100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

C182 Practice Exam A Questions and Answers (2022)

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
12-12-2022
Written in
2022/2023

C182 Practice Exam A Questions and Answers C182 Practice Exam A 1. Marcus has a summer job working at a real estate agency. He is entering client addresses into the company’s computer system. At which stage of the DIKW hierarchy is Marcus working? 1/1 Data Information Knowledge Wisdom Data 2. Which software is run automatically rather than by the end user? 1/1 Productivity Software Microsoft Office Software System Software System Software 3. Which account is also referred to as root or superuser? 1/1 The Users Account The Administrator Account The Security Account The Network Accountant The Administrator Account 4. Which of the following best describes a hierarchical database format? 0/1 Data are modeled using parent-child relationships. The database format is one of the most commonly used today. Database records that do not have relationships with other tables. The database format is one of the most commonly used today. Correct answer Data are modeled using parent-child relationships. 5. Which of the following would NOT be the responsibility of the system administrator? 1/1 Providing support to users Creating new user accounts Installing new file server hardware and software Answering e-mails from potential customers. Answering e-mails from potential customers. 6. Which of the following is an example of a relational database? 0/1 A database that is broken up so that one part of a record is in one location in the database and another part is in a different branch. A database containing student records with fields such as Student ID, First Name, Last Name, Major, and GPA that links to other databases in the University’s system. Records in the database are separated by some delimiter, such as comma or a line. Correct answer A database containing student records with fields such as Student ID, First Name, Last Name, Major, and GPA that links to other databases in the University’s system. 7. Which of the following describes the duties of a web administrator? 1/1 Ensures firewalls are up to date, researches current security threats, and designs websites. Duties include connecting devices on an organization’s network, configuring individual machines to access the network, working with the network hardware, and troubleshooting. Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server. Designs databases, maintains databases, provides database access to users, selects and supports database management systems. 8. Which of the following statements accurately describe IT certifications? 1/1 IT certificates are generally not standardized and often not recognized by major companies. There are no specific IT certificates available for web administrators. Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area. IT certificates are easy to earn and don’t require specialized training. A database that is broken up so that one part of a record is in one location in the database and another part is in a different branch. Duties include maintaining and securing the web server. Also responsible for troubleshooting the web server. Earning an IT certificate indicates an IT professional has a thorough background in a specific IT area. 9. Which of the following is NOT an important characteristic of an IT professional? 0/1 Strong math background and programming skills Ability to troubleshoot Desire to continually learn. Good communication skills – both oral and written Good communication skills – both oral and written Correct answer Strong math background and programming skills 10. As a new sales manager, Sylvia is studying the historical and current sales report numbers to determine the top three salespersons of the year. At which stage of the DIKW hierarchy is Sylvia working? 1/1 Wisdom Knowledge Information Data 11. Which of the following statements describes the difference between information systems and information technology? 0/1 There is no difference between information systems and Information Technology. An information system does not have to use computer hardware or software; whereas information technology requires the use of hardware and software. Information Technology is a broader concept and information systems provide the infrastructure for information technology. An information system requires the use of computer hardware and software; whereas information technology refers only to networks and tools that facilitate communication. Correct answer An information system does not have to use computer hardware or software; whereas information technology requires the use of hardware and software. 12. Which of the following statements best represents the relevant characteristic of quality data? 0/1 The data used applies to the question being answered. The data has been gathered using consistent, detailed collection processes. The data has been inputted correctly and is accurate for its intended use. The data is current enough to still serve its purpose for being accessed. Correct answer The data used applies to the question being answered. 13. Which of the following is/are true of the IPOS cycle? 1/1 If there will be no future need for certain information, a user can go straight from the input stage to the output stage without going through the processing and storage stages. Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or meet specific needs. As long as the data is entered correctly, there is no need to store it. The reason for storage is to be able to prove what has been entered. The steps of the IPOS cycle can occur in any order. Knowledge Information Technology is a broader concept and information systems provide the infrastructure for information technology. The data has been inputted correctly and is accurate for its intended use. Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions or me 14. Which of the following is an accurate definition of a computer system? 1/1 A computer system is a collection of hardware and software components that work together to meet the needs of the user. A computer system is hardware devices that work together. A computer system consists of the operating system that tells the computer how to execute commands. A computer system is a network that allows computers, tablets, smartphones, etc. to connect to the Internet. A computer system is a collection of hardware and software components that work together to meet the needs of the user. 15. Which of the following would NOT be considered hardware? 0/1 Monitor. Central processing unit. Keyboard. Word processor. Keyboard. Correct answer Word processor. 16. Select the statement that best describes the difference between software and hardware. 0/1 Computer software consists of drivers and their associated devices whereas computer hardware includes only internal system devices. Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives. Computer software consists of applications such as word processing and spreadsheet programs whereas computer hardware includes the operating system. Computer programming language instructions can be very broad and general whereas computer hardware specifications must be very specific. Computer software consists of applications such as word processing and spreadsheet programs whereas computer hardware includes the operating sys Correct answer Computer software is developed by writing a program using programming language whereas computer hardware is the physical components such as memory modules and disk drives. 17. Which of the following would NOT require the use of a network? 1/1 Computers in an office sharing the same printer. Loading a statistical program on your personal computer. Schools turning in attendance files to the district office. Gourmet chocolate being sold on the Internet. Loading a statistical program on your personal computer. 18. Which type of software includes programs such as Microsoft Word and PowerPoint? 1/1 Daemons Application Server System Application 19. What is a program that will allow a computer to easily access the hardware and software of the computer system? 1/1 Server Operating system Mobile device Workstation Operating system 20. __________ software works with hardware to provide a network service 0/1 Application Windows Operating System Database Management System Windows Server Application Correct answer Windows Server Feedback see Module 13: Types of Software page 76 21. What is another term that defines a script? 0/1 Pascal Compiler Machine code Interpreted program Pascal Correct answer Interpreted program Feedback see Module 15: Programming and Scripting 22. In the _______ design phase of the SDLC (system development life cycle) the system is described in abstract terms using modeling tools such as flowcharts, UML and entity-relationship diagrams. 0/1 Analysis Logical Physical Maintenance Analysis Correct answer Logical Feedback see Module 22: SDLC page 135 23. Software testing conducted by a client or a specific department within an organization, is called: 0/1 End-User Beta Alpha User Acceptance End-User Correct answer Alpha Feedback See Module 22: SDLC page 136 24. This phase of testing consists of using actual (i.e., live) data in the real working environment 0/1 Alpha Beta End User User Agreement Alpha Correct answer Beta Feedback see Module 22: SDLC page 136 25. ________ ________ occurs when the old system is “turned off” and the new system is “turned on” at a specific date and time. 0/1 Parallel Conversion Pilot Conversion Direct Conversion Phased Conversion Phased Conversion Correct answer Direct Conversion Feedback see Module 22: SDLC page 137 26. For the following scenario, which government regulation would be relevant? Andrea is employed by the Deming Foundation, a non-profit seeking to help increase graduation rates in rural communities. She has been working hard to identify and recruit donations from wealthy businessmen and companies and is seeing a great deal of success. While she quickly runs into the grocery store for a few items, someone steals her laptop from her car, containing all her work files. 1/1 Security Breach Notification Laws. Computer Matching and Privacy Protection Act of 1988. Electronic Communication Privacy Act of 1986. The Family Educational Rights and Privacy Act of 1974. 27. During ____ _____ the output of the new system is compared with the output of the old system 0/1 Pilot Conversion Phased Conversion Direct Conversion Parallel Conversion Correct answer Parallel Conversion Feedback see Module 22: SDLC page 137 28. During ____ _____ the old system continues to offer some functionality until all subsets of the new system have been turned on and the new system is confirmed to be working effectively. 1/1 Parallel Conversion Phased Conversion Pilot Conversion Direct Conversion Security Breach Notification Laws. Direct Conversion Phased Conversion 29. This form of cloud computing is offered as a service by some major organizations, such as Amazon and Google, and used extensively by app developers. Its intent is to be able to quickly and reliably develop and deliver applications 0/1 SaaS (Software as a Service) IaaS (Infrastructure as a Service) PaaS (Platform as a Service) SaaS (Software as a Service) Correct answer PaaS (Platform as a Service) Feedback see Module 24: Current and Emerging Technologies page 148 30. With ________ an IT department resources (i.e. servers, data storage) are located outside of the organization and are accessible by anyone, anywhere 0/1 SaaS (Software as a Service) PaaS (Platform as a Service) IaaS (Infrastructure as a Service) PaaS (Platform as a Service) Correct answer IaaS (Infrastructure as a Service) Feedback see Module 24: Current and Emerging Trends page 148 31. What is the correct order of project phase for Project Management? 