100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

ITSS Exam 2 Questions and Answers Latest Update 2025 Graded A+

Puntuación
-
Vendido
-
Páginas
55
Grado
A+
Subido en
23-03-2025
Escrito en
2024/2025

ITSS Exam 2 Questions and Answers Latest Update 2025 Graded A+ A _______ is a program used to create, process, and administer a database. - Answers - Database management System Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle, Brad wants to track information such as task name, productivity of an employee on daily basis, and employee numbers that brand wants to track are called __________ - Answers - Entities Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a _______ to obtain the information that she wants from - Answers - Query A group of similar rows or records in a table is called a file. - Answers - False A primary key in a database is a ________. - Answers a column or group of columns that identifies a unique row in a table A data integrity problem will occur only if __________ - Answers - Data are duplicated in a database. A foreign key is a key of a different (foreign) table than the one in which it resides. - Answers - True A DBMS and database are synonymous terms that can be used interchangeably - Answers - True A database is used instead of a spreadsheet when ______ - Answers - Lists involve data with multiple themes. All of the following are functions of the DBMS except ______. - Answers - Getting the users to use the database. The term _______ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizatinons pay for just the resources that they use. - Answers - Elastic Which of the following statements is TRUE about IEEE 802.3? - Answers - It is the protocol for wired LAN connections The process by which a personal computer hosts several different operating systems is known as _____ - Answers - PC virtualization Which of the following features distringuishes a LAN from a WAN? - Answers - A LAN connects computers in a single location. A ______ is a formatted message that passes through networks. - Answers - Packet All of the following are disruptive forces to change business except ________ - Answers - 2D Printing __________ is a category of cloud hosting where vendors provide hosted computers with an operating system, runtime environment, and middleware like a Web server or a DBMS. - Answers - PaaS Which of the following is a characteristic of smart devices? - Answers - Require microprocessors and new protocols. A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ______ per second - Answers - Megabits For communications equipment, K stands for __________ - Answers - 1,000 Which of the following is an advantage to an organization if its bring your own device (BYOD) policy offers wireless network to mobile devices? - Answers - The organization can sniff employees' mobile traffic. Which of the following statements is TRUE about native applications? - Answers - They only run on the operating system for which they are programmed. ________ is a completely computer-generated virtual world with interactive digital objects. - Answers - Virtual reality (VR) Where does the cloud reside? - Answers - In the internet _______ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access. - Answers - Passwords. All of the following are sources of threats except __________. - Answers - Firewalls A _______ is a type of virus that self-propagates using the Internet or other computer network. - Answers - Worm Which of the following is used for biometric authentication? - Answers - Facial features. The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to _______. - Answers - Provide physical security. A _________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. - Answers - Threat In information security, which of the following is TRUE about managing risk? - Answers - Organizations should implement safeguards that balance the trade-off between risk and cost. Which of the following is a critical security function that should be addressed by the senior management of an organization? - Answers - Establishing the security policy. A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word "123456", and then again to a secret passphrase only Chris knows. Later that day Chris noticed odd system behavior, and then the system crashed, Chris was a victim of _________. - Answers - Pretexting. protect databases and other organizational data. - Answers Data safeguards In its simplest form, a what-if analysis in a worksheet is generated by _____ the value in one or more input cells and observing the effects in other, dependent, cells. - Answers - Changing. The SQL query to output the contents of the EMPLOYEE table sorted by last name, first name, and initial is ______. - Answers - SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE FROM EMPLOYEE ORDER BY EMP_LNAME, EMP_FNAME, EMP_INITIAL; Which of the following queries will output the table contents when the

Mostrar más Leer menos
Institución
ITSS
Grado
ITSS











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ITSS
Grado
ITSS

Información del documento

Subido en
23 de marzo de 2025
Número de páginas
55
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ITSS Exam 2 Questions and Answers Latest Update 2025 Graded A+



A _______ is a program used to create, process, and administer a database. - Answers - Database
management System

Brad, a project manager, wants to build a database to integrate information about employees and tasks
that they handle, Brad wants to track information such as task name, productivity of an employee on
daily basis, and employee numbers that brand wants to track are called __________ - Answers - Entities

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of
the second and third quarter of the year. She should use a _______ to obtain the information that she
wants from - Answers - Query

A group of similar rows or records in a table is called a file. - Answers - False

A primary key in a database is a ________. - Answers a column or group of columns that identifies a
unique row in a table

A data integrity problem will occur only if __________ - Answers - Data are duplicated in a database.

A foreign key is a key of a different (foreign) table than the one in which it resides. - Answers - True

A DBMS and database are synonymous terms that can be used interchangeably - Answers - True

A database is used instead of a spreadsheet when ______ - Answers - Lists involve data with multiple
themes.

All of the following are functions of the DBMS except ______. - Answers - Getting the users to use the
database.

