Quiz

Question 1 (0.25 points)

Saved

(True/False).The sources for the data that is the foundation for knowledge management within a business come solely from within the business itself.

Question 1 options:

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now
True
False

Question 2 (0.25 points)

(True/False) KM typically means the same thing across different types of businesses.

Question 2 options:

True
False

Question 3 (0.25 points)

True or false? The largest component of a database is a field.

Question 3 options:

A) True
B) False

Question 4 (0.25 points)

Which is the largest component found inside a field?

Question 4 options:

Bits
Characters
Records
Tables

Question 5 (0.25 points)

Does a database report allow the user to enter or modify data in the records? Select Yes or No.

Question 5 options:

A)  Yes
B)  No

Question 6 (0.25 points)

What is the software called that allows the user to create, access, and manage a database?

Question 6 options:

A)  DLP
B)  DBMS
C)  OO model
D)  Relational Model

Question 7 (0.25 points)

Does a database entry form allow the user to enter or modify data in the records? Select Yes or No.

Question 7 options:

A)  Yes
B)  No

Question 8 (0.25 points)

True or false? A database system is typically much less complex than a file processing system containing a series of lists or even a spreadsheet, but it requires more memory for storage allocation.

Question 8 options:

A) True
B) False

Question 9 (0.25 points)

Which of the following would be an example of a loss of record integrity in a database?

Question 9 options:

A)  Although you clicked the option to “Do not share information with any other companies or sites” on the bookstore’s website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.
B)  You enter the wrong password three times and find that you are locked out of the site you are trying to access.
C)  You receive a notice from your favorite online shopping site that you have an outstanding balance for items that you did not order.
D)  Because the word “mortgage” appears in the subject line of an e-mail you sent to your son or daughter, you begin receiving unsolicited e-mail messages from mortgage companies.

Question 10 (0.25 points)

Cloud storage for database contents is more efficient in terms of easy access by employees anytime, anywhere. The updated information for the database is generated with real-time information sent to a central server within the company. Updates to the cloud are made every hour during normal working hours. This could be considered a potential database __________.

Question 10 options:

A)  threat
B)  vulnerability

Question 11 (0.25 points)

Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consider a ______ the network and to the users who must access the network.

Question 11 options:

threat to
vulnerability of

Question 12 (0.25 points)

Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?

Question 12 options:

A)  Intentional malicious data loss
B)  Intentional malicious data leak
C)  Accidental malicious data loss
D)  Accidental malicious data leak

Question 13 (0.25 points)

A staff/faculty member uses proprietary (owned and protected by the university) data from the university’s student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?

Question 13 options:

A)  Malicious data loss
B)  Intentional data leak
C)  Accidental data loss
D)  Malicious data leak

Question 14 (0.25 points)

(True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database.

Question 14 options:

A) True
B) False

Question 15 (0.25 points)

(True/False). Because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises.

Question 15 options:

A) True
B) False

Question 16 (0.25 points)

Which of the following actions is not easily accomplished in an existing chart:

Question 16 options:

Alphabetize an set of axis labels in an existing chart.
Change the chart type
Insert a chart via the Recommended Charts option
Rearrange chart data via the switch rows/columns option

Question 17 (0.25 points)

Once you have created a chart, you can change the type (for example, from a bar chart to a pie chart) by selecting the chart, then:

Question 17 options:

selecting Format, then selecting  Arrange.
selecting Design, then selecting Change Chart Type.
selecting Format, selecting Change Chart Type.

Question 18 (0.25 points)

(True/False). You cannot format the data in an Excel spreadsheet to look like a table.

Question 18 options:

True
False

Question 19 (0.25 points)

When creating a named range in Excel, which of the following rules apply:

Question 19 options:

The first character of a name can be any character.
A named range can consist of any single character.
The name may include spaces.
The length of name is restricted to 255 characters.

Question 20 (0.25 points)

Which of the following is a valid named range in Excel:

Question 20 options:

&ABCE
AVG Costs
My_Data
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"