IFSM 201 Quiz 3
Question 1 (0.25 points)
(True/False).The sources for the data that is the foundation for knowledge management within a
... [Show More] business come solely from within the business itself.
Question 1 options:
True
False
Save
Question 2 (0.25 points)
(True/False) KM typically means the same thing across different types of businesses.
Question 2 options:
True
False
Save
Question 3 (0.25 points)
True or false? A record can contain only character data—letters, numbers, or special symbols.
Question 3 options:
A) True
B) False
Save
Question 4 (0.25 points)
True or false? The largest component of a database is a field.
Question 4 options:
A) True
B) False (Correct Answer)
Save
Question 5 (0.25 points)
Does a database report allow the user to enter or modify data in the records? Select Yes or No.
Question 5 options:
A) Yes
B) No (Correct Answer)
Save
Question 6 (0.25 points)
Does a database query allow the user to enter or modify data in the records? Select Yes or No.
Question 6 options:
A) Yes
B) No
Save
Question 7 (0.25 points)
What is the software called that allows the user to create, access, and manage a database?
Question 7 options:
A) DLP
B) DBMS
C) OO model
D) Relational Model
Save
Question 8 (0.25 points)
True or false? A database system is typically much less complex than a file processing system containing a series of lists or even a spreadsheet, but it requires more memory for storage allocation.
Question 8 options:
A) True
B) False
Save
Question 9 (0.25 points)
Which of the following would be an example of a loss of availability to records within a database?
Question 9 options:
A) A classmate tells you that she could see your grades—not just her own—posted in the class's roster.
B) You do a lot of banking online. Today, when you attempted to log in to your account, your valid ID and password are denied, and you cannot get access to your accounts.
C) Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.
D) You are applying for a new credit card and the company indicates that they will be checking your credit score at one of the three primary credit reporting companies.
Save
Question 10 (0.25 points)
If a patch is required to address a potential loophole in the security of a database, this would be considered a potential security __________.
Question 10 options:
A) threat
B) vulnerability
Save
Question 11 (0.25 points)
Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consider a ______ the network and to the users who must access the network.
Question 11 options:
threat to
vulnerability of
Save
Question 12 (0.25 points)
A staff/faculty member uses proprietary (owned and protected by the university) data from the university's student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?
Question 12 options:
A) Malicious data loss
B) Intentional data leak
C) Accidental data loss
D) Malicious data leak
Save
Question 13 (0.25 points)
Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?
Question 13 options:
A) Intentional malicious data loss
B) Intentional malicious data leak
C) Accidental malicious data loss
D) Accidental malicious data leak
Save
Question 14 (0.25 points)
(True/False). Because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises.
Question 14 options:
A) True
B) False
Save
Question 15 (0.25 points)
(True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database.
Question 15 options:
A) True
B) False
Save
Question 16 (0.25 points)
Which of the following actions is not easily accomplished in an existing chart:
Question 16 options:
Alphabetize an set of axis labels in an existing chart.
Change the chart type
Insert a chart via the Recommended Charts option
Rearrange chart data via the switch rows/columns option
Save
Question 17 (0.25 points)
Once you have created a chart, you can change the type (for example, from a bar chart to a pie chart) by selecting the chart, then:
Question 17 options:
selecting Format, then selecting Arrange.
selecting Design, then selecting Change Chart Type.
selecting Format, selecting Change Chart Type.
Save
Question 18 (0.25 points)
(True/False). You cannot format the data in an Excel spreadsheet to look like a table.
Question 18 options:
True
False
Save
Question 19 (0.25 points)
When creating a named range in Excel, which of the following rules apply:
Question 19 options:
The first character of a name can be any character.
A named range can consist of any single character.
The name may include spaces.
The length of name is restricted to 255 characters.
Save
Question 20 (0.25 points)
Which of the following is a valid named range in Excel:
Question 20 options:
&ABCE
AVG Costs
My_Data
R
Save [Show Less]