IFSM201 Concepts and Applications of Information Technology
Week 3 Quiz
 
Question 1
Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):
 
Question options:
 
Facilitating better, more informed decisions
 
 
Stimulating cultural change and innovation
 
 
Utilizing information technology to manage data and information
 
 
Impacting performance across an organization
 
 
Building knowledge that can be used to streamline operations and improve processes.
 
 
Question 5         
What are procedures that help keep a database current?
 
Question options:
 
A)
 
Database query procedures
 
 
B)
 
Report generation procedures
 
 
C)
 
File maintenance procedures
 
 
D)
 
Data entry procedures
 
Question 7                         
Does a database report allow the user to enter or modify data in the records? Select Yes or No.
 
Question options:
 
A)
 
Yes
 
 
B)
 
No
 
Question 9                         
Which of the following would be an example of a loss of record confidentiality in a database?
 
Question options:
 
A)
 
You make all your personal information on the Facebook site “public” and available to everyone.
 
 
B)
 
Although you clicked the option to “Do not share information with any other companies or sites” on an online bookstore’s website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.
 
 
C)
 
Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.
 
 
D)
 
Your credit card company issued you a new card when your old one was about to expire.
 
Question 11                       
Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.
 
Question options:
 
A)
 
threat to
 
 
B)
 
vulnerability of
 
Question 12                       
A staff/faculty member uses proprietary (owned and protected by the university) data from the university’s student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?
 
Question options:
 
A)
 
Malicious data loss
 
 
B)
 
Intentional data leak
 
 
C)
 
Accidental data loss
 
 
D)
 
Malicious data leak
 
Question 13       
Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?
 
Question options:
 
A)
 
Intentional malicious data loss
 
 
B)
 
Intentional malicious data leak
 
 
C)
 
Accidental malicious data loss
 
 
D)
 
Accidental malicious data leak
 
 
Question 14                       
(True/False). In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.
 
Question options:
                A) True
                B) False
 
Question 19                       
When creating a named range in Excel, which of the following rules apply:
 
Question options:
 
The first character of a name can be any character.
 
 
A named range can consist of any single character.
 
 
The name may include spaces.
 
 
The length of name is restricted to 255 characters.
 
 
Question 20       
Which of the following is a valid named range in Excel:
 
Question options:
 
%ABCE
 
 
C
 
 
My Named Range
 
 
AVGCosts