cis exam two
Where can Logan reserve a domain name for the charity's Web site? a. Registrar b. Google c. ICANN d. Domain name service
a. Registrar
What changes can Amari make to the Web site to generate more traffic from visitors who find the site through online searches? a. SEO b. Web 2.0 c. HTML d. IM
a. SEO
kora has a printer, file server, and three laptops connected through wi-fi to her home router
LAN
davis connects his smartphone to city-funded wi-fi as he walks through downtown area visiting various shops
MAN
Bailey distributes the company database across several servers located in various data centers around the globe to increase availability and resiliency
NoSQL DB
jody builds a database consisting of data from a wide variety of sources for big data analysis
NoSQL DB
Scott has a printer, keyboard, and mouse connected through bluetooth to his laptop
PAN
Michele connects her home router to her ISP's modem
WAN
The primary difference between business intelligence and analytics is that _______________. a. BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future. b. analytics employs techniques like optimization, predictive analysis, and simulation while BI employs descriptive analysis and text and visual analysis. c. a data scientist is required to properly employ analytics while an end user working with a database administrator can employ BI. d. organizations used to employ BI but now are moving to greater use of analytics.
a. BI is used to analyze historical data to tell what happened or is happening right now in your business while analytics employs algorithms to determine relationships among data to develop predictions of what will happen in the future.
A _______________ database enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. a. NoSQL b. normalized c. SQL d. relational
a. NoSQL
The _______________ is a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host. a. URL b. MAC address c. hyperlink d. CS
a. URL
Which of the following is not a function of the database management system _______________? a. database data normalization and data cleansing b. database backup c. database recovery d. database security
a. database data normalization and data cleansing
Genetic algorithm and linear programming belong in the _______________ general category of BI/analytics. a. optimization b. scenario analysis c. heuristics d. predictive analytics
a. optimization
Data mining and time series belong in the general category of _______________ of BI/analytics. a. predictive analytics b. heuristics c. scenario analysis d. optimization
a. predictive analytics
A collection of attributes about a specific entity is a _______________. a. record b. database c. domain d. file
a. record
A network device that directs data packets to other networks until each packet reaches its destination is a _______________. a. router b. hub c. switch d. client/server
a. router
Three advantages associated with a software-defined network include _______________. a. the risk of human error is reduced, overall network support and operations costs are reduced, and new applications can be made available sooner b. The ability to support more concurrent devices, minimal infrastructure changes, and lower latency c. the ability to support exciting new applications, greater bandwidth, and improved security d. lower latency, greater bandwidth, and the ability to support more devices
a. the risk of human error is reduced, overall network support and operations costs are reduced, and new applications can be made available sooner
________ properties of SQL databases help ensure the integrity of data in the database
acid
_______________ are specially denoted text or graphics on a Web page, that, when clicked, open a new Web page containing related content. a. URLs b. Hyperlinks c. XMLs d. MAC addresses
b. Hyperlinks
The _______________ component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation. a. ETL b. Map/Reduce program c. JobTracker d. Hadoop Distributed File System
b. Map/Reduce program
_______________ is a wireless network that connects information technology devices close to one person. a. Mesh network b. Personal area network c. Local area network d. Packet switching
b. Personal area network
In the design of a database, it is not necessary to know how long the data must be stored. True or False?
