IFSM 201 Quiz 3 | Rated A+

Download Now

Question 1 (0.25 points)

Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):

Question 1 options:

Facilitating better, more informed decisions

Stimulating cultural change and innovation

Utilizing information technology to manage data and information

Impacting performance across an organization

Building knowledge that can be used to streamline operations and improve processes.

Question 2 (0.25 points)

(True/False).The sources for the data that is the foundation for knowledge management within a business come solely from within the business itself.

Question 2 options:

True

False

________________________________________

Question 3 (0.25 points)

True or false? A record can contain only character data—letters, numbers, or special symbols.

Question 3 options:

A) True

B) False

Question 4 (0.25 points)

True or false? Tables are composed of fields, and fields are composed of records.

Question 4 options:

A) True

B) False

________________________________________

Question 5 (0.25 points)

Does a wizard function allow the user to enter or modify data in the records? Select Yes or No.

Question 5 options:

A) Yes

B) No

Question 6 (0.25 points)

Does a database entry form allow the user to enter or modify data in the records? Select Yes or No.

Question 6 options:

A) Yes

B) No

Question 7 (0.25 points)

What are procedures that help keep a database current?

Question 7 options:

A) Database query procedures

B) Report generation procedures

C) File maintenance procedures

D) Data entry procedures

________________________________________

Question 8 (0.25 points)

True or false? A database system is typically much less complex than a file processing system containing a series of lists or even a spreadsheet, but it requires more memory for storage allocation.

Question 8 options:

A) True

B) False

________________________________________

Question 9 (0.25 points)

Which of the following would be an example of a loss of record integrity within a database?

Question 9 options:

A) A faculty member posts the full names and final grades on the main page of the class's website.

B) Your online banking site tells you your password has expired and requests that you submit a new one to access your accounts.

C) Your bank statement is not reflecting a refund that you know was deposited in your account last week (your account balance does reflect the refund).

D) You are denied a new credit card because the credit card company checked your credit score and found that it did not meet its minimum standards for new accounts. Your credit report does not show any invalid records.

________________________________________

Question 10 (0.25 points)

Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential __________ to the confidentiality of the data in the files.

Question 10 options:

A) threat

B) vulnerability

Question 11 (0.25 points)

If a patch is required to address a potential loophole in the security of a database, this would be considered a potential security __________.

Question 11 options:

A) threat

B) vulnerability

________________________________________

Question 12 (0.25 points)

Paul has been working long hours. He is tired and distracted by family issues, so he has not been doing record updates regularly. There is a sudden power outage in the building and the last 15 records he has been working on have not been saved to the database. Which of the following best describes this data issue?

Question 12 options:

A) Malicious data loss

B) Malicious data leak

C) Accidental data loss

D) Accidental data leak

Question 13 (0.25 points)

A staff/faculty member uses proprietary (owned and protected by the university) data from the university's student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?

Question 13 options:

A) Malicious data loss

B) Intentional data leak

C) Accidental data loss

D) Malicious data leak

________________________________________

Question 14 (0.25 points)

(True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database.

Question 14 options:

A) True

B) False

Question 15 (0.25 points)

(True/False). Because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises.

Question 15 options:

A) True

B) False

________________________________________

Question 16 (0.25 points)

Once you have created a chart, you can change the type (for example, from a bar chart to a pie chart) by selecting the chart, then:

Question 16 options:

selecting Format, selecting Arrange.

selecting Design, selecting Change Chart Type.

selecting Format, selecting Change Chart Type.

Question 17 (0.25 points)

(True/False). Once an Excel table has been inserted into your spreadsheet, you are not able to modify the data entered into that table.

Question 17 options:

True

False

Question 18 (0.25 points)

Which of the following actions is not easily accomplished in an existing chart:

Question 18 options:

Alphabetize an set of axis labels in an existing chart.

Change the chart type

Insert a chart via the Recommended Charts option

Rearrange chart data via the switch rows/columns option

________________________________________

Question 19 (0.25 points)

When creating a named range in Excel, which of the following rules does NOT apply:

Question 19 options:

The first character of a name must be a letter, an underscore character (_), or a backslash (\).

You cannot use the uppercase and lowercase characters "C", "c", "R", or "r" as a defined name.

Spaces are not allowed as part of a name.

The length of the name is restricted to 155 characters.

________________________________________

Question 20 (0.25 points)

Which of the following is a valid named range in Excel:

Question 20 options:

%ABCE

C

My Named Range

AVGCosts