1/1 Planning, Executing & Controlling, Closing, Initiation Executing & Controlling, Closing, Initiation, Planning Initiation, Planning, Executing & Controlling, Closing Initiation, Planning, Executing & Controlling, Closing 32. During this phase of Project Management, the projects scope and requirements are defined 1/1 Executing and Controlling Initiation phase Planning phase Closing phase Initiation phase 33. The role of a ______ ______ is to respond to requests most typically come from web browsers, such as HTTP 1/1 Print server File server Web server FTP server web server 34. This server addresses protocols such as: IMAP, POP3, SMTP, HTTP, MAPI, and MIME (email protocols) 0/1 Web Server Email server FTP server File Server Web Server Correct answer Email server Feedback See Module 13 page 82 35. In this network topology ALL devices have a single point-to-point connection with a central device 1/1 RING network BUS network STAR network STAR network 36. This type of software is made freely available as source code. 1/1 Open source software Public domain software Shareware software Freeware software open source software 37. This software protection will protect an individual’s original work (tangible form) for the author’s life + 70 years 0/1 GNUs Public License Patent Fair Use Copyright GNUs Public License Correct answer Copyright Feedback See Module 14 page 86 38. This license protects the creation of inventive concepts as well as the tangible work product for 20 years at the date of filing * 1/1 Hardware License Software License Copyright Patent Patent 39. The _______ keyword in SQL is used to inform the DBMS what fields or attributes are of interest (and where they are located, i.e. which table/relation they can be found in). * 0/1 FROM SELECT WHERE WHERE Correct answer SELECT Feedback See Module 18 page 113 40. The ______ keyword in SQL is used to inform the DBMS what tables are to be interrogated by the query and, if more than one table contains the data of interest, how they are to be combined or joined. 0/1 INTO WHERE SELECT FROM INTO Correct answer FROM Feedback See Module 18 PAGE 113 41. The _____ keyword in SQL is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query. 0/1 SELECT clause FROM clause WHERE clause FROM clause Correct answer WHERE clause Feedback See Module 18 page 113 42. All of the following are high-level languages except for: 0/1 JavaScript BASIC Java C++ BASIC Correct answer JavaScript Feedback See Module 15 page 93 43. Which of the following is the correct function of the compiler? 1/1 Every instruction is translated first and then executed and this must be done every time the program is run. Takes the most recently entered instruction, translates it into machine language, and executes it. Translates the entire program, creating an executable program, which can be run at a later time. Allows programmers to more easily write programs. Translates the entire program, creating an executable program, which can be run at a later time. 44. A program written in a high-level language must be converted into __________ code to be executed by the computer. * 0/1 JavaScript Machine High Level Language C++ J avaScript Correct answer Machine Feedback See Module 15 page 92 45. A collection of organized databases is called? * 1/1 A database Management System A high-level program A data warehouse a data warehouse 46. Which two are both types of scripting languages? 1/1 ASP and Python C++ and Pascal Python and C++ Pascal and ASP ASP and Python 47. This type of database is the most common format for storing data as it provides users with a great deal of flexibility, allowing for multiple tables (relations). * 1/1 Flat File Hierarchal Relational Relational 48. This database structure format organizes data using a tree-like or organizational chart type structure (i.e. parent-child structure) * 1/1 Flat File Hierarchal Relational 49. Which of the following types of information present a threat to someone’s privacy? * 1/1 Secret business plans Names and addresses in the phone book Student ID and credit card numbers Phone numbers and e-mail addresses 50. In strategic risk analysis, what is the final step? * 1/1 Develop and enact policies against threats Identify vulnerabilities Prioritize risks Determine threats Other: 51. Learning about social engineering and how to protect passwords is ___. 0/1 Education Access control Authentication Authorization Correct answer Education Feedback Refer to page 72 in the Acrobatiq resource on best security practices. 52. File access rights 1/1 May be provided by biometrics Are a password to log in Will include files that the user can access Will prove who you are Hierarchal Student ID and credit card numbers Develop and enac Develop and enact policies against threats Access control Will include files th 53. A local area network (LAN) 0/1 Allows hardware sharing between two offices Allows software sharing between two offices Allows hardware sharing within one office Allows hardware sharing between offices in geographically dispersed locations Allows hardware s Correct answer Allows hardware sharing within one office Feedback Check out page 59 in the Acrobatiq resource. 