained in the A. data dictionary. B. data manipulation subsystem. C. data administration subsystem. D. applications generation subsystem. E. DBMS engine.

A. data dictionary.

I want to create and view the relationships between the different tables that I have created. When using Microsoft Access, I will access that functionality by using which of the following tabs. A. Home tab B. Create tab C. External Data tab D. Database Tools tab E. Design tab

D. Database Tools tab

Files created using Microsoft Access fit which database model? A. File Management System Model. B. Object-Oriented Database Model. C. Network Database Model. D. Relational Database Model. E. Hierarchical Database Model.

D. Relational Database Model.

A logical collection of information gathered from many different operational databases. - Contains historical data that has been extracted from many different operational databases. - Historical data is used for decision making.

Data warehouses

In Tableau, ______ are categorical fields (text fields, such as names, dates, or geographical data). You can use dimensions to categorize and segment data. In a pivot table, these would be fields that form the basis of your rows and columns. Remember that pivot tables are used to "show the dimensions by which you wish to view the data."

Dimensions

What might be found in the data dictionary in Access?

Field names and their data types, as well as the primary key.

Color, size, text, detail, and tooltips are all examples of ___ in Tableau.

Marks

In Tableau, ______ are the actual data points as seen in the the charts and graphs that you create (the point/spot of data).

Marks

Data manipulation tool that helps you graphically design the answer to a question. You create this query. - You specify the conditions or criteria that you want the database searched for, and the query tool will return records that match the conditions or criteria that you specified.

Query-by- example tool

The connection between a LAN and a larger network is usually accomplished using a device called a ____. - used to connect computers in a network. - They also "sit" between your network and other networks (serving as a gatekeeper both into and out of your network). - responsible for determining the path that messages take from the sending computer to the destination computer.

Router

The language used to query a database.

SQL

The electronic movement of information over public or private networks

Telecommunications

- Breaks information into data pockets. - Reassembles packets when received. - Checks for lost packets.

Transmission Control Protocol (TCP)

Provides the technical foundation for the public Internet as well as for large numbers of private network. - Allows computers to exchange messages regardless of their operating system or hardware.

Transmission Control Protocol/Internet Protocol (TCP/IP)

The _____ layer handles end-to-end packet transportation.

Transport

A way to use the public telecommunication infrastructure (e.g., Internet) to provide secure access to an organization's network. - Tunneling software is used to create a private connection between two different servers or between a server and individual computers (made when needed and terminated when transmission is completed). - Data packets are encrypted for security.

Virtual Private Network (VPN)

Connects computers dispersed among a number of buildings, or even in different cities.

Wide Area Network (WAN)

Normalization

break one large table into several smaller tables - Eliminate all repeating groups in records. - Eliminate redundant data (duplicate copies) - Assure that each field in the relation depends only on the primary key of that relation.

What are the three most common components of ERP systems?

Accounting/finance, production/materials management and HR

The ______ layer allows users and applications to access network services. - File transfer protocol (FTP) - Simple mail transfer protocol (SMTP) - Telnet provides terminal emulation that allows a "dumb terminal with no processing capability" to be able to connect to a host computer (which will control everything). - Hypertext transfer protocol (HTTP) - Simple network management Protocol (SNMP)

Application

Model for applications in which the bulk of the back-end processing takes place on a server, while the front-end processing is handled by the clients.

Client/Server network

Which of the following are you creating when you specify certain conditions or criteria that you are interested in (ask a question), with the result being that the records/database is searched to find matches to your specifications? A. A Primary Key. B. A structure C. A table D. A query E. A Data Dictionary.

D. A query

Examine the following SQL code: SELECT Orders.OrderDate, Orders.ShippedDate,Customers.CustomerID, Customers.CompanyName FROM Customers INNER JOIN Orders ON Customers.CustomerID = Orders.CustomerID WHERE (((Customers.CompanyName)="B's Beverages")) The field that forms the basis of the relationship between the two tables being used is: A. Customers B. OrderDate C. ShippedDate D. CustomerID E. CompanyName

D. CustomerID

In Tableau, ______ contains numeric values. They are the metrics (data) that we want to analyze. In a pivot table, these would be the values.

