IFSM201 2018 December All Week Quizess (Few Answers) Latest

Question # 00718431 Posted By: dr.tony Updated on: 03/18/2019 07:03 AM Due on: 03/18/2019
Subject Education Topic General Education Tutorials:
Question
Dot Image

IFSM201 Concepts and Applications of Information Technology

Week 1 Quiz

 

Data 1

Data 2

Question 2

(True/False). Information about a person, place or thing remains the same over time.

 

Question options:

                True

                False

 

Question 3

(True/False). Data is made up by many pieces of information.

 

Question options:

                True

                False

 

Question 7                         

Knowledge flows from the information that has been generated. Which of the following does not necessarily flow from information that has been generated:

 

Question options:

 

The information can provide a better comprehension of a specific problem

 

 

Since information is based on data, and data is just the facts, the knowledge gained from the information is always correct.

 

 

The information can indicate what should be done and how it might be accomplished.

 

 

The information might suggest how one might be personally involved

 

Question 8                         

The following would be an example of which type of data:

 

Responses posted to an open-ended questionnaire related to religious beliefs

 

Question options:

 

Quantitative

 

 

Qualitative

 

 

Categorical

 

Question 12                       

Which of the following would be the best way to collect data regarding where your extended family would like to hold the next family reunion.

 

Question options:

 

A survey you design yourself

 

 

Acquire the data from a web site that lists favorite locations for family reunions

 

 

Acquire the data from a source the Open Access Directory's data repository

 

Question 16       

Based on your readings regarding the volume of big data, choose the list that represents the items in the list in terms of general to specific:

 

Question options:

 

Data Set, Data on the Internet, Big Data, Information in a 1,000-page Research Report

 

 

Big Data, Data on the Internet, Data Set, Information in a 1,000-page Research Report

 

 

Data on the Internet, Big Data, Information in a 1,000-page Report, Data Set

 

Question 18       

Excel files are called:

 

Question options:

 

Worksheets

 

 

Workbooks

 

 

Pages

 

 

Tabs

 

Question 19                       

The Excel Ribbon has three modes – Auto Hide, Show Tabs, and Show Tabs and Command.  Which mode would you choose to enable the worksheet itself to take up the entire screen?

 

Question options:

 

Show Tabs

 

 

Auto-hide

 

 

Show Tabs and Commands

 

IFSM201 Concepts and Applications of Information Technology

Week 2 Quiz  

 

Question 1

Chat messages are an example of:

 

Question options:

 

Information shared by individuals

 

 

Information shared by organizations

 

 

Information shared by firmware/software.

 

Question 6         

If your home network has more than one computer computer or laptop or tablet or other internet enabled device that requires internet access or to use wifi, the component needed to support this is the:

 

Question options:

 

modem.

 

 

router.

 

 

fax machine

 

 

mouse.

 

Question 8         

If you are connecting only one device (computer or laptop or tablet or other internet enabled device) to the network from a single location in your home and do not need wifi, the component needed is:

 

Question options:

 

a modem.

 

 

a router.

 

 

a fax machine.

 

 

a mouse.

 

Question 10       

When discussing home networks, a server or a host is:

 

Question options:

 

the modem.

 

 

the router

 

 

One device that is physically connected to the router and through the router to the internet

 

 

Another computer in the home that needs to be connected

 

 

Question 13       

(True or False). The Internet of Things means web pages with descriptions of devices that can connect through the Internet.

 

Question options:

                True

                False

 

Question 18       

Which of the following would not be considered an example of a pre-defined function?

 

Question options:

 

MIN(A1:A8)

 

 

(A1 + A2)

 

 

SUM (A1 + A2)

 

 

COUNTA (A1:A8)

 

 

Question 20

Before you use the subtotal command, your data must be:

Question options:

 

filtered.

 

 

sorted.

 

 

summarized

 

IFSM201 Concepts and Applications of Information Technology

Week 3 Quiz

 

Question 1

Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):

 

Question options:

 

Facilitating better, more informed decisions

 

 

Stimulating cultural change and innovation

 

 

Utilizing information technology to manage data and information

 

 

Impacting performance across an organization

 

 

Building knowledge that can be used to streamline operations and improve processes.

 

 

Question 5         

What are procedures that help keep a database current?

 

Question options:

 

A)

 

Database query procedures

 

 

B)

 

Report generation procedures

 

 

C)

 

File maintenance procedures

 

 

D)

 

Data entry procedures

 

Question 7                         

Does a database report allow the user to enter or modify data in the records? Select Yes or No.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 9                         

Which of the following would be an example of a loss of record confidentiality in a database?

 

Question options:

 

A)

 

You make all your personal information on the Facebook site "public" and available to everyone.

 

 

B)

 

Although you clicked the option to "Do not share information with any other companies or sites" on an online bookstore's website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.

 

 

C)

 

Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.

 

 

D)

 

Your credit card company issued you a new card when your old one was about to expire.

 

Question 11                       

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

 

Question options:

 

A)

 

threat to

 

 

B)

 

vulnerability of

 

Question 12                       

A staff/faculty member uses proprietary (owned and protected by the university) data from the university's student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?

 

Question options:

 

A)

 

Malicious data loss

 

 

B)

 

Intentional data leak

 

 

C)

 

Accidental data loss

 

 

D)

 

Malicious data leak

 

Question 13       

Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?

 

Question options:

 

A)

 

Intentional malicious data loss

 

 

B)

 

Intentional malicious data leak

 

 

C)

 

Accidental malicious data loss

 

 

D)

 

Accidental malicious data leak

 

 

Question 14                       

(True/False). In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

 

Question options:

                A) True

                B) False

 

Question 19                       

When creating a named range in Excel, which of the following rules apply:

 

Question options:

 

The first character of a name can be any character.

 

 

A named range can consist of any single character.

 

 

The name may include spaces.

 

 

The length of name is restricted to 255 characters.

 

 

Question 20       

Which of the following is a valid named range in Excel:

 

Question options:

 

%ABCE

 

 

C

 

 

My Named Range

 

 

AVGCosts

IFSM201 Concepts and Applications of Information Technology

Week 4 Quiz

Question 2         

All other issues aside, a customer is __________ to do business or increase business with a company if a customer perceives that a service issue is not dealt with fairly.

 

Question options:

 

A)

 

likely

 

 

B)

 

not likely

 

Question 3                         

(True/False). The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.

 

Question options:

                A) True

                B) False

 

Question 11       

(True/False). Whether the focus is acquisition, loyalty, retention, or service, a company's use of CRM results in greater profits for the company.

 

Question options:

                A) True

                B) False

 

Question 12                       

Is the following an example of increasing brand awareness through groups or fans? Select Yes or No

 

When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 15       

Is the following an example of increasing brand awareness through groups or fans? Select Yes or No.

 

Your instant messaging service attaches a message to the bottom of each message inviting the recipient to sign up for this same service provider.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 17       

When you sign on to your favorite social media website, a number of sponsored ads appear on your home page. Which category of social media advertising does this represent?

 

Question options:

 

A)

 

Direct advertising.

 

 

B)

 

Sending ads to a person's network of friends.

 

 

C)

 

Increasing brand awareness through groups or fans.

 

 

D)

 

Using the company's own social networking site.

 

 

E)

 

Viral marketing

 

Question 19       

(True/False). Goal Seek allows to you put various parts together to calculate a result.

 

Question options:

                True

                False

Question 20       

(True/False). To create a Pivot Chart, you would first select the Design tab from the PivotTable Tools.

 

Question options:

                True

                False

IFSM201 Concepts and Applications of Information Technology

Week 5 Quiz

Question 1

(True/False). If the definition of an IS is the medium for recording and storing data, and disseminating information, this would be an IS from a functional perspective.

 

Question options:

                True

                False

 

Question 6         

A decision support information system is which type of system?

 

Question options:

 

Operational

 

 

Tactical

 

 

Strategic

 

Question 7         

Which of the following is an example of a tactical information system?

 

Question options:

 

TPS

 

 

MIS

 

 

DSS

 

IFSM201 Concepts and Applications of Information Technology

Week 6 Quiz

 

Question 1                         

Which of the following statements would be most likely to appear in a professional association's code of ethics for its members?

 

Question options:

 

A)

 

I will be use organizational supplies for official purposes only.

 

 

B)

 

I will maintain the confidentiality of my username and password.

 

 

C)

 

I will use my network account only for the purpose specified in my job description.

 

 

D)

 

I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.

 

Question 2                         

(Yes/No). Is this statement correct: Professional associations develop a code of conduct for members in order to guide and govern the professional behaviors of the members.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 13                       

What is the typical relationship between a user access agreement and an employee code of conduct?

 

Question options:

 

A)

 

An employee code of conduct is a legally binding version of a user access agreement.

 

 

B)

 

An employee code of conduct is usually one part of a user access agreement.

 

 

C)

 

A user access agreement is usually one part of an employee code of conduct.

 

 

D)

 

A user access agreement specifies what penalties will be imposed when an employee violates the employee code of conduct.

 

Question 15                       

(Yes/No). Would the following be considered a violation of user access agreement?

 

Visiting social networking sites during lunch breaks.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

 

C)

 

Maybe

 

Question 23                       

A computer is completely compromised when it won't turn on or operate. What is the best way to fix it?

 

Question options:

 

A)

 

Change all of your passwords in your online accounts

 

 

B)

 

Have it fixed by a computer professional

Dot Image
Tutorials for this Question
  1. Tutorial # 00718747 Posted By: dr.tony Posted on: 03/18/2019 07:04 AM
    Puchased By: 2
    Tutorial Preview
    The solution of UMUC IFSM201 2018 December All Week Quizess (Few Answers) Latest...
    Attachments
    UMUC_IFSM201_2018_December_All_Week_Quizess_(Few_Answers)_Latest.zip (131.17 KB)

Great! We have found the solution of this question!

Whatsapp Lisa