A _______ is a program used to create, process, and administer a database. - Answers - Database
management System
Brad, a project manager, wants to build a database to integrate information about employees and tasks
that they handle, Brad wants to track information such as task name, productivity of an employee on
daily basis, and employee numbers that brand wants to track are called __________ - Answers - Entities
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of
the second and third quarter of the year. She should use a _______ to obtain the information that she
wants from - Answers - Query
A group of similar rows or records in a table is called a file. - Answers - False
A primary key in a database is a ________. - Answers a column or group of columns that identifies a
unique row in a table
A data integrity problem will occur only if __________ - Answers - Data are duplicated in a database.
A foreign key is a key of a different (foreign) table than the one in which it resides. - Answers - True
A DBMS and database are synonymous terms that can be used interchangeably - Answers - True
A database is used instead of a spreadsheet when ______ - Answers - Lists involve data with multiple
themes.
All of the following are functions of the DBMS except ______. - Answers - Getting the users to use the
database.
The term _______ means that the computing resources leased can be increased or decreased
dynamically in a short span of time and that organizatinons pay for just the resources that they use. -
Answers - Elastic
Which of the following statements is TRUE about IEEE 802.3? - Answers - It is the protocol for wired LAN
connections
The process by which a personal computer hosts several different operating systems is known as _____ -
Answers - PC virtualization
Which of the following features distringuishes a LAN from a WAN? - Answers - A LAN connects
computers in a single location.
A ______ is a formatted message that passes through networks. - Answers - Packet
All of the following are disruptive forces to change business except ________ - Answers - 2D Printing
,__________ is a category of cloud hosting where vendors provide hosted computers with an operating
system, runtime environment, and middleware like a Web server or a DBMS. - Answers - PaaS
Which of the following is a characteristic of smart devices? - Answers - Require microprocessors and
new protocols.
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ______ per second -
Answers - Megabits
For communications equipment, K stands for __________ - Answers - 1,000
Which of the following is an advantage to an organization if its bring your own device (BYOD) policy
offers wireless network to mobile devices? - Answers - The organization can sniff employees' mobile
traffic.
Which of the following statements is TRUE about native applications? - Answers - They only run on the
operating system for which they are programmed.
________ is a completely computer-generated virtual world with interactive digital objects. - Answers -
Virtual reality (VR)
Where does the cloud reside? - Answers - In the internet
_______ are the primary means of authentication for a user's computer and other networks and servers
to which the user may have access. - Answers - Passwords.
All of the following are sources of threats except __________. - Answers - Firewalls
A _______ is a type of virus that self-propagates using the Internet or other computer network. -
Answers - Worm
Which of the following is used for biometric authentication? - Answers - Facial features.
The computers that run the DBMS and all devices that store database data should reside in locked,
controlled-access facilities. This is done to _______. - Answers - Provide physical security.
A _________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally,
without the owner's permission and often without the owner's knowledge. - Answers - Threat
In information security, which of the following is TRUE about managing risk? - Answers - Organizations
should implement safeguards that balance the trade-off between risk and cost.
Which of the following is a critical security function that should be addressed by the senior management
of an organization? - Answers - Establishing the security policy.
A person claiming to be from central IT called Chris and asked him to participate in a password reset
audit. The person had Chris change his password to the word "123456", and then again to a secret
,passphrase only Chris knows. Later that day Chris noticed odd system behavior, and then the system
crashed, Chris was a victim of _________. - Answers - Pretexting.
protect databases and other organizational data. - Answers Data safeguards
In its simplest form, a what-if analysis in a worksheet is generated by _____ the value in one or more
input cells and observing the effects in other, dependent, cells. - Answers - Changing.
The SQL query to output the contents of the EMPLOYEE table sorted by last name, first name, and initial
is ______. - Answers - SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE
FROM EMPLOYEE
ORDER BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;
Which of the following queries will output the table contents when the value of P_PRICE is less than or
equal to 10? - Answers - SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODE
o FROM PRODUCT
§ WHERE P_PRICE <= 10;
What type of "Join" is shown in the following diagram? - Answers - Inner Join
In Tableau, "Horizontal bar" charts can be constructed with "0 or more dimension." - Answers - True.
You can join tables by using a condition in the WHERE clause - Answers - TRUE.
By definition, Tableau displays measures over time as a _______. - Answers - LINE
Which of the following is NOT a guideline for planning and designing a PIVOTtable? - Answers - Decide
how you want to the data arranged.
The SQL aggregate function that gives the arithmetic mean for a specific column is ________ - Answers -
AVG.
A(n) ________ is an alternate name given to a column or table in any SQL statement. - Answers - ALiAS
In Tableau, one can start building Dashboards without building "sheets", - Answers - False
To enlarge the size of a pie chart in Tableau, one needs to select the _____ on the Menu Ribbon. -
Answers - Entire View
A PivotTable report filter is a(n) _____ field in a Pivot Chart - Answers - Report filter.
Data visualization - Answers the process of displaying data
(often in large quantities) in a meaningful fashion to
, provide insights that will support better decisions.
-
Data visualization improves decision making,
provides managers with better analysis capabilities
that reduce reliance on I T professionals, and
improves collaboration and information sharing.
Tabular vs Visual Data Analysis - Answers Tabular data can be used to determine exactly how many units
of a
certain product were sold in a particular month, or to compare one
month to another.
-
For example, we see that sales of product A dropped in February,
specifically by 6.7% (computed as 1
B3/B1). Beyond such
calculations, however, it is difficult to draw big picture conclusions.
A visual chart provides the means to
-
easily compare overall sales of
different products (Product C
sells the least, for example);
-
identify trends (sales of Product
D are increasing), other patterns
(sales of Product C is relatively
stable while sales of Product B