false
What information does Logan need to advertise in order for volunteers and donators to most easily find the charity's Web site? a. Client-side code b. URL c. IP address d. Web browser
b. URL
_______________ is not a key challenge associated with big data. a. How to derive value from the relevant data b. Which format the data should be stored in c. How to identify which data needs to be protected from unauthorized access d. How to find those nuggets of data that are relevant to the decision making at hand
b. Which format the data should be stored in
A networking approach wherein many clients (end user computing devices) request and receive services from servers (host computers) on the network is _______________. a. peer-to-peer b. client/server c. mesh d. distributed
b. client/server
A collection of instructions and commands to define and describe data and relationship in a specific database is a _______________. a. database schema b. data definition language c. data model d. data manipulation language
b. data definition language
Which of the following is not a key responsibility of the data governance team? a. develop policy that specifies who is accountable for various aspects of the data b. decide which database technology should be used c. define processes for how the data is to be stored, archived, backed up, and protected from cyberattacks d. develop standards and procedures that define who is authorized to update, access, and use the data
b. decide which database technology should be used
The primary advantage associated with the use of an in-memory database to process big data is that _______________. a. it is much cheaper than secondary storage b. it provides access to data at rates much faster than storing data on some form of secondary storage c. it enables the storage of much larger amounts of data d. it enables the use of Hadoop procedures to process the data
b. it provides access to data at rates much faster than storing data on some form of secondary storage
The five broad categories of BI/analytics techniques include _______________. a. heuristics, predictive analytics, simulation, data mining, and linear programming b. optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics c. regression analysis, data mining, Monte Carlo simulation, optimization, and time series analysis d. predictive analysis, scenario analysis, image analysis, optimization, and regression analysis
b. optimization, descriptive analytics, and text and video analysis, simulation, and predictive analytics
While upgrading the Web site, Amari downloads some music files from the Internet to play in the background while a visitor browses the site. However, the playback isn't working right and she keeps getting permissions errors. What technology is likely interfering with music playback? a. HTML b. .NET c. DRM d. VPN
c. DRM
_______________ is a standard page description language for Web pages that tells the browser how to display font characteristics, paragraph formatting, page layout, image placement, hyperlinks, and the content of a Web page. It uses tags, which are codes that tell the browser how to format the text or graphics as a heading, list, or body text. a. XML b. CSS c. HTML d. URL
c. HTML
______________ specifies how to address and route each packet to make sure it reaches the desired destination. a. TCP/IP b. TCP c. IP d. MAC
c. IP
A 64-bit number that uniquely identifies a computer on the Internet is a(n) _______________. a. URL b. MAC address c. IP address d. TCP address
c. IP address
A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced, new applications can be made available sooner, and the risk of human error is reduced. b. Ability to support more concurrent devices, minimal infrastructure changes, and lower latency. c. Lower latency, greater bandwidth, and ability to support more devices. d. Ability to support exciting new applications, greater bandwidth, and improved security.
c. Lower latency, greater bandwidth, and ability to support more devices.
A _______________ differs from a _______________ in that it provides a means to store and retrieve data that is modelled using some means other than the simple two-dimensional tabular relations. a. data mart and NoSQL database b. data mart and data warehouse c. NoSQL database and relational database d. data warehouse and data lake
c. NoSQL database and relational database
The Marketing Dept. needs to maximize consumer interest in the company's new financial services by sending marketing emails, targeted ads, and texts at prescribed intervals throughout the initial process of attracting and building a relationship with a customer. Riad's team has a large amount of data from previous marketing campaigns that they can analyze to develop a recommended schedule, taking into account a large variety of factors about different types of customers. What kind of technique will this task force need to employ in order to make these recommendations? a. Descriptive analytics b. Simulation c. Optimization d. Predictive analytics
c. Optimization
An individual who combines strong business acumen, a deep understanding of analytics, and a healthy appreciation of the limitations of their data, tools, and techniques to deliver real improvements in decision making is a(n) _______________. a. systems analyst b. database administrator c. data scientist d. data steward
c. data scientist
A _______________ is a large database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers. a. relational database b. data lake c. data warehouse d. NoSQL database
c. data warehouse
The _______________ maps the name people use to locate a Web site to the IP address that a computer uses to locate a Web site. a. URL b. MAC address c. domain name system d. IPL
c. domain name system
The purpose of data normalization is to _______________. a. remove any inaccurate or incomplete data from the database b. insert newer, more current data into the database c. eliminate data redundancies and ensure data dependencies make sense d. delete old, obsolete data from the database
c. eliminate data redundancies and ensure data dependencies make sense
Two specific BI/analytics techniques that are in the general category of descriptive analytics are _______________. a. data mining and linear programming b. scenario analysis and time series analysis c. regression analysis and visual analytics d. Monte Carlo simulation and genetic algorithm
c. regression analysis and visual analytics
The Marketing Dept. adds another layer of data analysis to the new project. They'd like to know what follow-up strategies tend to be most effective for customers in specific age and income brackets. They highlight two particular points along the _________ where they most need research-based guidance.
conversion funnel
To complete these tasks, Riad's team will need to pull more information and insights from their existing data sets. What analytics tool will help them explore this data to identify patterns they can use to make predictions about which strategies will work best for each identified population? a. Time series analysis b. Genetic algorithm c. Linear programming d. Data mining
d. Data mining
Which of the following is not a disadvantage of self-service analytics? a. It raises the potential for erroneous analysis. b. It can lead to analyses with inconsistent conclusions. c. It can cause over spending on unapproved data sources and analytics tools. d. It places valuable data in the hands of end users.
d. It places valuable data in the hands of end users.
