100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITSS Exam 2 Questions and Answers Latest Update 2025 Graded A+

Rating
-
Sold
-
Pages
55
Grade
A+
Uploaded on
23-03-2025
Written in
2024/2025

ITSS Exam 2 Questions and Answers Latest Update 2025 Graded A+ A _______ is a program used to create, process, and administer a database. - Answers - Database management System Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle, Brad wants to track information such as task name, productivity of an employee on daily basis, and employee numbers that brand wants to track are called __________ - Answers - Entities Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a _______ to obtain the information that she wants from - Answers - Query A group of similar rows or records in a table is called a file. - Answers - False A primary key in a database is a ________. - Answers a column or group of columns that identifies a unique row in a table A data integrity problem will occur only if __________ - Answers - Data are duplicated in a database. A foreign key is a key of a different (foreign) table than the one in which it resides. - Answers - True A DBMS and database are synonymous terms that can be used interchangeably - Answers - True A database is used instead of a spreadsheet when ______ - Answers - Lists involve data with multiple themes. All of the following are functions of the DBMS except ______. - Answers - Getting the users to use the database. The term _______ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizatinons pay for just the resources that they use. - Answers - Elastic Which of the following statements is TRUE about IEEE 802.3? - Answers - It is the protocol for wired LAN connections The process by which a personal computer hosts several different operating systems is known as _____ - Answers - PC virtualization Which of the following features distringuishes a LAN from a WAN? - Answers - A LAN connects computers in a single location. A ______ is a formatted message that passes through networks. - Answers - Packet All of the following are disruptive forces to change business except ________ - Answers - 2D Printing __________ is a category of cloud hosting where vendors provide hosted computers with an operating system, runtime environment, and middleware like a Web server or a DBMS. - Answers - PaaS Which of the following is a characteristic of smart devices? - Answers - Require microprocessors and new protocols. A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ______ per second - Answers - Megabits For communications equipment, K stands for __________ - Answers - 1,000 Which of the following is an advantage to an organization if its bring your own device (BYOD) policy offers wireless network to mobile devices? - Answers - The organization can sniff employees' mobile traffic. Which of the following statements is TRUE about native applications? - Answers - They only run on the operating system for which they are programmed. ________ is a completely computer-generated virtual world with interactive digital objects. - Answers - Virtual reality (VR) Where does the cloud reside? - Answers - In the internet _______ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access. - Answers - Passwords. All of the following are sources of threats except __________. - Answers - Firewalls A _______ is a type of virus that self-propagates using the Internet or other computer network. - Answers - Worm Which of the following is used for biometric authentication? - Answers - Facial features. The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to _______. - Answers - Provide physical security. A _________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. - Answers - Threat In information security, which of the following is TRUE about managing risk? - Answers - Organizations should implement safeguards that balance the trade-off between risk and cost. Which of the following is a critical security function that should be addressed by the senior management of an organization? - Answers - Establishing the security policy. A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knows. Later that day Chris noticed odd system behavior, and then the system crashed, Chris was a victim of _________. - Answers - Pretexting. protect databases and other organizational data. - Answers Data safeguards In its simplest form, a what-if analysis in a worksheet is generated by _____ the value in one or more input cells and observing the effects in other, dependent, cells. - Answers - Changing. The SQL query to output the contents of the EMPLOYEE table sorted by last name, first name, and initial is ______. - Answers - SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE FROM EMPLOYEE ORDER BY EMP_LNAME, EMP_FNAME, EMP_INITIAL; Which of the following queries will output the table contents when the

Show more Read less
Institution
ITSS
Course
ITSS











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITSS
Course
ITSS

Document information

Uploaded on
March 23, 2025
Number of pages
55
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITSS Exam 2 Questions and Answers Latest Update 2025 Graded A+



A _______ is a program used to create, process, and administer a database. - Answers - Database
management System

Brad, a project manager, wants to build a database to integrate information about employees and tasks
that they handle, Brad wants to track information such as task name, productivity of an employee on
daily basis, and employee numbers that brand wants to track are called __________ - Answers - Entities

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of
the second and third quarter of the year. She should use a _______ to obtain the information that she
wants from - Answers - Query

A group of similar rows or records in a table is called a file. - Answers - False

A primary key in a database is a ________. - Answers a column or group of columns that identifies a
unique row in a table

A data integrity problem will occur only if __________ - Answers - Data are duplicated in a database.

A foreign key is a key of a different (foreign) table than the one in which it resides. - Answers - True

A DBMS and database are synonymous terms that can be used interchangeably - Answers - True

A database is used instead of a spreadsheet when ______ - Answers - Lists involve data with multiple
themes.

All of the following are functions of the DBMS except ______. - Answers - Getting the users to use the
database.

