IFSM201 Week 3 Quiz Latest 2018 December (Few Answers) Question # 00597273 Subject: Education Due on: 01/28/2019 Posted On: 01/28/2019 06:30 AM Tutorials: 1 Rating: 4.9/5

Question

Dot Image

IFSM201
Concepts and Applications of Information Technology

Week 3 Quiz

Question 1

Which of the following would not be counted in a list of
goals for having and using a knowledge management system (KMS):

Question options:

Facilitating better, more informed decisions

Stimulating cultural change and innovation

Utilizing information technology to manage data and
information

Impacting performance across an organization

Building knowledge that can be used to streamline operations
and improve processes.

Question 5

What are procedures that help keep a database current?

Question options:

A)

Database query procedures

B)

Report generation procedures

C)

File maintenance procedures

D)

Data entry procedures

Question 7

Does a database report allow the user to enter or modify
data in the records? Select Yes or No.

Question options:

A)

Yes

B)

No

Question 9

Which of the following would be an example of a loss of
record confidentiality in a database?

Question options:

A)

You make all your personal information on the Facebook site
“public” and available to everyone.

B)

Although you clicked the option to “Do not share
information with any other companies or sites” on an online bookstore’s
website, you are getting unsolicited e-mail messages from some of the companies
that post ads on that site.

C)

Your favorite online shopping site suddenly begins
displaying a different mailing address than the one you use. You know you have
not made any changes to your account profile.

D)

Your credit card company issued you a new card when your old
one was about to expire.

Question 11

Your network administrator finds a virus in the network
software. Fortunately, she was able to eliminate it before it resulted in a
denial-of-service attack, which would have prevented legitimate users of the
networked database from gaining access to the records needed. It turns out that
the network software did not have adequate security protections in place. The
fact that this virus was successfully inserted into the network software points
to a ______ the network software.

Question options:

A)

threat to

B)

vulnerability of

Question 12

A staff/faculty member uses proprietary (owned and protected
by the university) data from the university’s student financial records
database in a graph that is part of a presentation at a computer education
conference. Which of the following best describes the data issue?

Having Trouble Meeting Your Deadline?

Get your assignment on IFSM201 Week 3 Quiz Latest 2018 December (Few Answers) Question # 00597273 Subject: Education Due on: 01/28/2019 Posted On: 01/28/2019 06:30 AM Tutorials: 1 Rating: 4.9/5 completed on time. avoid delay and – ORDER NOW

Question options:

A)

Malicious data loss

B)

Intentional data leak

C)

Accidental data loss

D)

Malicious data leak

Question 13

Joachim is frustrated at a lack of job advancement
opportunities at his current job. Before resigning, he deletes a set of data
records that cannot be restored because there is no database backup procedure
in place. Which of the following best describes this data issue?

Question options:

A)

Intentional malicious data loss

B)

Intentional malicious data leak

C)

Accidental malicious data loss

D)

Accidental malicious data leak

Question 14

(True/False). In terms of database access, risk assessments
should address those who have legitimate credentials for viewing, entering,
updating, or removing data from the database and those who are restricted from
accessing the database or who have limited rights.

Question options:

A) True

B)
False

Question 19

When creating a named range in Excel, which of the following
rules apply:

Question options:

The first character of a name can be any character.

A named range can consist of any single character.

The name may include spaces.

The length of name is restricted to 255 characters.

Question 20

Which of the following is a valid named range in Excel:

Question options:

%ABCE

C

My Named Range

AVGCosts

Dot Image

Order Solution Now

Similar Posts