54. Which device permits packet switching so that a message can be routed to the next link in a network? 1/1 Router DNS LAN IP Address Router 55. Which of the following best describes the Internet? 1/1 In order to communicate over the Internet, a host does not need to run the IP network protocol. The Internet is an isolated computer network. The Internet uses circuit switching. The Internet is a global network of networks. The Internet is a g 56. All of the following are parts of a URL except for: 0/1 LAN Protocol Host name TLD TLD Correct answer LAN Feedback Page 64 in the Acrobatiq will show you the components of a URL. 57. Which of the following statements is not part of the path a message takes from one computer to another? 1/1 All packets of the same message are combined together as they arrive. A message is divided into one or more packets. The packet(s) are given the final destination address. All messages require a response from the destination machine to the sending device. All messages requ 58. Your site’s Internet point of presence is called a: 0/1 Gateway Router IP packet DNS server table Router Correct answer Gateway Feedback The explanation for this question can be found on page 65 in your Acrobatiq resource. 59. Which of the following aligns IT goals and organization goals? 1/1 Breaking organization goals into smaller goals will not relate to IT activities Improving IT infrastructure to support rapid expansion to capture less market share IT goals include cloud computing and organization goals include real-time communication to contain costs while scaling quickly Ensuring privacy and security of data shared by customers using cloud computing IT goals include cl 60. What is IT management responsible for? 1/1 Being the project manager Installation and maintenance Developing databases Maintaining websites Being the project 61. IT personnel who understand both the technical IT infrastructure and management of the business fill which role? 1/1 Board of Directors IT entry-level IT management IT specialists IT management 62. What is an advantage of outsourcing? 1/1 Hiring more employees Less control over the subject Losing the opportunity for internal growth Cost-effective if time is constrained Cost-effective if tim 63. A company’s ability to recover after a disaster is directly related to which of the following? 1/1 IT department Marketing strategy Financial plan Business continuity plan Business continui 64. Which of the following is the final step in creating a BCP plan? 1/1 Assessing critical operational activities Developing threat and risk assessments Testing the plan Determining how quickly activities can resume Testing the plan 65. An operating system will write and change data to multiple hard drives at the same time so that if something happens to one hard drive, another hard drive is available to speed up data recovery. This statement best describes which of the following? 1/1 Backup media Image backups Data mirroring Incremental backups Data mirroring 66. What is the definition of a Platform as a Service (PaaS)? 0/1 A Platform as a Service is the ability to store data and aid communication for remote teams. A Platform as a Service makes it possible for businesses to access and use software through the Internet. A Platform as a Service is the ability to quickly and consistently develop and deliver applications. A Platform as a Service makes it possible to have all of your businesses IT departments needs sited outside of the organization and available to anyone, wherever. A Platform as a S Correct answer A Platform as a Service is the ability to quickly and consistently develop and deliver applications. Feedback Page 148 in the Acrobatiq resource explains PaaS in detail. 67. The use of IT has allowed businesses to have __________. 1/1 More tools for communicating Fewer privacy and security concerns Small customer bases Local reach More tools for com 68. During which generation did computers begin to see widespread use in business? 1/1 Fourth generation First generation Third generation Second generation Third generation 69. Which of the following high-level programming languages was created to be business-oriented? 0/1 SNOBOL FORTRAN COBOL LISP FORTRAN Correct answer COBOL 70. Which of the four main components of a computer is described by this statement: This component executes all of the arithmetic and logic operations and is responsible for controlling (commanding) all of the components in the computer. 1/1 I/O subsystem CPU Bus CPU 71. Which of the following best describes the differences between memory and the hard drive? 0/1 Memory is an internal component that directly or indirectly connects computer components; whereas the hard drive is an external storage device. Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time. Memory carries out basic instructions that operate a computer; whereas the hard drive is a long-term storage device. Memory is an electronic component used to store instructions for future use; whereas a hard drive is attached to the motherboard and enables the communication between components. Memory is an elec Correct answer Memory stores instructions and data used by programs in the moment; whereas a hard drive stores data, programs, and files that can be accessed at a future time. 72. Which of the following best describes the purpose of expansion slots in modern computers? 1/1 Expansion slots can be used to store programs and data. Expansion slots allow additional processors to be connected to the motherboard. Expansion slots can be used to connect additional peripheral devices such as an external hard drive or monitor. Expansion slots allow additional cards to be connected to the motherboard that interface with peripheral devices. Expansion slots a 73. Which of the following carries out the instructions of a computer program and is often referred to as the “chip”? 