The term _______ means that the computing resources leased can be increased or decreased
dynamically in a short span of time and that organizatinons pay for just the resources that they use. -
Answers - Elastic

Which of the following statements is TRUE about IEEE 802.3? - Answers - It is the protocol for wired LAN
connections

The process by which a personal computer hosts several different operating systems is known as _____ -
Answers - PC virtualization

Which of the following features distringuishes a LAN from a WAN? - Answers - A LAN connects
computers in a single location.

A ______ is a formatted message that passes through networks. - Answers - Packet

All of the following are disruptive forces to change business except ________ - Answers - 2D Printing

,__________ is a category of cloud hosting where vendors provide hosted computers with an operating
system, runtime environment, and middleware like a Web server or a DBMS. - Answers - PaaS

Which of the following is a characteristic of smart devices? - Answers - Require microprocessors and
new protocols.

A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ______ per second -
Answers - Megabits

For communications equipment, K stands for __________ - Answers - 1,000

Which of the following is an advantage to an organization if its bring your own device (BYOD) policy
offers wireless network to mobile devices? - Answers - The organization can sniff employees' mobile
traffic.

Which of the following statements is TRUE about native applications? - Answers - They only run on the
operating system for which they are programmed.

________ is a completely computer-generated virtual world with interactive digital objects. - Answers -
Virtual reality (VR)

Where does the cloud reside? - Answers - In the internet

_______ are the primary means of authentication for a user's computer and other networks and servers
to which the user may have access. - Answers - Passwords.

All of the following are sources of threats except __________. - Answers - Firewalls

A _______ is a type of virus that self-propagates using the Internet or other computer network. -
Answers - Worm

Which of the following is used for biometric authentication? - Answers - Facial features.

The computers that run the DBMS and all devices that store database data should reside in locked,
controlled-access facilities. This is done to _______. - Answers - Provide physical security.

A _________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally,
without the owner's permission and often without the owner's knowledge. - Answers - Threat

In information security, which of the following is TRUE about managing risk? - Answers - Organizations
should implement safeguards that balance the trade-off between risk and cost.

Which of the following is a critical security function that should be addressed by the senior management
of an organization? - Answers - Establishing the security policy.

A person claiming to be from central IT called Chris and asked him to participate in a password reset
audit. The person had Chris change his password to the word "123456", and then again to a secret

,passphrase only Chris knows. Later that day Chris noticed odd system behavior, and then the system
crashed, Chris was a victim of _________. - Answers - Pretexting.

protect databases and other organizational data. - Answers Data safeguards

In its simplest form, a what-if analysis in a worksheet is generated by _____ the value in one or more
input cells and observing the effects in other, dependent, cells. - Answers - Changing.

The SQL query to output the contents of the EMPLOYEE table sorted by last name, first name, and initial
is ______. - Answers - SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE

FROM EMPLOYEE

ORDER BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;

Which of the following queries will output the table contents when the value of P_PRICE is less than or
equal to 10? - Answers - SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODE

o FROM PRODUCT

§ WHERE P_PRICE <= 10;

What type of "Join" is shown in the following diagram? - Answers - Inner Join

In Tableau, "Horizontal bar" charts can be constructed with "0 or more dimension." - Answers - True.

You can join tables by using a condition in the WHERE clause - Answers - TRUE.

By definition, Tableau displays measures over time as a _______. - Answers - LINE

Which of the following is NOT a guideline for planning and designing a PIVOTtable? - Answers - Decide
how you want to the data arranged.

The SQL aggregate function that gives the arithmetic mean for a specific column is ________ - Answers -
AVG.

A(n) ________ is an alternate name given to a column or table in any SQL statement. - Answers - ALiAS

In Tableau, one can start building Dashboards without building "sheets", - Answers - False

To enlarge the size of a pie chart in Tableau, one needs to select the _____ on the Menu Ribbon. -
Answers - Entire View

A PivotTable report filter is a(n) _____ field in a Pivot Chart - Answers - Report filter.

Data visualization - Answers the process of displaying data

(often in large quantities) in a meaningful fashion to

, provide insights that will support better decisions.

-

Data visualization improves decision making,

provides managers with better analysis capabilities

that reduce reliance on I T professionals, and

improves collaboration and information sharing.

Tabular vs Visual Data Analysis - Answers Tabular data can be used to determine exactly how many units
of a

certain product were sold in a particular month, or to compare one

month to another.

-

For example, we see that sales of product A dropped in February,

specifically by 6.7% (computed as 1

B3/B1). Beyond such

calculations, however, it is difficult to draw big picture conclusions.



A visual chart provides the means to

-

easily compare overall sales of

different products (Product C

sells the least, for example);

-

identify trends (sales of Product

D are increasing), other patterns

(sales of Product C is relatively

stable while sales of Product B

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
342
Member since
1 year
Number of followers
16
Documents
28610
Last sold
3 days ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions