BUY HERE: IFSM 300 Quiz 4 (UMUC) – Homeworkmade
IFSM 300 Quiz 4 (UMUC)
Question 1
|
|
0 / 1 point
|
Which level of management is concerned with updating inventory, scheduling production, and coordinating shipping?
|
|
|
||
|
|
|
||
|
|
|
||
|
|
|
||
View Feedback
|
Question 2
|
|
1 / 1 point
|
Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?
|
|
|
||
|
|
|
||
|
|
|
||
|
|
|
||
View Feedback
|
Question 3
|
|
1 / 1 point
|
Which of the following is one of the most common ways thieves steal corporate information?
|
|
|
||
|
|
|
||
|
|
|
||
|
|
|
||
View Feedback
|
Question 4
|
|
0 / 1 point
|
True or false: A relational database is one in which every data item is related to every other data item.
|
|
True
|
|
|
False
|
View Feedback
|
Question 5
|
|
1 / 1 point
|
Which of the following make up the security triad?
|
|
|
||
|
|
|
||
|
|
|
||
|
|
|
||
View Feedback
|
Question 6
|
|
1 / 1 point
|
True or false: For simple uses, a spreadsheet can substitute for a database quite well.
|
|
True
|
|
|
False
|
View Feedback
|
Question 7
|
|
1 / 1 point
|
Which of the following is not true about firewalls?
|
|
|
||
|
|
|
||
|
|
|
||
|
|
|
||
View Feedback
|
Question 8
|
|
1 / 1 point
|
Which of the following is described as a measure of the degree to which a set of data satisfies a set of contstraints?
|
|
|
||
|
|
|
||
|
|
|
||
|
|
|
||
View Feedback
|
Question 9
|
|
1 / 1 point
|
True or false: An Intrusion Detection System (IDS) does not add any additional security.
|
|
True
|
|
|
False
|
View Feedback
|
Question 10
|
|
0 / 1 point
|
When looking to secure information resources, organizations must balance the need for security with which of the following?
|
|
the cost of replacing the data if it is stolen
|
|
|
the potential damage to the company’ reputation if the data is stolen
|
|
|
the users’ need to effectively access and use these resources
|
|
|
the customers’ expectation that their data will be protected
|
View Feedback
|
Question 11
|
|
1 / 1 point
|
Which of the following are characteristics of Big Data? (select all that apply)
|
|
|
|
||
|
|
|
|
||
|
|
|
|
||
|
|
|
|
||
View Feedback
|
Question 12
|
|
1 / 1 point
|
Which of the following is the process of formalizing the capture, indexing, and storing of the company’s knowledge in order to benefit from the experiences and insights that the company has captured during its existence?
|
|
Knowledge warehousing.
|
|
|
Corporate knowledge history.
|
|
|
Knowledge management.
|
|
|
None of the above.
|
View Feedback
|
Question 13
|
|
1 / 1 point
|
Which of the following is the most popular business social network in the world, according to this week’s reading on Business Social Networks?
|
|
Facebook
|
|
|
Konnects
|
|
|
DOOSTANG
|
|
|
LinkedIn
|
View Feedback
|
Question 14
|
|
1 / 1 point
|
Which of the following should be included in a good backup plan? (select all that apply)
|
|
|
|
||
|
|
|
|
||
|
|
|
|
||
|
|
|
|
||
View Feedback
|
Question 15
|
|
1 / 1 point
|
Which of the following is the process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions?
|
|
Data processing.
|
|
|
Data mining.
|
|
|
Data warehousing.
|
|
|
Data marketing.
|
View Feedback
|
Question 16
|
|
1 / 1 point
|
Which of the following are true of a data warehouse? (select all that apply)
|
|
|
|
||
|
|
|
|
||
|
|
|
|
||
|
|
|
|
||
View Feedback
|
Question 17
|
|
1 / 1 point
|
Which level of management is concerned with profitability and market share?
|
|
|
||
|
|
|
||
|
|
|
||
|
|
|
||
View Feedback
|
Question 18
|
|
1 / 1 point
|
Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?
|
|
|
||
|
|
|
||
|
|
|
||
|
|
|
||
View Feedback
|
Question 19
|
|
1 / 1 point
|
Which of the following is used to transform data into information in order to generate knowledge
that can be used for decision making?
that can be used for decision making?
|
|
Knowledge system
|
|
|
Decision-making system
|
|
|
Database
|
|
|
File
|
View Feedback
|
Question 20
|
|
1 / 1 point
|
Which of the following is described as the assurance that the information being accessed has not been altered and truly represents
what is intended?
what is intended?
|
|
Correctness
|
|
|
Completeness
|
|
|
Integrity
|
|
|
Assurance
|
No comments:
Post a Comment