Which of the following is not an advantage associated with database-as-a-service (DaaS)? a. It eliminates the installation, maintenance, and monitoring of in-house databases. b. It reduces hardware, software, and staffing related costs. c. The service provider can allocate more or less database storage capacity based on an individual customer's changing needs. d. The customer has complete responsibility for database security access and database backup.
d. The customer has complete responsibility for database security access and database backup.
When a site visitor accesses the Web site, which computer will do the work of interpreting the code to display each Web page? a. The charity's client computer b. The charity's server computer c. The cloud provider's server computer d. The site visitor's client computer
d. The site visitor's client computer
A network that connects large geographic regions is a _______________. a. MAN b. bus network c. client/server network d. WAN
d. WAN
Web client software used to view Web pages is called _______________. a. HTML b. CSS c. XML d. browser
d. browser
The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database is called _______________. a. data normalization b. data concurrency control c. data management d. data cleansing
d. data cleansing
A _______________ is a collection of similar entities while a(n) _______________ is a characteristic of an entity. a. domain and record b. database and key c. record and foreign key d. file and attribute
d. file and attribute
The purpose of client-side programming is to _______________. a. deal with the generation of a web page to satisfy the client's request b. pull data from a database stored on the server c. customize website content for individual users d. provide an interface to allow the client computer to request services of the server computer
d. provide an interface to allow the client computer to request services of the server computer
A network topology in which all network devices connect to one another through a single central device called the hub node is a_______________. a. bus network b. mesh network c. packet switching network d. star network
d. star network
The goal of the _________ step of the ETL process is to take the source data from all the various sources and convert it into a single format suitable for processing.
data??
The individual who is responsible for planning, designing, creating, operating, securing, monitoring, and maintaining databases is the
database administration
A(n) _________ is a person, place, or thing (object) for which data is collected, stored, and maintained.
entity
a(n) ________ is a means to offer limited network access to people external to the organization such as selected customers and suppliers.
extranet
A database and a database management system are the same thing. True or False?
false
Data governance is a subset of data management. True or False?
false
JavaScript, VBA Script, HTML, CSS, and Ajax are server-side programming languages, while PHP, C++, Java, Python, and Ruby on Rails are client-side programming languages. True or False?
false
The use of primary keys and foreign keys make it impossible to define relationships between the data in two tables of a relational database. True or False?
false
A(n) _________ is an internal corporate network built using Internet and World Wide Web standards and products.
intranet
Morgan builds tables to hold transaction records for analysis of customer purchase patterns
relational DB
as soon as Olivia completes the withdrawal from her bank account at the ATM, the reduced amount available in her bank account is immediately visible to a bank employee accessing Olivia's account information form the home office
relational DB
An organization may require high-quality data to avoid fines and penalties for non-conformance to regulatory requirements. True or False?
true
Choosing what data to store and where and how to store the data are two key challenges associated with big data. True or False?
true
Encouragement of self-service analytics almost assuredly will eliminate the risk of erroneous analysis and reporting and the problem of different analyses yielding inconsistent conclusions. True or False?
true
Input/output devices provide data and instructions to the computer and receive results from it. True or False?
true
Many Web sites use Cascading Style Sheets (CSS) to define the design and layout of Web pages, and Extensible Markup Language (XML) to define the content, and hypertext mark-up language to join the content with the design. True or False?
true
One of the driving reasons behind the need for data management is to manage risk associated with the misstatement of financial data. True or False?
true
While there are three key components that must be in place for an organization to get real value from its BI and analytics efforts, the one that is first and foremost is the existence of a solid data management program. True or False?
true
Peyton uses big data projections to determine which costumers are most likely to cancel their insurance policy within the next two months
value
The fact that big data comes in many formats and may be structured or unstructured is an indicator of its
variety
abby analyzes data from tweets and other social media sites, online reviews, google searches, YouTube videos, and customer service call recordings to determine how her company's newly launched product line should be positioned for future upgrades
variety
piper relies on live sales data at a major sports event to determine whether to buy additional advertising space on google during the event
velocity
Audrey's company recently experienced extensive backlash for inaccurately predicting the outcome of a key election due to relying too heavily on data built from social media posts
veracity
_______ is a measure of the quality of big data.
veracity
the insurance database Kevin is working on migrating to the cloud consists of more than a trillion records and grows by about 7 million records each dat
volume