Mikaela Fenton
Quiz by , created more than 1 year ago

Quiz on Reading Exam Questions, created by Mikaela Fenton on 16/05/2018.

24
1
0
No tags specified
Mikaela Fenton
Created by Mikaela Fenton about 6 years ago
Close

Reading Exam Questions

Question 1 of 200

1

What is data governance?

Select one of the following:

  • an approach to managing information across an entire organization

  • a process that spans all organizational business processes and applications

  • a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems

  • generated and captured by operational systems, describe the business’s activities, or transactions.

Explanation

Question 2 of 200

1

Five major parts of database

Select one of the following:

  • Hardware, software, people, procedures, data

  • Hardware, software, Database, CPU

  • Keyboard, monitor, CPU, Physical component, computer

  • Hardware, Procedures, standards, CPU,UPS

Explanation

Question 3 of 200

1

Which of the following include all major parts of a database system?

Select one of the following:

  • Hardware, Software, People, Procedures, Data

  • Hardware and Software

  • People

  • None of above

Explanation

Question 4 of 200

1

what is the 'initial public offering' stands for?

Select one of the following:

  • IPO

  • ICO

  • ITO

  • IMO

Explanation

Question 5 of 200

1

What is a bit?

Select one of the following:

  • The smallest unit of data a computer can process

  • A group of eight bits

  • CRM

  • A logical grouping of characters into a word, a small group of words, or an identification number

Explanation

Question 6 of 200

1

Data governance is an approach to managing information across ________ ?

Select one of the following:

  • An entire organization

  • None of an organization

  • multiple organizations

  • The whole world

Explanation

Question 7 of 200

1

When is data managed most efficiently?

Select one of the following:

  • When it is stored in a database.

  • When it is most accurate.

  • When the data is true.

  • When the data is in its rawest form.

Explanation

Question 8 of 200

1

What is the difference between Master Data and Transaction Data?

Select one of the following:

  • Master data are applied to multiple transactions and are used to categorize, aggregate, and evaluate the transaction data.

  • Transaction data are a set of core data, such as customer, product, employee, vendor, geo- graphic location, and so on, that span the enterprise information systems.

  • Transaction data is a process that spans all organizational business processes and applications.

  • Master data is an approach to managing information across an entire organization.

Explanation

Question 9 of 200

1

How does the planning process for IT applications begin?

Select one of the following:

  • Through organizational strategic planning

  • when it gets approved by manager

  • Never

  • It doesn't have a beginning

Explanation

Question 10 of 200

1

What is normalization of data?

Select one of the following:

  • A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.

  • A method for expanding a database to contain all information related to a certain topic and get the most general view of the information

  • A method that ignores data integrity to optimal processing performance to reduce redundancy within the data set

  • A method of creating a dataset with very little data to get a very general view of the topic at hand

Explanation

Question 11 of 200

1

What is the point of relationships in databases?

Select one of the following:

  • Relationships illustrate an association between entities.

  • Relationships draw connections between the database and real life.

  • Relationships convert computer-readable binary code to a language humans can understand.

  • Relationships ensure that the link between the computer software and hardware remains functional as you use the database.

Explanation

Question 12 of 200

1

What are the two main types of queries commonly used in database operations?

Select one of the following:

  • Structured query language (SQL) and Query by example (QBE)

  • Query inquiry prototype (QIP) and Databased Query Investment (DQI)

  • Query by knowledge (QBN) and Query by theory (QBT)

  • Query through investigation (QTI) or Query by example (QBE)

Explanation

Question 13 of 200

1

Relationships illustrate an association between _____

Select one of the following:

  • Entities

  • Procedures

  • Policies

  • Principles

Explanation

Question 14 of 200

1

What is a binary relationship in database?

Select one of the following:

  • A relationship that exists when two entities are associated.

  • A relationship that exists when no entities are associated.

  • A relationship that exists when three entities are associated.

  • A relationship that exists when four entities are associated.

Explanation

Question 15 of 200

1

What is a binary relationship?

Select one of the following:

  • a relationship between two entities

  • a relationship between ten entities

  • no relationship exists

  • twitter

Explanation

Question 16 of 200

1

What is the uniquely identified field of a database called?

Select one of the following:

  • Primary key

  • Secondary key

  • Foreign key

  • Database key

Explanation

Question 17 of 200

1

What is normalization and its purpose?

Select one of the following:

  • A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance

  • A means of expressing that the value of one particular attribute is associated with a specific single value of another attribute

  • To make the data look normal

  • Only God knows

Explanation

Question 18 of 200

1

What is a structured query language?

Select one of the following:

  • a computer code that allows you to ask questions of a database

  • a schedule builder

  • an online library

  • a computer coding information table

Explanation

Question 19 of 200

1

What is structured query language?

Select one of the following:

  • a computer code that allows you to ask questions of a database

  • a binary computer code

  • a library

  • a schedule builder

Explanation

Question 20 of 200

1

What is an Entity-Relationship Diagram?

Select one of the following:

  • Document that shows data entities and attributes and relationships among them

  • A relationship that exists when three entities are associated

  • A relationship that exists when an association is maintained within a single entity

  • The process of designing a database by organizing data entities to be used and identifying the relationships among them

Explanation

Question 21 of 200

1

What does "SQL" stand for?

Select one of the following:

  • Structured query language

  • Super query language

  • Safe query language

  • Second query language

Explanation

Question 22 of 200

1

What is an example of a "simple vs. composite" attribute?

Select one of the following:

  • Address

  • Name

  • Customer Number

  • Gender

Explanation

Question 23 of 200

1

Which is not a degree of relationship?