The term _______ means that the computing resources leased can be increased or decreased
dynamically in a short span of time and that organizatinons pay for just the resources that they use. -
Answers - Elastic

Which of the following statements is TRUE about IEEE 802.3? - Answers - It is the protocol for wired LAN
connections

The process by which a personal computer hosts several different operating systems is known as _____ -
Answers - PC virtualization

Which of the following features distringuishes a LAN from a WAN? - Answers - A LAN connects
computers in a single location.

A ______ is a formatted message that passes through networks. - Answers - Packet

All of the following are disruptive forces to change business except ________ - Answers - 2D Printing

,__________ is a category of cloud hosting where vendors provide hosted computers with an operating
system, runtime environment, and middleware like a Web server or a DBMS. - Answers - PaaS

Which of the following is a characteristic of smart devices? - Answers - Require microprocessors and
new protocols.

A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ______ per second -
Answers - Megabits

For communications equipment, K stands for __________ - Answers - 1,000

Which of the following is an advantage to an organization if its bring your own device (BYOD) policy
offers wireless network to mobile devices? - Answers - The organization can sniff employees' mobile
traffic.

Which of the following statements is TRUE about native applications? - Answers - They only run on the
operating system for which they are programmed.

________ is a completely computer-generated virtual world with interactive digital objects. - Answers -
Virtual reality (VR)

Where does the cloud reside? - Answers - In the internet

_______ are the primary means of authentication for a user's computer and other networks and servers
to which the user may have access. - Answers - Passwords.

All of the following are sources of threats except __________. - Answers - Firewalls

A _______ is a type of virus that self-propagates using the Internet or other computer network. -
Answers - Worm

Which of the following is used for biometric authentication? - Answers - Facial features.

The computers that run the DBMS and all devices that store database data should reside in locked,
controlled-access facilities. This is done to _______. - Answers - Provide physical security.

A _________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally,
without the owner's permission and often without the owner's knowledge. - Answers - Threat

In information security, which of the following is TRUE about managing risk? - Answers - Organizations
should implement safeguards that balance the trade-off between risk and cost.

Which of the following is a critical security function that should be addressed by the senior management
of an organization? - Answers - Establishing the security policy.

A person claiming to be from central IT called Chris and asked him to participate in a password reset
audit. The person had Chris change his password to the word "123456", and then again to a secret

,passphrase only Chris knows. Later that day Chris noticed odd system behavior, and then the system
crashed, Chris was a victim of _________. - Answers - Pretexting.

protect databases and other organizational data. - Answers Data safeguards

In its simplest form, a what-if analysis in a worksheet is generated by _____ the value in one or more
input cells and observing the effects in other, dependent, cells. - Answers - Changing.

The SQL query to output the contents of the EMPLOYEE table sorted by last name, first name, and initial
is ______. - Answers - SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONE

FROM EMPLOYEE

ORDER BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;

Which of the following queries will output the table contents when the value of P_PRICE is less than or
equal to 10? - Answers - SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODE

o FROM PRODUCT

§ WHERE P_PRICE <= 10;

What type of "Join" is shown in the following diagram? - Answers - Inner Join

In Tableau, "Horizontal bar" charts can be constructed with "0 or more dimension." - Answers - True.

You can join tables by using a condition in the WHERE clause - Answers - TRUE.

By definition, Tableau displays measures over time as a _______. - Answers - LINE

Which of the following is NOT a guideline for planning and designing a PIVOTtable? - Answers - Decide
how you want to the data arranged.

The SQL aggregate function that gives the arithmetic mean for a specific column is ________ - Answers -
AVG.

A(n) ________ is an alternate name given to a column or table in any SQL statement. - Answers - ALiAS

In Tableau, one can start building Dashboards without building "sheets", - Answers - False

To enlarge the size of a pie chart in Tableau, one needs to select the _____ on the Menu Ribbon. -
Answers - Entire View

A PivotTable report filter is a(n) _____ field in a Pivot Chart - Answers - Report filter.

Data visualization - Answers the process of displaying data

(often in large quantities) in a meaningful fashion to

, provide insights that will support better decisions.

-

Data visualization improves decision making,

provides managers with better analysis capabilities

that reduce reliance on I T professionals, and

improves collaboration and information sharing.

Tabular vs Visual Data Analysis - Answers Tabular data can be used to determine exactly how many units
of a

certain product were sold in a particular month, or to compare one

month to another.

-

For example, we see that sales of product A dropped in February,

specifically by 6.7% (computed as 1

B3/B1). Beyond such

calculations, however, it is difficult to draw big picture conclusions.



A visual chart provides the means to

-

easily compare overall sales of

different products (Product C

sells the least, for example);

-

identify trends (sales of Product

D are increasing), other patterns

(sales of Product C is relatively

stable while sales of Product B
$10.39
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TutorJosh Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
342
Miembro desde
1 año
Número de seguidores
16
Documentos
28610
Última venta
3 días hace
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reseñas

5
18
4
14
3
12
2
0
1
9

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes