Buad 342 Exam 1 study material
The image below is a depiction of what? A) Microsoft's Alpha Swift B) Google's Alpha Go C) Google's Go Pro D) Microsoft's Alpha Go
B) Google's Alpha Go
Which of the following would be an effective question to ask a computer? A) What is the best type of cuisine? B) Is a dog a mammal? C) Is Smokey the best mascot? D) Is UTK the best university?
B) Is a dog a mammal?
"Schema" is a fancy word for ___________. A) Data B) Model or design C) Software or hardware D) Information
B) Model or design
Which physical part of a computer is home to the BIOS? A) CPU B) Motherboard C) RAM D) Hard Drive
B) Motherboard
__________ is an example of social engineering. A) Cryptocurrency B) Phishing C) Motherboarding D) A foreign key
B) Phishing
A packing slip tells us... A) who is responsible for the goods after they leave the warehouse B) What the customer is receiving C) What the customer is returning D) What the customer ordered
B) What the customer is receiving
T/F: NIST security measures are designed to protect against the unknown future.
True
T/F: Procure to Pay and Order to Cash are interrelated. True False
True
T/F: Relational databases are schema-on-write databases?
True
It is estimated that as many as ____% of the activities individuals are paid to perform can be automated by adapting currently demonstrated technologies. A) 50 B) 35 C) 45 D) 40
C) 45
Which of the following must be completed before converting a customer order into a sale? A) A bill of lading & return merchandise authorization form B) A phone call & Facilities tour C) A credit check & inventory check D) Database construction & Computers
C) A credit check & inventory check
What is a data repository? A) An information management software B) A hardware component C) A place where data is stored D) A business process
C) A place where data is stored
Which of their following is an example of a composite attribute? A) Primary Key B) Social security number C) Address D) Phone Number
C) Address
Which of the following computer algorithm types is used when a computer is forced to make a choice between a YES and NO answer and then proceed down a different path based on the answer? A) Repetition algorithm B) Sequence algorithm C) Decision algorithm D) Choice algorithm
C) Decision algorithm
Which of the following is not an information processing event as described in this class? A) Maintain B) Record C) Distribute D) Report
C) Distribute
Which of the following is not an action included in the NIST Cybersecurity Framework? A) Protect B) Identify C) Inquire D) Recover
C) Inquire
_________ contain data awaiting some action to complete their processing. A) Reference Files B) Master Files C) None of these D) Transaction Files
C) None of these
In a relational database, the lines that connect one table to another are called __________. A) Connectors B) Intersections C) Relationships D) Joins
C) Relationships
In an ERD, the links that link database tables together are known as ______? A) Entities B) Attributes C) Relationships D) Connections
C) Relationships
Which is not an example of a cloud computing deployment model? A) Hybrid Cloud B) Public Cloud C) Remote Cloud D) Private Cloud
C) Remote Cloud
__________ simply records the data as-is, without making it conform to a particular model or predefined structure. A) A data engineer B) Information software C) Schema-on-read D) Schema-on-write
C) Schema-on-read
Why must an organization incorporate safeguard into its security compliance plan? A) To ensure more Order to Cash transactions B) To protect the relationships from one table to the next C) To defend against attacks D) To spend more money on security
C) To defend against attacks
Which of the following is not one of the five V's of big data? A) Veracity B) Volume C) Variability D) Variety
C) Variability
In Big Data, differences in the types/sources of data (structured, unstructured or semi-structured) are referred to as: A) Validity B) Velocity C) Variety D) Volume
C) Variety
Which of the following is not a law of cybersecurity listed by Nick Espinosa? A) If there is a vulnerability, it will be exploited B) Everything is vulnerable in some way. C) When in doubt, spend more money. D) Humans trust even when they shouldn't
C) When in doubt, spend more money.
Master Files con train data about? A) Transactions B) Tax rate schedules C) Purchases & Sales D) Customers, inventory, vendors
D) Customers, inventory, vendors
Cybersecurity is the application of technology, processes, & Controls to reduce the risk of _____? A) Compliance B) Cyber assurance C) Burnout D) Cyber attacks
D) Cyber Attacks
_____________ forces a computer to make a choice between a YES or NO answer. Then, process down a path based on that answer. A) Algorithmic programming logic B) Sequence programming logic C) Repetition programming logic D) Decision programming logic
D) Decision programming logic
Which of the following is not a recommended way to project your system from malware? A) Keep your operating system clean by downloading patches. B) All of the above are effective ways to protect against malware. C) Purchase/download antivirus software D) Delete old emails.
D) Delete old emails.
Which of the following is not a typical event in the Procure to Pay business process? A) Receive and Inspect Goods/Services from a Vendor B) Identify a need C) Store and Maintain Goods D) Deliver Goods/Services to Customer
D) Deliver Goods/Services to Customer
Which of the following is not a typical event in the Procure to Pay business process? A) Identify a need B) Store & Maintain goods C) Receive & inspect goods or services from a vendor D) Deliver goods/services to customers
D) Deliver goods/services to customers
RPA allows us to program bots so employees can ...? A) None of these is correct B) Stay on task C) Make more sales D) Do more, faster, with less manual effort.
D) Do more, faster, with less manual effort.
If the Customer_ID field is the primary key in the Customer table, what is Customer_ID called when it shows up in the Orders Table? A) None of these are correct B) Secondary Key C) Primary Key D) Foreign Key
D) Foreign Key
You can get ahead of the digital skills gap by having a __________, where you have the desire and confidence that you can learn anything. A) Strong resume B) Good education C) Fast computer D) Growth mindset
D) Growth Mindset
What happens if/when an organization is not cybersecurity compliant? A) It will lose employees and managers B) It will be forced to shut down C) It cannot make as much money due to the regulations imposed by the federal government D) It risks major litigation, fees, and attacks
D) It risks major litigation, fees, and attacks
___________ enters a network by exploiting a weakness. A) The Internet of Things (IoT) B) A foreign key C) Sensitive information D) Malware
D) Malware
___________ is/are software that is designed to handle high-volume, repeatable tasks. A) Machine Learning B) Internet of Things C) Artificial Intelligence D) Robotic Process Automatrian
D) Robotic Process Automatrian
Which of the following outlines security best practice? A) Security keys, codes, and cards B) Security trainings, guides, and manuals C) Security employees, agents, and managers D) Security standards, regulations, and guidelines
D) Security standards, regulations, and guidelines
Of the options provided, which is the best way to build a cyber defense strategy? A) Spending more money on cyber compliance strategies and employees. B) Using a primary key to lock your computer. C) Retaliating against threat actors. D) Staying informed about threat intelligence.
D) Staying informed about threat intelligence.
T/F: Artificial intelligence and Machine learning are the same concept. True False
False
T/F: ChatGPT is a natural language processing tool driven by Blockchain technology that allows you to have human-like conversations and much more with the chatbot.
False
T/F: Computers think just like people.
False
T/F: Cybersecurity is the application of technology, processes, and controls to reduce the risk of cyber compliance.
False
T/F: Many-to-many relationships are allowed in a relational database.
False
T/F: The General Data Protection Regulation (GDPR) is a data security standard that is required for secure credit card transactions.
False
T/F: To a computer, the criteria of "1" and 1 mean the same thing.
False
T/F: Viruses, worms, trojans, and bots are all part of a class of software called malicious actors.
False
Conversion is the process of...? a) Converting raw materials into finished goods b) Moving inventory from one warehouse to another. c) Buying goods as needed d) Selling goods to customers.
a) Converting raw materials into finished goods
Which of the following is not an information processing event as described in this class? a) Distribute b) Report c) Maintain d) Record
a) Distribute
When one company wants to share its data with another company without human interaction, they should use __________. a) Electronic Data Interchange (EDI) b) Hard Drives c) Email d) Batch Processing
a) Electronic Data Interchange (EDI)
It is important that we focus on business ___________ and technology ___________. a) First; second b) Second; first c) Always; never d) Relationships; software
a) First; second
Order to Cash (OTC) is the __________ business process. a) Selling b) Fastest c) Buying d) Hardest
a) Selling
__________ is collecting data at its point of origin in digital form. a) Source Data Automation (SDA) b) Voice-to-Text c) Information Management d) Real-Time Processing
a) Source Data Automation (SDA)
Which of the following scenarios would most likely benefit from real-time processing instead of batch processing? a) Ticket Processing (sports or airline b) None of these would benefit from real time processing. c) Customer Billing d) Payroll Processing
a) Ticket Processing (sports or airline
Procure to Pay (PTP or P2P) is the __________ business process. a) Selling b) Conversion c) Buying d) Information
d) Buying
Which of the following is considered the point of sale in the Order to Cash business process? a) Receive and Inspect Goods b) Receive Customer Order c) Receive Payment from Customer d) None of these.