Select one of the following:

  • Unitary relationship

  • Unary relationship

  • Binary relationship

  • Ternary relationship

Explanation

Question 24 of 200

1

What is a 1:1. relationship?

Select one of the following:

  • a single-entity instance of one type is related to a single-entity instance of another type.

  • properties that describe the entity’s characteristics.

  • a person, place, or thing that can be identified in the users’ work environment.

  • attributes that are unique to that entity instance.

Explanation

Question 25 of 200

1

Which of the following commands doesn't affect the text font?

Select one of the following:

  • Borders

  • Underline

  • Bold

  • Italics

Explanation

Question 26 of 200

1

What are the 3 advantages of a wireless device?

Select one of the following:

  • They are portable and productive.

  • The production of the device is minimal.

  • They can't communicate with other devices.

  • They are cheap.

Explanation

Question 27 of 200

1

do you like this class

Select one of the following:

  • like

  • dislike

  • you better pick a

  • do not pick b

Explanation

Question 28 of 200

1

What is an example of a "one-to-many" relationship?

Select one of the following:

  • A professor in a university teaching a certain amount of students

  • Students lecturing other students

  • A private tutor teaching a student calculus

  • Many professors in a university teaching a certain amount of students

Explanation

Question 29 of 200

1

When you open PowerPoint and click Blank Presentation, you go directly to:

Select one of the following:

  • Your first slide

  • Themes

  • Layout

  • Backstage view

Explanation

Question 30 of 200

1

What is piracy?

Select one of the following:

  • Copying a software program (other than freeware, demo software, etc.) without making payment to the owner

  • Defense mechanisms

  • Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud

  • Crime in which someone uses the personal informa- tion of others to create a false identity and then uses it for some fraud

Explanation

Question 31 of 200

1

What is exposure in regards to information security?

Select one of the following:

  • the harm, loss, or damage that can result if a threat compromises the information resource.

  • any danger to which a system may be exposed

  • the possibility that the system will be harmed by a threat

  • the degree of protection against criminal activity, danger, damage, and/or loss

Explanation

Question 32 of 200

1

What is one common cause of information breaches

Select one of the following:

  • Employee negligence

  • data redundancy

  • The russians

  • Government Interference

Explanation

Question 33 of 200

1

Which of the following is a example of a unintentional threat to information systems?

Select one of the following:

  • Careless Internet Surfing

  • Espionage or trespass

  • Information Extortion

  • Software Attacks

Explanation

Question 34 of 200

1

What is the differences of a trusted network and an untrusted network?

Select one of the following:

  • A trusted network, in general, is any network within your organization. An untrusted network, in general, is any network external to your organization.

  • A trusted network, in general, is any network external to your organization. An untrusted network, in general, is any network within your organization.

  • Both are any network that within your organization.

  • None of the above.

Explanation

Question 35 of 200

1

what can be defined as the degree of protection against criminal activity, danger, dam- age, and/or loss?

Select one of the following:

  • security

  • computer

  • desk

  • phone

Explanation

Question 36 of 200

1

Security is important to...

Select one of the following:

  • small businesses

  • giant businesses

  • tiny businesses

  • weak businesses

Explanation

Question 37 of 200

1

What is social engineering?

Select one of the following:

  • An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords

  • When an unauthorized individual attempts to gain illegal access to organizational information

  • When an attacker either threatens to steal, or actually steals, information from a company

  • Deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith

Explanation

Question 38 of 200

1

What does a transaction processing system generate?

Select one of the following:

  • Data

  • Photos

  • Excel

  • Microsoft

Explanation

Question 39 of 200

1

What is Cybercrime?

Select one of the following:

  • illegal activities conducted over computer networks, particularly the Internet.

  • The first video ever created.

  • Anti-virus Software.

  • Theft of computers.

Explanation

Question 40 of 200

1

What does CRM stand for?

Select one of the following:

  • Customer Relationship Management

  • Classical Relationship Management

  • Clinical Rotational Mission

  • Customer Rotational Mission

Explanation

Question 41 of 200

1

What is a transaction?

Select one of the following:

  • any business event that generates data worthy of being captured and stored in a database

  • a non-business event

  • a collection of random data

  • anything that is done in a business

Explanation

Question 42 of 200

1

What is a domain name?

Select one of the following:

  • The name assigned to an internet site, consisting of multiple parts, separated by dots, which are translated from right to left

  • The name you give your computer

  • A company that gives you a fancy website name

  • The store you purchase computers from

Explanation

Question 43 of 200

1

Which of the following is true of Sales Force Automation (SFA)?

Select one of the following:

  • It automatically records all of the components of a sales transaction process

  • It includes a contact management system that that automatically sends emails to customers

  • It will duplicate contacts for you

  • It has a sales lead tracking system that tracks how many sales you have made

Explanation

Question 44 of 200

1

What is project scope management?

Select one of the following:

  • Defines the processes that limit and control the work in a project.

  • Is a Turkey.

  • the proper sequencing of data.

  • Resource management and estimating.

Explanation

Question 45 of 200

1

Which of the following explains On-Demand CRM?

Select one of the following:

  • It's hosted by an external vendor in the vendor’s data center.

  • It's a interactive system where communications related to sales, marketing, and customer service activities are conducted through a mobile medium for the purpose of building and maintaining customer relationships between an organization and its customers

  • It help a company manage the important parts of its business in an integrated fashion

  • It's a system which source code is available to developers and users

Explanation

Question 46 of 200

1

What is Project Management Body of Knowledge (PMBOK)

Select one of the following:

  • collection of processes and knowledge areas

  • collection of files

  • collection of scripts

  • collection of music videos

Explanation

Question 47 of 200

1

What are the five processes of project management?

