IFSM201 2018 December Week 3 Quiz (Few Answers) Latest

Question # 00718427 Posted By: dr.tony Updated on: 03/18/2019 06:50 AM Due on: 03/18/2019
Subject Education Topic General Education Tutorials:
Question
Dot Image

IFSM201 Concepts and Applications of Information Technology

Week 3 Quiz

 

Question 1

Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):

 

Question options:

 

Facilitating better, more informed decisions

 

 

Stimulating cultural change and innovation

 

 

Utilizing information technology to manage data and information

 

 

Impacting performance across an organization

 

 

Building knowledge that can be used to streamline operations and improve processes.

 

 

Question 5         

What are procedures that help keep a database current?

 

Question options:

 

A)

 

Database query procedures

 

 

B)

 

Report generation procedures

 

 

C)

 

File maintenance procedures

 

 

D)

 

Data entry procedures

 

Question 7                         

Does a database report allow the user to enter or modify data in the records? Select Yes or No.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 9                         

Which of the following would be an example of a loss of record confidentiality in a database?

 

Question options:

 

A)

 

You make all your personal information on the Facebook site "public" and available to everyone.

 

 

B)

 

Although you clicked the option to "Do not share information with any other companies or sites" on an online bookstore's website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.

 

 

C)

 

Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.

 

 

D)

 

Your credit card company issued you a new card when your old one was about to expire.

 

Question 11                       

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

 

Question options:

 

A)

 

threat to

 

 

B)

 

vulnerability of

 

Question 12                       

A staff/faculty member uses proprietary (owned and protected by the university) data from the university's student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?

 

Question options:

 

A)

 

Malicious data loss

 

 

B)

 

Intentional data leak

 

 

C)

 

Accidental data loss

 

 

D)

 

Malicious data leak

 

Question 13       

Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?

 

Question options:

 

A)

 

Intentional malicious data loss

 

 

B)

 

Intentional malicious data leak

 

 

C)

 

Accidental malicious data loss

 

 

D)

 

Accidental malicious data leak

 

 

Question 14                       

(True/False). In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

 

Question options:

                A) True

                B) False

 

Question 19                       

When creating a named range in Excel, which of the following rules apply:

 

Question options:

 

The first character of a name can be any character.

 

 

A named range can consist of any single character.

 

 

The name may include spaces.

 

 

The length of name is restricted to 255 characters.

 

 

Question 20       

Which of the following is a valid named range in Excel:

 

Question options:

 

%ABCE

 

 

C

 

 

My Named Range

 

 

AVGCosts

Dot Image
Tutorials for this Question
  1. Tutorial # 00718743 Posted By: dr.tony Posted on: 03/18/2019 06:50 AM
    Puchased By: 2
    Tutorial Preview
    The solution of UMUC IFSM201 2018 December Week 3 Quiz (Few Answers) Latest...
    Attachments
    Week_3_Quiz.docx (56.98 KB)

Great! We have found the solution of this question!

Whatsapp Lisa