What is the software called that allows the user to create


Assignment: Concepts and Applications of Information Technology

1. ________ is the gathering, organizing, sharing, and analyzing of the data and information to which a business has access.
a. Data
b. Information
c. Knowledge management
Organizational memory
Data
Information
Knowledge management
Organizational memory

2. Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):
Facilitating better, more informed decisions
Stimulating cultural change and innovation
Utilizing information technology to manage data and information
Impacting performance across an organization
Building knowledge that can be used to streamline operations and improve processes.

3. True or false? Tables are composed of fields, and fields are composed of records.
A) True
B) False

4. True or false? A record can contain only character data-letters, numbers, or special symbols.
A) True
B) False

5. What is the software called that allows the user to create, access, and manage a database?
A) DLP
B) DBMS
C) OO model
D) Relational Model

6. Does a database entry form allow the user to enter or modify data in the records? Select Yes or No.
A) Yes
B) No

7. Does a database query allow the user to enter or modify data in the records? Select Yes or No.
A) Yes
B) No

8. Which of the following database model choices would be best for storing video clips organized by various vacations you have taken?
A) Hierarchical
B) Flat-file
C) Object-oriented
D) Network

9. Which of the following would be an example of a loss of record integrity within a database?
A) A faculty member posts the full names and final grades on the main page of the class's website.
B) Your online banking site tells you your password has expired and requests that you submit a new one to access your accounts.
C) Your bank statement is not reflecting a refund that you know was deposited in your account last week (your account balance does reflect the refund).
D) You are denied a new credit card because the credit card company checked your credit score and found that it did not meet its minimum standards for new accounts. Your credit report does not show any invalid records.

10. Cloud storage for database contents is more efficient in terms of easy access by employees anytime, anywhere. The updated information for the database is generated with real-time information sent to a central server within the company. Updates to the cloud are made every hour during normal working hours. This could be considered a potential database __________.
A) threat
B) vulnerability

11. Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential __________ to the confidentiality of the data in the files.
A) threat
B) vulnerability

12. Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?
A) Intentional malicious data loss
B) Intentional malicious data leak
C) Accidental malicious data loss
D) Accidental malicious data leak

13. An e-mail message to all the members of your department asks each person to reply to the sender with data on his or her recent sales figures. This is data that is normally not shared with others in the department. You accidentally hit the Reply All button instead of replying to just the sender. Which of the following best describes the data issue at play in this situation?
A) Accidental data loss
B) Accidental data leak
C) Intentional data loss
D) Intentional data leak

15. (True/False). Because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises.
A) True
B) False

16. (True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database.
A) True
B) False

17. Excel allows you to add chart elements-such as chart titles, legends, and data labels-to make your chart easier to read. To add a chart element, you click the Add Chart Element command on the:
Design tab
Format tab.
View tab.

18. (True/False). You cannot format the data in an Excel spreadsheet to look like a table.
True
False

19. Once you have created a chart, you can change the type (for example, from a bar chart to a pie chart) by selecting the chart, then:
selecting Format, selecting Arrange.
selecting Design, selecting Change Chart Type.
selecting Format, selecting Change Chart Type.

20. When creating a named range in Excel, which of the following rules does NOT apply:
The first character of a name must be a letter, an underscore character (_), or a backslash (\).
You cannot use the uppercase and lowercase characters "C", "c", "R", or "r" as a defined name.
Spaces are not allowed as part of a name.
The length of the name is restricted to 155 characters.
Which of the following is a valid named range in Excel:
&ABCE
AVG Costs
My_Data
R.

Solution Preview :

Prepared by a verified Expert
Database Management System: What is the software called that allows the user to create
Reference No:- TGS02509123

Now Priced at $20 (50% Discount)

Recommended (91%)

Rated (4.3/5)