Select one of the following:

  • Initiating,Planning,Executing,Monitoring and Controlling,Closing

  • Planning,Initiating,Executing,Monitoring and Controlling,Closing

  • Monitoring and Controlling,Closing,Planning,Initiating,Executing

  • Planning,Initiating,Monitoring and Controlling,Executing,Closing

Explanation

Question 48 of 200

1

what is the project management body of knowledge?

Select one of the following:

  • collections of processes and knowledge areas generally accepted as the best practice within the project management discipline

  • provides fundamentals of project management

  • no funding =bad idea

  • all of the above

Explanation

Question 49 of 200

1

What does a project management information system do?

Select one of the following:

  • A project management information system (PMIS) can provide a framework to help guide the progress of IT projects.

  • used to create professional-looking slideshows that can be displayed on projectors or big-screen TVs

  • create themes, pictures, comic strips, calendar flashcards.

  • none of the above

Explanation

Question 50 of 200

1

CRM

Select one of the following:

  • is a customer-focused and customer-driven organizational strategy.

  • is a business strategy with transparency

  • is a modern management that communicates with consumers

  • is a business model that consumers satisfied with the products' quality

Explanation

Question 51 of 200

1

In reference to product management, what does "time" refer to?

Select one of the following:

  • the window of opportunity in which a project must be completed to provide a benefit to the organization.

  • actual amount of resources, including cash and labor, that an organization can commit to completing a project.

  • processes that ensure that the project includes all the work required—and only the work required—to complete the project successfully.

  • money

Explanation

Question 52 of 200

1

What does Scope Creep refer to?

Select one of the following:

  • Uncontrolled changes in a project’s scope when the scope of a project is not properly defined, documented, or controlled

  • Changes to the initiation of project

  • The monitoring or controlling part of the project management process

  • A creepy scope

Explanation

Question 53 of 200

1

What are the five distinct phases of the traditional approach to project management?

Select one of the following:

  • Initiation, planning, execution, monitoring and control, and completion.

  • Monitoring, comparing, identifying, documenting, executing

  • Focusing, mastering, building, excelling, establishing

  • None of the above.

Explanation

Question 54 of 200

1

What are the five basic process groups of the PMBOK?

Select one of the following:

  • Initiation, planning, execution, monitoring and control, completion

  • Planning, coding, execution, completion, innitiation

  • Coding, marketing, initiation, monitoring, completion

  • Promoting, selling, monitoring, dealing, planning

Explanation

Question 55 of 200

1

Which of the four is NOT a way of enabling project management success?

Select one of the following:

  • Forcing members of a group to execute a project that they are not comfortable with

  • Focusing on managing strategy and stakeholders instead of exclusively concentrating on budgeting and scheduling

  • Building effective teams by aligning their incentives with the overall goals of projects

  • Mastering technology and project content by securing critical internal and external talent

Explanation

Question 56 of 200

1

The _________ is a collection of processes and knowledge areas generally accepted as best practice within the project management discipline.

Select one of the following:

  • Project Management Body of Knowledge

  • Computer

  • Motherboard

  • The mouse

Explanation

Question 57 of 200

1

What refers to a real-time, wireless connection between a mobile device and other computing environments?

Select one of the following:

  • Mobile computing

  • Mobile commerce

  • Pervasive computing

  • Ubiquitous computing

Explanation

Question 58 of 200

1

Surfing the web anonymously has which negative side effect?

Select one of the following:

  • Web surfing is slower compared to normal surfing

  • You can't purchase items online

  • You can only surf 1 webpage per day

  • No side effects

Explanation

Question 59 of 200

1

What happens to the private information stored in the typical smartphone?

Select one of the following:

  • It is auctioned to advertisers by applications automatically

  • It is secure on your device as long as you are not hacked

  • You may opt in or out of sending private information for a more personalized experience

  • It is secure from hackers on a private server

Explanation

Question 60 of 200

1

_____________ is a thin, flat device using polarized light from a light source and liquid crystals to illuminate colored pixels.

Select one of the following:

  • LCD

  • ABC

  • YMCA

  • XYZ

Explanation

Question 61 of 200

1

What is a good way to keep privacy?

Select one of the following:

  • Not save passwords

  • Save all passwords

  • Share your information with friends

  • Not have a passcode to enter the computer

Explanation

Question 62 of 200

1

What is a proxy server?

Select one of the following:

  • It is a computer to which you connect, which in turn connects to the Web site you wish to visit.

  • It hacks into computers

  • It is a data base

  • none of the above

Explanation

Question 63 of 200

1

You should never post personal information about yourself or your family on any type of social networking sites

Select one of the following:

  • TRUE

  • FALSE

Explanation

Question 64 of 200

1

What supports the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data?

Select one of the following:

  • Transaction processing system (TPS)

  • FAIS

  • Organization Database

  • Expert System

Explanation

Question 65 of 200

1

Define TPS

Select one of the following:

  • to monitor, store, collect, and process data generated from all business transactions

  • To create profit for business

  • Allows for easier tasks within workforce

  • Helps with customer satisfaction

Explanation

Question 66 of 200

1

What is Master Data?

Select one of the following:

  • A Set of Core Data

  • Data about data

  • data about computers

  • data from your Operating System

Explanation

Question 67 of 200

1

Data Warehouse refers to what?

Select one of the following:

  • A multi-dimensional database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

  • A relational or multi-dimensional database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

  • A simple database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

  • A linearized database constructed for quick searching, retrieval, ad-hoc queries, and ease of use.

Explanation

Question 68 of 200

1

What is a plugin

Select one of the following:

  • bundle that helps an application function

  • applications

  • excel charts

  • microsoft office suit

Explanation

Question 69 of 200

1

What are Comparative Reports?

