Buad 342 Exam 1 study material

Ace your homework & exams now with Quizwiz!

The image below is a depiction of what? A) Microsoft's Alpha Swift B) Google's Alpha Go C) Google's Go Pro D) Microsoft's Alpha Go

B) Google's Alpha Go

Which of the following would be an effective question to ask a computer? A) What is the best type of cuisine? B) Is a dog a mammal? C) Is Smokey the best mascot? D) Is UTK the best university?

B) Is a dog a mammal?

"Schema" is a fancy word for ___________. A) Data B) Model or design C) Software or hardware D) Information

B) Model or design

Which physical part of a computer is home to the BIOS? A) CPU B) Motherboard C) RAM D) Hard Drive

B) Motherboard

__________ is an example of social engineering. A) Cryptocurrency B) Phishing C) Motherboarding D) A foreign key

B) Phishing

A packing slip tells us... A) who is responsible for the goods after they leave the warehouse B) What the customer is receiving C) What the customer is returning D) What the customer ordered

B) What the customer is receiving

T/F: NIST security measures are designed to protect against the unknown future.

True

T/F: Procure to Pay and Order to Cash are interrelated. True False

True

T/F: Relational databases are schema-on-write databases?

True

It is estimated that as many as ____% of the activities individuals are paid to perform can be automated by adapting currently demonstrated technologies. A) 50 B) 35 C) 45 D) 40

C) 45

Which of the following must be completed before converting a customer order into a sale? A) A bill of lading & return merchandise authorization form B) A phone call & Facilities tour C) A credit check & inventory check D) Database construction & Computers

C) A credit check & inventory check

What is a data repository? A) An information management software B) A hardware component C) A place where data is stored D) A business process

C) A place where data is stored

Which of their following is an example of a composite attribute? A) Primary Key B) Social security number C) Address D) Phone Number

C) Address

Which of the following computer algorithm types is used when a computer is forced to make a choice between a YES and NO answer and then proceed down a different path based on the answer? A) Repetition algorithm B) Sequence algorithm C) Decision algorithm D) Choice algorithm

C) Decision algorithm

Which of the following is not an information processing event as described in this class? A) Maintain B) Record C) Distribute D) Report

C) Distribute

Which of the following is not an action included in the NIST Cybersecurity Framework? A) Protect B) Identify C) Inquire D) Recover

C) Inquire

_________ contain data awaiting some action to complete their processing. A) Reference Files B) Master Files C) None of these D) Transaction Files

C) None of these

In a relational database, the lines that connect one table to another are called __________. A) Connectors B) Intersections C) Relationships D) Joins

C) Relationships

In an ERD, the links that link database tables together are known as ______? A) Entities B) Attributes C) Relationships D) Connections

C) Relationships

Which is not an example of a cloud computing deployment model? A) Hybrid Cloud B) Public Cloud C) Remote Cloud D) Private Cloud

C) Remote Cloud

__________ simply records the data as-is, without making it conform to a particular model or predefined structure. A) A data engineer B) Information software C) Schema-on-read D) Schema-on-write

C) Schema-on-read

Why must an organization incorporate safeguard into its security compliance plan? A) To ensure more Order to Cash transactions B) To protect the relationships from one table to the next C) To defend against attacks D) To spend more money on security

C) To defend against attacks

Which of the following is not one of the five V's of big data? A) Veracity B) Volume C) Variability D) Variety

C) Variability

In Big Data, differences in the types/sources of data (structured, unstructured or semi-structured) are referred to as: A) Validity B) Velocity C) Variety D) Volume

C) Variety

Which of the following is not a law of cybersecurity listed by Nick Espinosa? A) If there is a vulnerability, it will be exploited B) Everything is vulnerable in some way. C) When in doubt, spend more money. D) Humans trust even when they shouldn't

C) When in doubt, spend more money.

Master Files con train data about? A) Transactions B) Tax rate schedules C) Purchases & Sales D) Customers, inventory, vendors

D) Customers, inventory, vendors

Cybersecurity is the application of technology, processes, & Controls to reduce the risk of _____? A) Compliance B) Cyber assurance C) Burnout D) Cyber attacks

D) Cyber Attacks

_____________ forces a computer to make a choice between a YES or NO answer. Then, process down a path based on that answer. A) Algorithmic programming logic B) Sequence programming logic C) Repetition programming logic D) Decision programming logic

D) Decision programming logic

Which of the following is not a recommended way to project your system from malware? A) Keep your operating system clean by downloading patches. B) All of the above are effective ways to protect against malware. C) Purchase/download antivirus software D) Delete old emails.

D) Delete old emails.

Which of the following is not a typical event in the Procure to Pay business process? A) Receive and Inspect Goods/Services from a Vendor B) Identify a need C) Store and Maintain Goods D) Deliver Goods/Services to Customer

D) Deliver Goods/Services to Customer

Which of the following is not a typical event in the Procure to Pay business process? A) Identify a need B) Store & Maintain goods C) Receive & inspect goods or services from a vendor D) Deliver goods/services to customers

D) Deliver goods/services to customers

RPA allows us to program bots so employees can ...? A) None of these is correct B) Stay on task C) Make more sales D) Do more, faster, with less manual effort.

D) Do more, faster, with less manual effort.

If the Customer_ID field is the primary key in the Customer table, what is Customer_ID called when it shows up in the Orders Table? A) None of these are correct B) Secondary Key C) Primary Key D) Foreign Key

D) Foreign Key

You can get ahead of the digital skills gap by having a __________, where you have the desire and confidence that you can learn anything. A) Strong resume B) Good education C) Fast computer D) Growth mindset

D) Growth Mindset

What happens if/when an organization is not cybersecurity compliant? A) It will lose employees and managers B) It will be forced to shut down C) It cannot make as much money due to the regulations imposed by the federal government D) It risks major litigation, fees, and attacks

D) It risks major litigation, fees, and attacks

___________ enters a network by exploiting a weakness. A) The Internet of Things (IoT) B) A foreign key C) Sensitive information D) Malware

D) Malware

___________ is/are software that is designed to handle high-volume, repeatable tasks. A) Machine Learning B) Internet of Things C) Artificial Intelligence D) Robotic Process Automatrian

D) Robotic Process Automatrian

Which of the following outlines security best practice? A) Security keys, codes, and cards B) Security trainings, guides, and manuals C) Security employees, agents, and managers D) Security standards, regulations, and guidelines

D) Security standards, regulations, and guidelines

Of the options provided, which is the best way to build a cyber defense strategy? A) Spending more money on cyber compliance strategies and employees. B) Using a primary key to lock your computer. C) Retaliating against threat actors. D) Staying informed about threat intelligence.

D) Staying informed about threat intelligence.

T/F: Artificial intelligence and Machine learning are the same concept. True False

False

T/F: ChatGPT is a natural language processing tool driven by Blockchain technology that allows you to have human-like conversations and much more with the chatbot.

False

T/F: Computers think just like people.

False

T/F: Cybersecurity is the application of technology, processes, and controls to reduce the risk of cyber compliance.

False

T/F: Many-to-many relationships are allowed in a relational database.

False

T/F: The General Data Protection Regulation (GDPR) is a data security standard that is required for secure credit card transactions.

False

T/F: To a computer, the criteria of "1" and 1 mean the same thing.

False

T/F: Viruses, worms, trojans, and bots are all part of a class of software called malicious actors.

False

Conversion is the process of...? a) Converting raw materials into finished goods b) Moving inventory from one warehouse to another. c) Buying goods as needed d) Selling goods to customers.

a) Converting raw materials into finished goods

Which of the following is not an information processing event as described in this class? a) Distribute b) Report c) Maintain d) Record

a) Distribute

When one company wants to share its data with another company without human interaction, they should use __________. a) Electronic Data Interchange (EDI) b) Hard Drives c) Email d) Batch Processing

a) Electronic Data Interchange (EDI)

It is important that we focus on business ___________ and technology ___________. a) First; second b) Second; first c) Always; never d) Relationships; software

a) First; second

Order to Cash (OTC) is the __________ business process. a) Selling b) Fastest c) Buying d) Hardest

a) Selling

__________ is collecting data at its point of origin in digital form. a) Source Data Automation (SDA) b) Voice-to-Text c) Information Management d) Real-Time Processing

a) Source Data Automation (SDA)

Which of the following scenarios would most likely benefit from real-time processing instead of batch processing? a) Ticket Processing (sports or airline b) None of these would benefit from real time processing. c) Customer Billing d) Payroll Processing

a) Ticket Processing (sports or airline

Procure to Pay (PTP or P2P) is the __________ business process. a) Selling b) Conversion c) Buying d) Information

d) Buying

Which of the following is considered the point of sale in the Order to Cash business process? a) Receive and Inspect Goods b) Receive Customer Order c) Receive Payment from Customer d) None of these.

d) None of these

__________ is the simulation of human intelligence processes by machines (training machines to perform human tasks). A) Machine learning B) Bot programming C) Deep learning D) Artificial intelligence

D) Artificial intelligence

Cybersecurity compliance is rules intended to protect the __________, __________, and __________ of data. A) Character, Investment, Accuracy B) Quality, Schema, Exposure C) Primary key, Foreign key, Relationship D) Confidentiality, Integrity, Availability

D) Confidentiality, Integrity, Availability

Which of the following would be suitable as a primary key in a database for a table representing a customer? A) Date of Birth B) Attribute C) Social Security Number D) Customer ID

D) Customer ID

Social Engineering is also know as __________. A) Interpretational hacking B) Phishing C) Man-in-the-middle D) Human Hacking

D) Human Hacking

According to Cloudwards, what percentage of data was recovered by paying ransom ware victims in 2021? A) 70% B) 65% C) 75% D) 80%

B) 65%

Which of the following would be considered data (and not information)? A) A bar chart B) A single point on a graph C) All of these could be considered data D) A cluster of points in a graph

B) A single point on a graph

The graphic below is an example of a _________. A) Database B) Algorithm C) Primary Key D) Entity Relationship Diagram