Measures

Two or more computers connected together using standards/protocols so that they can work together.

Network

The ____ ____ layer details how data is physically sent through the networking hardware.

Network Interface

A type of LAN that Each user can share a portion their computer's hard drive with other LAN users

Peer-to-peer

Wirelessly connecting small personal devices, really short distance

Personal Area Network (PAN)

A standard that specifies the format of data as well as the rules to be followed during transmission.

Protocol

Data manipulation tool that helps you quickly define formats of reports and what information you want to see in a report. You can specify exactly what you want to see and where you want to see it. - Report wizard, report design screen.

Report generator

What are the extended components of an ERP system?

Typically focus on external operations and require interactions with customers, suppliers and business partners outside of the organization.

A physical and data layer technology for LAN networking.

Ethernet

You wish to analyze a large amount of data (like the golf data you were given earlier this semester). Lots of rows and lots of columns worth of data. Which of the following data analysis techniques would be the BEST for you to use to understand that data that you have been given. A. Sort the data. B. Filter the data. C. Create a series of conditional formats. D. Subtotal the data. E. Average the data or count the data or find the maximum in the data or find the minimum in the data. F. Create a relationship between your columns and create a query using Access. G. Use the Solver or conduct some sort of what-if analysis H. Create one or more pivot tables. I. Create an absolute cell reference and/or a mixed cell reference and/or a relative cell reference. J. Create a form and subform so that you can see the data visually.

H. Create one or more pivot tables.

Best examples of a primary key include?

ID number and SSN

One of the SQL definitions and/or descriptions seen below is incorrect. Which one is the incorrect definition and/or description? A. INNER JOIN specifies that two or more tables are joined together and it also specifies the field that forms the relationship between the linked/joined tables. B. CRITERIA is used to narrow down or filter the data being displayed. C. SELECT is used to specify the fields you want to include. D. ORDER BY is used to specify how the records should be sorted, as well as the sort order. E. FROM is used to specify the table or tables the selected fields are coming from.

B. CRITERIA is used to narrow down or filter the data being displayed.

When creating multi-table objects in Access (queries, forms, reports), a relationship between tables is not needed as long as you have answers appearing in the results area. A. True B. False

B. False

When you use the Filtering features of Microsoft Access, you specify criteria and you also specify exactly what fields you wish to see in your results. A. True B. False

B. False

___________ applications should be considered whenever formulas and complex calculations are required. A. Database B. Spreadsheet C. Word processing D. Web browsing software E. Operating system

B. Spreadsheet

Which of the following statements regarding Excel data and Pivot Tables is incorrect? A. In order to correctly use the subtotals feature, the user must first sort the data by the column for which the subtotal will be figured for. B. To sort Excel data, the columns being sorted need to be adjacent (side-by-side). C. Report filters and slicers can be used to filter the data found in a Pivot Table. D. To create a Pivot Table, you need to specify the dimensions by which you wish to view the information. The result of this is that you can see relationships in the data. E. Excel features can be used to replicate a database.

B. To sort Excel data, the columns being sorted need to be adjacent (side-by-side).

A TPS is used to ________________ business processes. A. streamline B. automate C. bottleneck D. reinvent E. provide redundancy for

B. automate

The portion of a database management system that helps you create and maintain the data dictionary, specify field names, data types, integrity constraints, input mask and other activities that define the structure of the files in a database is the A. database management system engine. B. data definition subsystem. C. data manipulation subsystem. D. data administration subsystem. E. application generation subsystem.

B. data definition subsystem.

Zena Xavier is a pharmacist. She uses a computerized information system that stores knowledge and makes inferences/recommendations concerning drug interactions. She is using a(n): A. intelligent agent. B. expert system. C. decision support system. D. a genetic algorithm. E. neural network.

B. expert system.

The database model that uses a series of two-dimensional tables to store information concerning a particular entity class is the A. object-oriented database model. B. relational database model. C. network database model. D. hierarchical database model. E. file management system model.

B. relational database model.

- Allows for wireless communications within a limited distance: 2 megabits per second, up to 30 feet. - Less expensive than Wi-Fi chips, consume less power, easier to build into small devices than run on batteries such as cell phones, palm-top computers, and other PDAs. - Called a "personal area network" (PAN) technology.

Bluetooth

What is the most basic way to differentiate networks?

By proximity

You are the sales manager and it is the end of the year. You have decided to examine the company's sales database containing data for the hundreds of different products that are sold by your company. Which of the following is considered information? A. Quantity sold for each product each day B. Date sold for each item C. Best selling item by month D. All of the above items are considered information E. None of the above items are considered to be information

C. Best selling item by month

A database ______________ is a generalized class of people, places, or things for which data is collected, stored, and maintained. A. Instance B. Attribute C. Entity class D. Key field E. Model

C. Entity class

In a relational database, the category called "Customers" is a(n): A. Attribute B. Instance C. Entity class D. Primary key E. Integrity constraint

C. Entity class

I used the following statement to create a pivot table: Tiger and Lion by Rabbit and Cow, filtered by Dog. After making this pivot table, I know I need to perform the "Move Values to Rows" operation. Which of the following is correct? A. I should move Rabbit. B. I should move Cow. C. I should move Tiger and Lion. D. I should move Dog. E. I can move either Rabbit or Cow.

C. I should move Tiger and Lion.

An artificial intelligence system that applies reasoning capabilities to solve a problem is called A. a neural network. B. a genetic algorithm. C. an expert system. D. a decision support system. E. an executive information system.

C. an expert system.

The subsystem of a database management system that lets you see the contents of a database file, change the data, query the data and display reports is called the A. database management system engine. B. data definition subsystem. C. data manipulation subsystem. D. data administration subsystem. E. application generation subsystem.

C. data manipulation subsystem.

Rules that help assure the quality of the information in a database are called A. the data administration subsystem. B. E-R rules. C. integrity constraints. D. Foreign keys E. Primary keys

C. integrity constraints.

XYZ software modifies/changes its approach to reflect experiences in the previous contest. It is a(n) ___________. A. expert system B. genetic algorthim C. neural network D. decision support system E. Intelligent agent

C. neural network

All of the following statements regarding relationships are true EXCEPT: A. Relationships are used to link tables together. B. Relationships are based upon a common field (same name and characteristics). C. In order to take information out of multiple tables and create a query or report, you must create a relationships between the tables. D. If both Member Number and Instructor Number are social security numbers, you can use those two fields to link two tables together. E. All of the above are TRUE statements about relationships.

D. If both Member Number and Instructor Number are social security numbers, you can use those two fields to link two tables together.

Which of the following statements is accurate regarding having Accurate versus Complete information? A. Due to the potential impacts of making a bad decision, the information standard is that information must be 100% accurate and 100% complete. Anything less than that is unacceptable. B. If information is 45% accurate, then it is acceptable to use it for decision making. C. If you are searching for business intelligence, having information that is 80% complete is the lowest acceptable standard. D. Most organizations determine a percentage high enough to make good decisions at a reasonable cost, such as 85% accurate and 65% complete. E. Since organizations seek to make good business decisions, there is no cost that is too high in terms of how long it takes to acquire the information or how complete it must be.

D. Most organizations determine a percentage high enough to make good decisions at a reasonable cost, such as 85% accurate and 65% complete.

Used to query a database. A. CRM B. SCM C. RFID D. SQL E. XML

D. SQL

Which of the following is the BEST primary key that you might use? A. First Name B. Last Name C. Telephone Number D. Student Number E. Address

D. Student Number

What happens when you select to enforce referential integrity? A. Data communications in a wired LAN receive an additional layer of security. B. Data communications in a wireless LAN receive an additional layer of security. C. Entity classes and attributes are created. D. You create a feature that stops someone from typing data into a linked field unless that same data already exists in the linked table. E. Normalization occurs and data redundancy is eliminated.

D. You create a feature that stops someone from typing data into a linked field unless that same data already exists in the linked table.

Those in attendance at a recent Super Bowl unknowingly had their faces scanned by surveillance equipment and the resulting image of each person was compared to a database of "known troublemakers." Which of the following forms of artificial intelligence made it possible to achieve these matches? A. a decision support system. B. an expert system. C. intelligent agents. D. a neural network. E. a genetic algorithm.

D. a neural network.

Elimination of redundancy in a database is a major goal of A. database structures. B. database backbones. C. client/server network connections. D. normalization. E. database management systems.

D. normalization.

The data manipulation tool that performs the same function as query-by-example, except that you perform the query by creating a statement instead of pointing, clicking, and dragging is A. a view. B. a report generator. C. a query-by-example tool. D. structured query language.

D. structured query language.

A component of the DBMS that accepts logical requests from the various other BDMS subsystems, converts them to their physical equivalent, and actually accesses the database and data dictionary as they exist on a storage device.

DBMS Engine

A component of the DBMS that helps you create and maintain the data dictionary and define the structure of the files in a database.

Data Definition Subsystem

A component of the DBMS that helps you add, change, and delete information in a database and mine it for valuable information. - This subsystem is most often the primary interface between you as a user and the information contained in a database. - Tools in this subsystem include views, report generators, query-by-example tools, and structured query language.

Data Manipulation Subsystem

A subsystem that helps you manage the overall database environment by providing facilities for: - Backup and recovery - Security management - Concurrency control ensures the validity of database updates. - Change management allows you to assess the impact of proposed structural changes.

Data administration subsystem

The software tools used to query information in data warehouse. - Use advanced statistical techniques to search for patterns and anomalies in the data. - Attempts to find answers to questions the user did not even think to ask.

Data mining tools

Which of the following is a valid primary key? A. Pay Rate B. Zip code C. Department D. Phone Number E. None of the above are valid primary keys.

E. None of the above are valid primary keys.

There are many potential sources of low quality information. Which of the following is not considered to be one of those sources? A. Customers who intentionally enter inaccurate data. B. Customers who unintentionally enter inaccurate data. C. Employees being careless or trying to save time. D. Third parties and external information sources. E. Please mark this choice if you feel that ALL OF THE ABOVE are potential sources of low quality information.

E. Please mark this choice if you feel that ALL OF THE ABOVE are potential sources of low quality information.

When creating Tables and Queries in Access, select the ___________ option. When creating Forms and Reports in Access, select the _________ option. A. SQL, QBE B. QBE, SQL C. relational view, hierarchical view D. relational view, pivot table E. design view, wizard F. sub-form, wizard G. database tools, create

E. design view, wizard

Integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make enterprise wide decisions by viewing enterprise wide information on all business operations (consistent enterprise wide information).

Enterprise Resource Planning (ERP)

Connects computers in relatively close proximity

Local Area Network (LAN)

The ____ layer handles the packets (creation, labeling and addressing, etc.)

Internet

- Each computer given a unique IP address. - Used to identify a specific computer. - 209.1.144.212

Internet Protocol (IP)

_____ is the software that many professionals use when doing data analytics and creating visualizations. The mission statement of the company is "to help you see and understand your data by enabling self-service visual analytics."

Tableau


Set pelajaran terkait

Joint Arthroplasty- Hip Replacement/ Knee Replacement/ Hip Prosthesis (Exam 4) under 'Osteoarthritis Surgery'

View Set

Chapter 12: Communicating Customer Value

View Set

Module 12: Healthy Weight and Body Composition

View Set

Accident and Health Insurance- Basics

View Set

Ethics: Chapter 3 - Tort Law & Intentional Torts

View Set

Anatomy & Physiology: Cardiac Conduction System

View Set