Select one of the following:

  • Reports that compare performances of different business units or times

  • Reports that show a greater level of detail than is included in routine reports.

  • Reports that include only information that exceeds certain threshold standards.

  • None of the above

Explanation

Question 70 of 200

1

what is IT planning?

Select one of the following:

  • organizational strategic plan

  • Tech support

  • Program that organizes

  • all of the above

Explanation

Question 71 of 200

1

what is CRM short for?

Select one of the following:

  • Customer Relationship Management

  • Customer Relationship Manual

  • Customer Relationship Machinery

  • none of them above

Explanation

Question 72 of 200

1

What does CRM stand for?

Select one of the following:

  • Customer Relationship Management

  • Customer Rotational Mission

  • Classical Relationship Management

  • Clinical Rotational Mission

Explanation

Question 73 of 200

1

The practice of marketing additional related products to customers based on a previous purchase is:

Select one of the following:

  • cross-selling

  • upselling

  • bundling

  • none of above

Explanation

Question 74 of 200

1

What is the advantages of on-demand CRM systems?

Select one of the following:

  • Lower costs and a need for employees to know only how to access and utilize the software.

  • Easy to enter.

  • Possibly unreliable vendors.

  • Difficulty in modifying the software.

Explanation

Question 75 of 200

1

What does CRM stand for?

Select one of the following:

  • Customer Relationship Management

  • Courtesy Reply Mail

  • Cause Related Marketing

  • Charge Residue Model

Explanation

Question 76 of 200

1

The drawbacks of on-demand CRM system are all of the following EXCEPT

Select one of the following:

  • lower costs

  • possible reliable vendors

  • difficult to modify software

  • difficult to modify softwar

Explanation

Question 77 of 200

1

What is a database?

Select one of the following:

  • Database is a computer programming

  • Database is a storage of message

  • It is a video game!

  • Database used to connect programs, which is really cool.

Explanation

Question 78 of 200

1

What problems do databases NOT minimize?

Select one of the following:

  • Data redundancy

  • Data repetition

  • Data isolation

  • Data inconsistency

Explanation

Question 79 of 200

1

Organizations store data in what?

Select one of the following:

  • Safe Vaults

  • Databases

  • Guarded facilities

  • Software

Explanation

Question 80 of 200

1

The most popular language used to interact with a database is...

Select one of the following:

  • Standard Query Example (SQE)

  • Structured Query Language (SQL)

  • Query by Example (QBE)

  • Query Lookup Tool (QLT)

Explanation

Question 81 of 200

1

When data are normalized, attributes in each table depend on the _______.

Select one of the following:

  • joint operation

  • primary key

  • structured query language

  • database

Explanation

Question 82 of 200

1

What is an ethernet?

Select one of the following:

  • A keyboard

  • A common LAN protocol

  • A modem

  • A common WAN protocol

Explanation

Question 83 of 200

1

What does SQL stand for?

Select one of the following:

  • Standard Query Language

  • Structured Query Language

  • Structured Quote Literacy

  • Standard Query Literacy

Explanation

Question 84 of 200

1

What is a relationship in the context of this class?

Select one of the following:

  • Something I will never have

  • An association between entities

  • A description of policies, principles, and procedures

  • A query language for interacting with a database

Explanation

Question 85 of 200

1

What does SLQ stand for?

Select one of the following:

  • Software query language

  • Structured query language

  • Structure query learning

  • Software query learning

Explanation

Question 86 of 200

1

Whats is a data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.

Select one of the following:

  • explicit knowledge model

  • relational database model

  • entity-relationship modeling

  • multidimensional structure model

Explanation

Question 87 of 200

1

What does the threat of a trespass entail?

Select one of the following:

  • Occurs when an attacker threatens to steal or steals information from a company

  • Occurs when an unauthorized individual attempts to gain illegal access to organizational information

  • Occurs when a deliberate act that involves defacing an organization's website is made

  • When a device is stolen/used by an attacker

Explanation

Question 88 of 200

1

What is Identity Theft?

Select one of the following:

  • deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith

  • the deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime.

  • stealing computing devices and storage devices

  • used malicious software to infect as many computers worldwide as possible, to the profit- driven, Web-based attacks of today.

Explanation

Question 89 of 200

1

What is a trusted network?

Select one of the following:

  • any network you know the password.

  • any network within your organization.

  • any network external to your organization.

  • all of above are incorrect.

Explanation

Question 90 of 200

1

What is NOT a common deliberate threat to information systems?

Select one of the following:

  • Espionage or trespass

  • Alien invasion

  • Information extortion, identity thefts, and sabotage

  • All of the above are common threats to information systems

Explanation

Question 91 of 200

1

Which of the following is not an example of a deliberate threat to information systems?

Select one of the following:

  • Cyberterrorism

  • Social engineering

  • Espionage

  • Alien software

Explanation

Question 92 of 200

1

What is Scope Creep?

Select one of the following:

  • Increasing the scope of a project without asking first

  • Uncontrolled changes in a projects scope

  • When you don't know the scope of the project

  • When Listerine isn't on sale you have to buy a different brand

Explanation

Question 93 of 200

1

What is one of the most well known centers for customer interaction?

Select one of the following:

  • Customer Services

  • Call Center

  • the mall food court

  • HR

Explanation

Question 94 of 200

1

Which is the first phase in project management?

Select one of the following:

  • Planning

  • Initiation

  • Execution

  • Monitoring and Control

Explanation

Question 95 of 200

1

Which of these is considered "project execution?"

Select one of the following:

  • Defining the problem that the project is intended to solve and the goals that it is to achieve.

  • The work defined in the project management plan is performed to accomplish the project’s requirements.

  • To identify and sequence every project objective and activity associated with that objective.

  • Uncontrolled changes in a project’s scope.

Explanation

Question 96 of 200

1

Which of the following is NOT part of the process for developing an application?

Select one of the following:

  • Clearly defining what the program is to do.

  • Make the app able to store 1 terabyte of data

  • Visualizing the application running on the computer and designing its user interface

  • Defining values for each control's relevant properties

Explanation

Question 97 of 200

1

Choose the best definition for Adware

Select one of the following:

  • Something that you can commonly find de-installation procedures

  • A term applied to programs that either launch advertisements/ re-direct search results to promotional web sites

  • Advertisements you receive via mail

  • None of the above

Explanation

Question 98 of 200

1

What is NOT an example of a short-range wireless network?

Select one of the following:

  • Bluetooth

  • Wi-Fi

  • Ultra-Wideband

  • Near-Field Communications

Explanation

Question 99 of 200

1

Which of the following is NOT an advantage of a wireless device?

Select one of the following:

  • Small enough to carry

  • Copy and pass confidential information easily

  • Provide sufficient computing power to preform productive tasks

  • Can communicate wirelessly with the internet and other devices

Explanation

Question 100 of 200

1

Which command CANNOT be used to do diagnostics?

Select one of the following:

  • qqnorm

  • BFtest

  • shapiro.test

  • leveneTest

Explanation

Question 101 of 200

1

What is Windows Defender?

Select one of the following:

  • Minesweeper

  • Free Antivirus program already installed on windows computers

  • Paid Antivirus program that is specific to Linux

  • Successor to Clippy. Helps write resumes.

Explanation

Question 102 of 200

1

Which is not the way to close the application in mac?

Select one of the following:

  • Use the mouse to click

  • Command+q

  • Command+m

  • Command+c

Explanation

Question 103 of 200

1

What are the key functions of a TPS (Transaction Processing System)?

Select one of the following:

  • Input functions, output functions, storage functions

  • Input functions, Processing the functions, Output functions, Storage functions

  • Processing the functions, storage functions

  • Processing the functions, output functions, storage functions

Explanation

Question 104 of 200

1

Which is not a goal of Customer relationship management?

Select one of the following:

  • Improving business relationships with customers

  • Get customer’s personal information

  • Assisting in customer retention

  • Driving sales growth

Explanation

Question 105 of 200

1

Data Redundancy is defined as

Select one of the following:

  • Various copies of the data do not agree

  • Applications and data are independent of one another

  • The same data are stored in multiple locations

  • None of the above

Explanation

Question 106 of 200

1

What is a primary key?

Select one of the following:

  • a password that gives the user access to all applications in an application suite

  • a type of Macro

  • a field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated and sorted

  • a piece of hardware needed to help laptops run smoothly

Explanation

Question 107 of 200

1

What is NOT a difficulty involved in managing data?

Select one of the following:

  • Data accumulates over time

  • Data is scattered throughout organizations

  • Data is difficult to understand

  • Data is obtained from multiple sources

Explanation

Question 108 of 200

1

When a company examines its needs and performance, it generates a prioritized list of both existing and potential IT applications. This is called?

Select one of the following:

  • IT strategic plan

  • application portfolio

  • organizational strategic plan

  • none of the above

Explanation

Question 109 of 200

1

A data warehouse:

Select one of the following:

  • has data located at a single site.

  • supports a company's day to day operations.

  • stores data used for tactical or strategic decisions.

  • has data distributed across several different sties.

Explanation

Question 110 of 200

1

What does SQL stand for?

Select one of the following:

  • Standard Quarter Language

  • Standard Query Langauge

  • Structured Query Language

  • Structured Question Language

Explanation

Question 111 of 200

1

A database can store:

Select one of the following:

  • Metadata

  • End-user data

  • Both A and B

  • Neither A or B

Explanation

Question 112 of 200

1

What is an example of a primary key?

Select one of the following:

  • First name

  • Date of birth

  • Student ID

  • Town of residence

Explanation

Question 113 of 200

1

Which of the following is incorrect regarding SQL?

Select one of the following:

  • SQL is the most popular database query language

  • SQL uses keywords and statements to perform searches

  • SQL is simpler to use than QBE

  • SQL stands for Structured Query Language

Explanation

Question 114 of 200

1

What is a binary relationship?

Select one of the following:

  • A binary relationship illustrate an association between entities.

  • A binary relationship exists when an association is maintained within a single entity.

  • A binary relationship exists when two entities are associated.

  • A binary relationship exists when three entities are associated.

Explanation

Question 115 of 200

1

What should be used to request information out of data?

Select one of the following:

  • Google

  • Ctrl F

  • Query

  • Help function in program

Explanation

Question 116 of 200

1

Designers plan and create databases through the process of...

Select one of the following:

  • entity–relationship modeling

  • using an entity–relationship diagram

  • both A & B

  • none of the above

Explanation

Question 117 of 200

1

Which of the following answer are not supported by transaction processing system(TPS)?

Select one of the following:

  • monitoring

  • collection

  • drive

  • storage

Explanation

Question 118 of 200

1

Which one is not included in risk management?

Select one of the following:

  • Process of identifying risk

  • Assessing its relative magnitude

  • Wait for the risk to lessen

  • Taking steps to reduce it to an acceptable level

Explanation

Question 119 of 200

1

Which statement about quality control systems is FALSE?

Select one of the following:

  • They can be stored for future analysis

  • They can be interpreted in real time

  • They assess the speed of computers

  • They provide information about incoming material and parts

Explanation

Question 120 of 200

1

Which is not an example of financial transaction management?