B) Algorithm

Extract-Transform-Load (ETL) is the process of what? A) Schema-on-read B) Building a data warehouse C) Organizing big data D) Building a business

B) Building a data warehouse

Which of the following is used to build & manage data structures in an information system? A) Customer Relationship Management (CRM) B) Database Management System (DBMS) C) Supply Chain Management (SCM) D) Enterprise Resource Planning (ERP)

B) Database Management System (DBMS)

Password attacks are designed to ______________ your password and can take many forms. A) Restore B) Decode C) Strengthen D) Encrypt

B) Decode

What is the point of purchase in the Order to Cash business process? A) Select and inspect goods B) Deliver goods/services to customer C) Receive and inspect goods D) Market goods or services

B) Deliver goods/services to customer

_________ is turning plaintext into ciphertext using a algorithm or key. A) Decryption B) Encryption C) Cryptography D) Keying

B) Encryption

Who do cyber-attacks effect? A) Only the executives at an organization B) Every person in contact with an organization C) Only those who work at an organization D) Only those who do business with an organization

B) Every person in contact with an organization

Kyle works in the Receiving Department at Jefferson Appliances. When goods are received from suppliers, Kyle inspects them and sends them to the warehouse. He then forwards a copy of the receiving report to Sarah, the account payables clerk in the Accounting Department. When it is time to pay for the goods, Sarah prepares and mails a check to the supplier. From the perspective of Jefferson Appliances, which business process is being described above? A)Conversion B) Procure to Pay C) Receive and Inspect Goods D) Order to Cash

B) Procure to Pay

Which of the following is considered the point of purchase in the Procure to Pay business process? A) Pay Vendor B) Receive & Inspect Goods C) Receive Payment D) Deliver Goods/Services

B) Receive & Inspect Goods

Social engineering exploits human psychology to manipulate people into making security mistakes and giving away ______________ ______________. A) Confidential information B) Primary keys C) Motherboard code D) Email addresses

A) Confidential information

Which of the following does not usually enforce cybersecurity compliance? A) Customers B) Law authorities C) Governments D) Industry leaders

A) Customers

Which of the following statements is true? A) Data becomes info when it is aggregated. B) Data becomes info when it is disaggregated. C) Info become data when it is aggregated. D) Info & data are the same thing.

A) Data becomes info when it is aggregated.

Humans & computers understand data ________. A) Differently B) Constantly C) Similarly D) Increasingly

A) Differently

A __________ is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry. A) Disruptive technology B) Bot C) Server D) Cryptocurrency

A) Disruptive technology

What is the first step in the Procure to Pay business process? A) Identify a need B) Negotiate a purchase order C) Deliver goods and services to the customer D) Market goods and services

A) Identify a need

All of the data (name, title, address, phone #) about a particular ind. is stored in the same ________? A) Record B) Field C) Attribute D) Transaction File

A) Record

The graphic below is an example of a ___________. A) Repetition algorithm B) Hierarchical database C) Decision algorithm D) Sequence algorithm

A) Repetition algorithm

The NIST Cybersecurity Framework calls for actions that any IT security team can do to create ___________. A) Resiliance-by-default B) maximum gross profit C) Schema-on-read D) Quantum security

A) Resiliance-by-default

_________ means that when we wrote the database, the design was established so that everything was given a place and can then be very nicely organized. A) Schema-on-write B) Big data C) Repository D) Schema-on-read

A) Schema-on-write

Relational databases are an example of __________. A) Schema-on-write databases B) Schema-on-read databases C) Big databases D) Object orientated databases

A) Schema-on-write databases

Phishing is a form of ______. A) Social engineering attack B) Community attack C) All of these D) Symmetric attack

A) Social engineering attack

Which data type would the following be: 865-867-5309 A) Text B) Numeric C) Integer D) Double

A) Text

Which of the following was not listed as one of the top 10 cyber attacks of all time? A) The Columbia University attack B) The Stuxnet attack C) The Melissa virus D) The Sony Pictures attack

A) The Columbia University attack

With a Schema-on-Write database, structure (schema) is given to my database ________. A) Upon creating the database. B) After the data has been captured. C) When it is loaded into the visualization software. D) As data comes into my database.

A) Upon creating the database.

Which of the following is not a type of cloud deployment? A) Virtual cloud B) Hybrid cloud C) Public cloud D) Private cloud

A) Virtual cloud

Which of the following in not a step in the Schema-on-Write database design process? A) All of these are steps in the Schema-on-Write database design process B) Map Conceptual Model into Logical Model C) Create Physical Database using DBMS software D) Map reality into a conceptual model

A) All of these are steps in the Schema-on-Write database design process

The Internet of things (IoT) is a giant network with relationships between which of the following? A) All of these. B) People-people C) Things-things D) People-things

A) All of these.

What is the datatype that is represented when data is able to only be TRUE of FALSE? A) Boolean B) Integer C) String D) Double

A) Boolean


Related study sets

CH 38 STUDY GUIDE allergic disorders

View Set