1/1 System clock Arithmetic Logic Unit RAM Central Processing Unit Central Processin 74. Which of the following statements best defines the CPU? 0/1 The CPU outputs the raw computer data, including mathematical calculations and logical operations. The CPU controls the speed at which instructions are retrieved and processed in the computer. The CPU is responsible for storing data as it is being processed. The CPU retrieves the instructions of a computer program and the raw data that is input. The CPU retrieves Correct answer The CPU controls the speed at which instructions are retrieved and processed in the computer. 75. Which of the following is an example of what 1 GB would store? 1/1 A large text file An mp3 file of a song A library of movies Thousands of books Thousands of boo 76. Which of the following statements accurately describes random access memory (RAM)? 0/1 RAM can be read but not written to. RAM is short-term memory. RAM is found in the ROM chip on the motherboard. RAM is storage for instructions that the computer needs to boot up. RAM is storage fo Correct answer RAM is short-term memory. 77. Which is found on the motherboard and stores information but the information is not permanent? 0/1 CPU RAM Bus ROM ROM Correct answer RAM 78. All of the following are input systems except: 1/1 Speaker Keyboard Scanner Webcam Speaker 79. A scanner is a peripheral device for what system? 0/1 I/O Storage Storage Correct answer I/O 80. What peripheral component houses CDs and DVD? 0/1 Hard drives Bays Ports Slots Slots Correct answer Bays 81. What external component will allow peripherals to be connected to the system unit and connect additional input, output, storage, and communication devices? 1/1 Hard drives Bays Ports Slots 82. Which computer will use a docking station to function like a desktop? 1/1 Handheld Notebook Correct Smartphone Tablet 83. An undertaking with a start and end, specified goals, and tasks to reach those goals is the definition of the? 1/1 Phase Project Organization Manager 84. Which project phase consists of determining the objectives and activities, organizing the activities, and estimating the time and costs? 1/1 Closing Initiation Executing & Controlling Planning 85. The team will write a final report detailing the processes and outcomes of the project in which project phase? 1/1 Initiation Planning Executing & Controlling Closing Ports Notebook Project Planning Closing 86. Which project phase determines what resources are available to meet the project needs? 0/1 Initiation Planning Executing & Controlling Closing Planning Correct answer Initiation Feedback Resource Allocation The team must also determine what resources are available to meet the needs of the project. Resources are commonly thought of in terms of time and capital. Time relates to the hours that the individuals assigned to the project will work. Time is important for two reasons. First, all projects have a deadline; with some projects, the deadline is critical for success. For example, a company may want to be the first to produce and sell a new product in a highly competitive market. Second, in business, time is money. An organization needs to weigh the costs and benefits of any project, because devoting time to the project will likely mean it cannot put that time toward other projects. This can have significant financial implications, so the team must be able to predict accurately the amount of time that will be needed for the project and make decisions accordingly. Capital is the money or assets that are available to fund the project. Project costs include time worked by employees assigned to the project (i.e., to pay salaries), as well as other items that need to be purchased, such as hardware, software licenses, and training solutions for developers and others. As previously noted, during this phase, the team also needs to review and revisit the scope of the project that was determined in the problem definition phase, by compiling a detailed description of what the project will entail. For instance, a website upgrade could be very simple if the company has only a few pages of content online, or it could be quite complex if it is an eCommerce site. The scope of the project, therefore, influences the amount of time and capital that will be required to complete the project. Project teams need to make wise decisions based on the resources that are available and the organization’s priorities. If the organization has unlimited time and capital, the scope of the project can be as complex as necessary. Typically, though, organizations do not have limitless time and capital so managers need to decide how to constrain the project. If the most important factor is time (e.g., the organization wants the project completed as quickly as possible) and the project scope cannot be reduced, the organization will need to invest more capital to create a successful outcome. If capital is a restraining factor, the scope of the project may have to be reduced. page 125 87. Determining the project scope or the work that needs to be completed is in what project phase? 0/1 Initiation Planning Executing & Controlling Closing Planning Correct answer Initiation 88. The scope of the project is? 1/1 Determined in the closing phase Always accurately identified in the initiation phase The work that needs to be done Not at any risk The work that nee 89. During analysis, which system requirement prevents unauthorized users from accessing data? 1/1 Buffer overflow User needs Accessibility Security Security 90. During implementation, how is alpha testing different from beta testing? 