Select one of the following:

  • Global stock exchange

  • Managing multiple currencies

  • Auditing

  • Expense management automation

Explanation

Question 121 of 200

1

Which is NOT a basic method of computer security in hardware and software?

Select one of the following:

  • Antivirus

  • Firewall

  • Windows Updates

  • Router Restrictions

Explanation

Question 122 of 200

1

What is the type of system security malware that allows for access to computer, program, or unauthorized service called?

Select one of the following:

  • Frontdoor

  • Sidedoor

  • Backdoor

  • Closed doors

Explanation

Question 123 of 200

1

Which one is an example of an input device?

Select one of the following:

  • monitor

  • printer

  • keyboard

  • projector

Explanation

Question 124 of 200

1

Why is CRM so important to any organization?

Select one of the following:

  • Helps org perform appropriate analysis to see who their customers are and what their wants or needs are.

  • Better assist those wants or needs. More revenue and profits

  • A and B

  • None of above

Explanation

Question 125 of 200

1

Which one of the consumer touch points must an organization CRM system manage?

Select one of the following:

  • Telephone Contact

  • Direct Mailing

  • E-mail

  • Physical contact

Explanation

Question 126 of 200

1

List the phases of the project management process in order.

Select one of the following:

  • Planning, Execution, Monitoring and Control, Completion, Initiation

  • Planning, Initiation, Execution, Monitoring and Control, Completion

  • Initiation, Planning, Execution, Monitoring and Control, Completion

  • Initiation, Execution, Monitoring and Control, Planning, Completion

Explanation

Question 127 of 200

1

What are the three constraints of project management?

Select one of the following:

  • Time, effort, and style

  • Time, cost, and availability

  • Time, cost, and scope

  • Time, supervisors, and budget

Explanation

Question 128 of 200

1

Which of the following is NOT a well known anti-malware product?

Select one of the following:

  • Norton Anti-Malware

  • PC-cillin

  • McAspirin

  • VirusScan

Explanation

Question 129 of 200

1

Which of the following is a sign that your computer is infected?

Select one of the following:

  • Programs run smoothly

  • your computer runs out of memory due to the fact that you have been using it for 10 years

  • a random picture of a unicorn pops up on your screen that makes you smile

  • your computer shuts down when you hit the power button

Explanation

Question 130 of 200

1

Every time you access the internet or use your computer what do you risk?

Select one of the following:

  • Professional information

  • Personal information

  • Both A and B

  • None of the above

Explanation

Question 131 of 200

1

Which is NOT a type of action to protect your information assets?

Select one of the following:

  • Behavioral actions

  • Computer-based actions

  • Software based actions

  • All of these are types of actions to protect information assets

Explanation

Question 132 of 200

1

What is a trojan horse?

Select one of the following:

  • a beneficial program that scans for viruses

  • a fake website intended to steal sensitive user information

  • a malicious program disguised as legitimate software

  • an application that secures sensitive user information

Explanation

Question 133 of 200

1

Acquiring IT applications from outside contractors or external organizations is called

Select one of the following:

  • external reach

  • external plug in

  • outsourcing

  • external sourcing

Explanation

Question 134 of 200

1

What is SSID stand for?

Select one of the following:

  • Social Security Identification

  • Secure Sources Internet driver

  • Service set identifier

  • None of the above

Explanation

Question 135 of 200

1

What does "GUI" stand for?

Select one of the following:

  • Graphical Understanding Internet

  • Graphing Under Ignes

  • Graphical User Interface

  • Graphing User Internet

Explanation

Question 136 of 200

1

Which of the following is not one of the six keys to getting the most from your connectivity?

Select one of the following:

  • Collaborative Workgroups

  • Online Reference

  • Web Surfing

  • Training

Explanation

Question 137 of 200

1

What is the purpose of functional systems?

Select one of the following:

  • To relieve workers of of tedious, repetitive tasks

  • To integrate the activities in an entire business process for efficiency

  • To facilitate the work and generate information for a single department or function

  • To simplify a program by categorizing everything into different steps

Explanation

Question 138 of 200

1

What is Microsoft Access most useful for?

Select one of the following:

  • Making spreadsheets for information

  • Typing word documents

  • Store Information for reference

  • Search the internet

Explanation

Question 139 of 200

1

which one is correct?

Select one of the following:

  • Customer relationship management (CRM) is not important solely for large enterprises.

  • CRM and CRM systems are critical to the success of modern businesses.

  • All of above.

  • None of above.

Explanation

Question 140 of 200

1

When do customers provide feedback?

Select one of the following:

  • When service is really good

  • When service is really bad

  • When service is really good or really bad

  • Never

Explanation

Question 141 of 200

1

Which of the following is not taken into consideration when acquiring a new IT application?

Select one of the following:

  • How much code does the company want to write.

  • Where will the application run?

  • Where will the application originate?

  • When will it be completed?

Explanation

Question 142 of 200

1

What problems do database systems minimize?

Select one of the following:

  • data redundancy

  • data isolation

  • data inconsistency

  • all of the above

Explanation

Question 143 of 200

1

A byte can be which of the following?

Select one of the following:

  • A letter

  • A number

  • A symbol

  • All of the above

Explanation

Question 144 of 200

1

Which of the following is not a characteristic of master data?

Select one of the following:

  • used to categorize

  • used to aggregate

  • evaluate the transaction data

  • copy codes

Explanation

Question 145 of 200

1

If all IT applications require data, what are characteristics of the data?

Select one of the following:

  • High quality

  • High quality accurate and consistent

  • timely and relevant

  • all of the above

Explanation

Question 146 of 200

1

What does IT stand for?

Select one of the following:

  • Insane Tech

  • Information Team

  • Inspiring Technicians

  • None of the answers provided are correct.

Explanation

Question 147 of 200

1

Which is a problem that database systems minimize?

Select one of the following:

  • Data Redundancy

  • Data Isolation

  • Data Inconsistency

  • All of the Above

Explanation

Question 148 of 200

1

Who are the users of the database system?

Select one of the following:

  • System and database administrators

  • End users

  • Database designers

  • All of the above

Explanation

Question 149 of 200

1

Which is not the limitation of file system data management?

Select one of the following:

  • Requires extensive programming

  • System administration is complex and difficult

  • Changing existing structures is difficult

  • All of them are limitations of file system data management.

Explanation

Question 150 of 200

1

Why should we use open source software in business?

Select one of the following:

  • Flexibility

  • Cost Efficiency

  • Security

  • All of the above

Explanation

Question 151 of 200

1

Techniques for illegally obtaining personal information include

Select one of the following:

  • Stealing mail or dumpster diving

  • Stealing personal information in computer databases

  • Impersonating a trusted organization in an electronic communication

  • All above

Explanation

Question 152 of 200

1

database system minimize which following is not problems

Select one of the following:

  • data redundancy

  • data isolation

  • data security

  • non of above

Explanation

Question 153 of 200

1

What are the difficulties of managing data

Select one of the following:

  • The amount of data increases greatly as time goes by

  • data are scattered throughout organizations

  • Data are collected by many individuals using various methods and devices

  • all the above

Explanation

Question 154 of 200

1

Which of the following is not a binary relationship?

Select one of the following:

  • one-to-one relationship

  • one-to-many relationship

  • many-to-many relationship

  • Open relationship

Explanation

Question 155 of 200

1

Which of the following statement(s) is true?

Select one of the following:

  • Business problems span multiple functional areas.

  • There is no uniform strategy for conducting a cost-benefit analysis.

  • Computers are irrelevant in society today.

  • A and B

Explanation

Question 156 of 200

1

Which of the following are problems with Non-ERP Systems?

Select one of the following:

  • Long term maintenance costs are expensive

  • Ability to engage in process re-engineering is limited

  • Strategic decision making is not supported

  • All of the above

Explanation

Question 157 of 200

1

Which one of the following is a basic skill to create and run a slide show?

Select one of the following:

  • Using Various design views

  • Using different slides layout

  • Running a slide show and adding, sizing and moving text, Cliparts and graphics

  • All of the above

Explanation

Question 158 of 200

1

Which element is not apart of the table of contents in PowerPoint?

Select one of the following:

  • Before you start

  • Building Blocks

  • Slide design'

  • Query

Explanation

Question 159 of 200

1

What describes WLAN?

Select one of the following:

  • It is same as the standard local network

  • Devices will not connected by wires

  • Increase productivity

  • All of the above

Explanation

Question 160 of 200

1

Which is not a purpose of normalization?

Select one of the following:

  • Ensure minimum redundancy

  • Keep maximum data integrity

  • Allow for optimal processing performance

  • Form query relationships

Explanation

Question 161 of 200

1

What is an ER Diagram?

Select one of the following:

  • A emergency response device Diagram

  • An electrical router Diagram

  • A electrical rope Diagram

  • An Entity- Relation ship Diagram

Explanation

Question 162 of 200

1

What are applications of technological knowledge?

Select one of the following:

  • home

  • business

  • work

  • all of the above

Explanation

Question 163 of 200

1

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure...

Select one of the following:

  • minimum redundancy

  • maximum data integrity

  • optimal processing performance

  • all of the above

Explanation

Question 164 of 200

1

Step not used for the process of entity-relationship modeling

Select one of the following:

  • Background

  • Activity

  • Deliverable

  • Model

Explanation

Question 165 of 200

1

The exposure of an information results in what to the resource?

Select one of the following:

  • Harm

  • Loss

  • Damage

  • All of the above

Explanation

Question 166 of 200

1

These are some signs to look for if you think your computer is infected by malware:

Select one of the following:

  • Your computer shuts down unexpectedly by itself

  • Your computer does not start normally

  • Your computer runs out of RAM

  • All the above

Explanation

Question 167 of 200

1

Why shouldn't we use animations?

Select one of the following:

  • You can't use animation in a powerpoint

  • Animations can harm your computer

  • Animation is not a important thing

  • Because PC and mouse are far from you while you are doing presentation so there is no point

Explanation

Question 168 of 200

1

Identify the answer that is a deliberate threat to information system.

Select one of the following:

  • Sabatoge or Vandalism

  • Identity theft

  • Software attacks

  • All of the above

Explanation

Question 169 of 200

1

All of the following except what are functions of transaction processing system?

Select one of the following:

  • Monitoring

  • Processing

  • Storage

  • Analyzing

Explanation

Question 170 of 200

1

which of following system is not a example of information system?

Select one of the following:

  • Inventory Management

  • Quality Control

  • product life cycle Management

  • Human resource System

Explanation

Question 171 of 200

1

What are some types of deliberate threats to information system?

Select one of the following:

  • Software attacks.

  • Cyberterrorism and Cyberwarfare.

  • Alien software.

  • All of the above.

Explanation

Question 172 of 200

1

Security can be defined as the degree of protection against:

Select one of the following:

  • criminal activity

  • danger

  • Damage and/loss

  • all of the above

Explanation

Question 173 of 200

1

Which of the following are not types of reports discussed in the text?

Select one of the following:

  • Routine reports

  • Ad hoc reports

  • Exception reports

  • Sale reports

Explanation

Question 174 of 200

1

When was the first U.S. cyberwar directive signed?

Select one of the following:

  • 1930

  • 1965

  • 1985

  • 2012

Explanation

Question 175 of 200

1

What is Computer Virus?

Select one of the following:

  • it is always attached to softwares

  • may or not may take bad actions on the computer

  • it can destroy files and folder in your computer

  • all of these above

Explanation

Question 176 of 200

1

How to secure your wireless network?

Select one of the following:

  • Change the device password to something unique.

  • Turn SSID off.

  • Enable encryption such as WPA.

  • All of above

Explanation

Question 177 of 200

1

Which is included in Infectious Control?

Select one of the following:

  • Disconnect from the internet both LAN & WAN

  • Update your antivirus

  • Check your antivirus software manufacturer’s website for specific procedures and software for particular viruses

  • All of above

Explanation

Question 178 of 200

1

What do phishing attacks enable thieves to do?

Select one of the following:

  • Steal your identity

  • Steal your credit card numbers

  • Steal your passwords

  • All of the above.

Explanation

Question 179 of 200

1

What is the purpose of transaction processing system?

Select one of the following:

  • Background

  • Activity

  • Deliverable

  • All of the Above

Explanation

Question 180 of 200

1

Which of the following is a type of software attack?

Select one of the following:

  • Virus

  • Worm

  • Phishing attack

  • All of the Above

Explanation

Question 181 of 200

1

Relationships portray an association between entities. The degree of a relationship shows the number of entities associated with a relationship. Which of these is not considered a relationship?

Select one of the following:

  • unary relationship

  • binary relationship

  • ternary relationship

  • All of these are considered relationships.

Explanation

Question 182 of 200

1

Which one is benefit of the Operational CRM system

Select one of the following:

  • A 360° view of each customer

  • Efficient, personalized marketing, sales, and service

  • The ability of sales and service employees to access a complete history of customer interaction with the organization, regardless of the touch point

  • all above

Explanation

Question 183 of 200

1

Projects that are far over budget and past deadline resulting in abandonment are called?

Select one of the following:

  • Bad Projects

  • Disasters

  • Efficiently planned projects

  • Runaway projects

Explanation

Question 184 of 200

1

Which of the following is NOT one of the five distinct phases of project management?

Select one of the following:

  • Initiation

  • Planning

  • Execution

  • Printing

Explanation

Question 185 of 200

1

what the benefits CRM systems provide had?

Select one of the following:

  • Efficient, personalized marketing, sales, and service

  • A 360° view of each customer

  • The ability of sales and service employees to access a complete history of customer interaction with the organization, regardless of the touch point

  • All of above

Explanation

Question 186 of 200

1

which one is the triple constraints of project management

Select one of the following:

  • scope

  • time

  • cost

  • All of these answers are correct.

Explanation

Question 187 of 200

1

what are the risks while using the Cloud Computing?

Select one of the following:

  • battery

  • privacy and security

  • criminal use of cloud computing

  • both B and C

Explanation

Question 188 of 200

1

According to the textbook, which of the followings is one of the knowledge areas of Project Management Body of Knowledge (PMBOK)?

Select one of the following:

  • Project Integration Management

  • Project Scope Management

  • Project Time Management

  • All of the above

Explanation

Question 189 of 200

1

Which of the following is NOT an example of one of the triple constraints of project management?

Select one of the following:

  • Time

  • Cost

  • Scope

  • Innovation

Explanation

Question 190 of 200

1

Which of the following is NOT a factor of triple constraints of project management?

Select one of the following:

  • time

  • cost

  • scope

  • activity

Explanation

Question 191 of 200

1

What is Electronic Surveillance?

Select one of the following:

  • The principles of right and wrong

  • Using software to block inappropriate websites

  • responsibility, accountability, liability

  • tracking people's activity with the aid of computers

Explanation

Question 192 of 200

1

What type of functional area information systems (FAISs) is??

Select one of the following:

  • Accounting

  • Marketing

  • Human resource

  • All of above

Explanation

Question 193 of 200

1

Which one of the following is considered a sign to look for if you believe your computer is affected with malicious software or malware?

Select one of the following:

  • your computer shuts down unexpectedly by itself

  • programs take longer to load than normal

  • your computer does not start normally

  • all of the above

Explanation

Question 194 of 200

1

Which one is the antispam software?

Select one of the following:

  • SpamKiller

  • SpamGourmet

  • SpamAssassin

  • All of the above

Explanation

Question 195 of 200

1

A Trojan Horse is associated with all of the following except...

Select one of the following:

  • Phishing attack

  • Robot

  • Zombie

  • Romans

Explanation

Question 196 of 200

1

What actions to take to protect your information assets?

Select one of the following:

  • Background

  • Activity

  • Deliverable

  • All of the above

Explanation

Question 197 of 200

1

Which of the various computer-based actions can you take to protect your information assets?

Select one of the following:

  • Run free malware scans on your computer.

  • Have a firewall on your computer

  • Never download any files or software over the internet from websites that you do not know

  • All of the above

Explanation

Question 198 of 200

1

When you discard mail or old records, you should use a

Select one of the following:

  • Single-cut shredder

  • Cross-cut shredder

  • Confetti shredder

  • B and C are both proper methods

Explanation

Question 199 of 200

1

Which of the following is not a sign that your computer is infected?

Select one of the following:

  • Programs take longer to load than usual.

  • Your email sends messages to all contacts in your address book on its own.

  • Your system continually runs out of main memory.

  • You can download files as usual.

Explanation

Question 200 of 200

1

IT is helpful in:

Select one of the following:

  • Performing specific tasks on a computer

  • Allowing users to gain access to programs

  • Making more efficient use of a computer

  • All of the above

Explanation