d) None of these
__________ is the simulation of human intelligence processes by machines (training machines to perform human tasks). A) Machine learning B) Bot programming C) Deep learning D) Artificial intelligence
D) Artificial intelligence
Cybersecurity compliance is rules intended to protect the __________, __________, and __________ of data. A) Character, Investment, Accuracy B) Quality, Schema, Exposure C) Primary key, Foreign key, Relationship D) Confidentiality, Integrity, Availability
D) Confidentiality, Integrity, Availability
Which of the following would be suitable as a primary key in a database for a table representing a customer? A) Date of Birth B) Attribute C) Social Security Number D) Customer ID
D) Customer ID
Social Engineering is also know as __________. A) Interpretational hacking B) Phishing C) Man-in-the-middle D) Human Hacking
D) Human Hacking
According to Cloudwards, what percentage of data was recovered by paying ransom ware victims in 2021? A) 70% B) 65% C) 75% D) 80%
B) 65%
Which of the following would be considered data (and not information)? A) A bar chart B) A single point on a graph C) All of these could be considered data D) A cluster of points in a graph
B) A single point on a graph
The graphic below is an example of a _________. A) Database B) Algorithm C) Primary Key D) Entity Relationship Diagram
B) Algorithm
Extract-Transform-Load (ETL) is the process of what? A) Schema-on-read B) Building a data warehouse C) Organizing big data D) Building a business
B) Building a data warehouse
Which of the following is used to build & manage data structures in an information system? A) Customer Relationship Management (CRM) B) Database Management System (DBMS) C) Supply Chain Management (SCM) D) Enterprise Resource Planning (ERP)
B) Database Management System (DBMS)
Password attacks are designed to ______________ your password and can take many forms. A) Restore B) Decode C) Strengthen D) Encrypt
B) Decode
What is the point of purchase in the Order to Cash business process? A) Select and inspect goods B) Deliver goods/services to customer C) Receive and inspect goods D) Market goods or services
B) Deliver goods/services to customer
_________ is turning plaintext into ciphertext using a algorithm or key. A) Decryption B) Encryption C) Cryptography D) Keying
B) Encryption
Who do cyber-attacks effect? A) Only the executives at an organization B) Every person in contact with an organization C) Only those who work at an organization D) Only those who do business with an organization
B) Every person in contact with an organization
Kyle works in the Receiving Department at Jefferson Appliances. When goods are received from suppliers, Kyle inspects them and sends them to the warehouse. He then forwards a copy of the receiving report to Sarah, the account payables clerk in the Accounting Department. When it is time to pay for the goods, Sarah prepares and mails a check to the supplier. From the perspective of Jefferson Appliances, which business process is being described above? A)Conversion B) Procure to Pay C) Receive and Inspect Goods D) Order to Cash
B) Procure to Pay
Which of the following is considered the point of purchase in the Procure to Pay business process? A) Pay Vendor B) Receive & Inspect Goods C) Receive Payment D) Deliver Goods/Services
B) Receive & Inspect Goods
Social engineering exploits human psychology to manipulate people into making security mistakes and giving away ______________ ______________. A) Confidential information B) Primary keys C) Motherboard code D) Email addresses
A) Confidential information
Which of the following does not usually enforce cybersecurity compliance? A) Customers B) Law authorities C) Governments D) Industry leaders
A) Customers
Which of the following statements is true? A) Data becomes info when it is aggregated. B) Data becomes info when it is disaggregated. C) Info become data when it is aggregated. D) Info & data are the same thing.
A) Data becomes info when it is aggregated.
Humans & computers understand data ________. A) Differently B) Constantly C) Similarly D) Increasingly
A) Differently
A __________ is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry. A) Disruptive technology B) Bot C) Server D) Cryptocurrency
A) Disruptive technology
What is the first step in the Procure to Pay business process? A) Identify a need B) Negotiate a purchase order C) Deliver goods and services to the customer D) Market goods and services
A) Identify a need
All of the data (name, title, address, phone #) about a particular ind. is stored in the same ________? A) Record B) Field C) Attribute D) Transaction File
A) Record
The graphic below is an example of a ___________. A) Repetition algorithm B) Hierarchical database C) Decision algorithm D) Sequence algorithm
A) Repetition algorithm
The NIST Cybersecurity Framework calls for actions that any IT security team can do to create ___________. A) Resiliance-by-default B) maximum gross profit C) Schema-on-read D) Quantum security
A) Resiliance-by-default
_________ means that when we wrote the database, the design was established so that everything was given a place and can then be very nicely organized. A) Schema-on-write B) Big data C) Repository D) Schema-on-read
A) Schema-on-write
Relational databases are an example of __________. A) Schema-on-write databases B) Schema-on-read databases C) Big databases D) Object orientated databases
A) Schema-on-write databases
Phishing is a form of ______. A) Social engineering attack B) Community attack C) All of these D) Symmetric attack
A) Social engineering attack
Which data type would the following be: 865-867-5309 A) Text B) Numeric C) Integer D) Double
A) Text
Which of the following was not listed as one of the top 10 cyber attacks of all time? A) The Columbia University attack B) The Stuxnet attack C) The Melissa virus D) The Sony Pictures attack
A) The Columbia University attack
With a Schema-on-Write database, structure (schema) is given to my database ________. A) Upon creating the database. B) After the data has been captured. C) When it is loaded into the visualization software. D) As data comes into my database.
A) Upon creating the database.
Which of the following is not a type of cloud deployment? A) Virtual cloud B) Hybrid cloud C) Public cloud D) Private cloud
A) Virtual cloud
Which of the following in not a step in the Schema-on-Write database design process? A) All of these are steps in the Schema-on-Write database design process B) Map Conceptual Model into Logical Model C) Create Physical Database using DBMS software D) Map reality into a conceptual model
A) All of these are steps in the Schema-on-Write database design process
The Internet of things (IoT) is a giant network with relationships between which of the following? A) All of these. B) People-people C) Things-things D) People-things
A) All of these.
What is the datatype that is represented when data is able to only be TRUE of FALSE? A) Boolean B) Integer C) String D) Double
A) Boolean