0/1 Beta testing is assisted by system developers Alpha testing uses actual data Beta testing uses simulated data Alpha testing uses simulated data Alpha testing use Correct answer Alpha testing uses simulated data Feedback Alpha testing occurs where the system will be used. For example, software may be tested by a client or by a specific department within an organization. During alpha testing, system developers often assist end users as they interact with the new system. It is common for simulated data to be used to prevent any damage to a user’s actual data. In Beta testing, the tests are performed by the end user without any assistance from the system developers. Beta testing uses actual (i.e., live) data in the real working environment. User acceptance testing is employed to assess whether the system does what the user expects and to ensure that it functions in a way that is useful to the user. page 136 91. During implementation, which testing assesses whether the system functions and is useful? 1/1 Deployment Alpha User Acceptance Beta User Acceptance 92. Which term involves replacing the old system with a new system? 1/1 Modeling System conversion End-user training Final documentation System conversio 93. Why is it essential to know what information will be needed from the database from the outset of development? Select all that apply. 0/1 By knowing the purpose, the developer can determine how many fields are needed in the database. The purpose determines the structure of the database. The purpose dete The developer can determine which data types would help fulfill the purpose. The number of fields in the database determines the cost of that database, so if careful planning doesn’t occur, money can be wasted. Correct answer By knowing the purpose, the developer can determine how many fields are needed in the database. The purpose determines the structure of the database. The developer can determine which data types would help fulfill the purpose. 94. Which of the following are operations used to alter the data within a relation of a database? 1/1 Update, Delete, Insert update , Delete , I Delete, Join, Insert Join, Insert, Update Insert, Join, Update 95. Which of the following are the three main categories of databases? 1/1 Hierarchical, Flat File, Relational Hierarchical , Flat Relational, Hierarchal, Java Isolated, Relational, Flat File Flat File, Isolated, Hierarchal 96. Database administrators might be involved with the integration of data from where? 0/1 Newer to older systems Local area networks to other networks DBMS to new systems Older systems to new Local area networ Correct answer Older systems to new Feedback Database Administrator Like system administrators, database administrators have a long list of important responsibilities, but with a focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas. There are specific applications, performance tuning parameters, account creation, and procedures associated with the DBMS that are separate from those of system administrators and web administrators. The database administrator may also be involved with the integration of data from older systems to new ones. As many or most database systems are now available over the Internet (or at least over local area networks), the administrator must also ensure proper security measures for remote access. page 10 97. Which of the following statements applies to a business intelligence system? 0/1 Simply collects information from various sources. Aids in making every day organizational decisions. Only uses information not found within the company databases. Used when making long-term decisions. Simply collects inf Correct answer Used when making long-term decisions. Feedback One of the main purposes of a BI system is to improve the timeliness and quality of the information that goes into making strategic decisions. Unlike an operational decision (e.g., how much and when to order new supplies), a strategic decision is typically one that covers a long time frame (e.g., five years) and may involve such issues as whether or not an organization should expand into a new geographic region. page 106 98. What is the definition of business intelligence? 1/1 Business intelligence is a term used to depict a network structure that allows greater communication among different parts of an organization. Business intelligence is a term used to reflect the knowledge a business can create by analyzing data gathered from multiple sources. Correct Business intelligence refers to a specific type of server used to gather data that can be analyzed by an organization. Business intelligence refers to a specific software application businesses can use to gather data from their competitors. Business intelligen 99. Which of the following interacts between a database and an application? 1/1 OLDP A driver Correct A BI system A driver 100. Which of the following operators is used to select all of a certain data? 0/1 * = <> LIKE LIKE Correct answer * Feedback If we wanted to see all of the fields from the table, we could modify the SQL to be: SELECT * FROM Students WHERE Major = “CIT”; page 113

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 12, 2022
Number of pages
24
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
valentineclinton Princeton University
View profile
Follow You need to be logged in order to follow users or courses
Sold
59
Member since
4 year
Number of followers
52
Documents
432
Last sold
2 months ago

3.0

9 reviews

5
3
4
1
3
1
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions