...data b. dictionary c. raw d. information correct: c 2 Processed data, or ________, can be used as the foundation for decision making. a. information b. DP c. raw data d. queries correct: a 3 Raw data must be properly ________ for storage, processing, and presentation. a. sorted b. grouped c. formatted d. arranged correct: c 4 What is a key characteristic of knowledge? a. "new" Knowledge can be derived from "old" knowledge. b. It is assembled from raw data. c. It cannot be duplicated. d. It exists in a vacuum. correct: a 5 Accurate, relevant, and timely ________ is the key to good decision making. a. relationships b. data c. processing d. information correct: d 6 What is the name for data about data? a. unique data b. superdata c. metadata d. raw data correct: c 7 Data management is a discipline that focuses on ________. a. the proper generation, storage, and retrieval of data b. the help items to be used by end users c. the management of end users d. the proper generation, storage, and retrieval of information correct: a 8 What is a benefit of using a DBMS? a. It provides seamless Internet access to database data. b. It creates automatic backups. c. It helps create an environment for end users to have access to more data. d. It provides full security to data using private/public key encryption. correct: c 9 The ________ manages interaction between the end user and the database. a. DBMS b. DP c. DM query engine d. DBMQ correct: a 10 The ________ receives all application...
Words: 8796 - Pages: 36
...with all of the following except: A.Buildings Correct B.Logical systems C.Computer Rooms D.Computer devices Answer Key: B Feedback: Answer: B Reference: Introduction Question 2 of 20 5.0/ 5.0 Points Tracing the history of a transaction through an institution is called: Correct A.Audit trail B.Intrusion control C.Biometrics D.Authentication control Answer Key: A Feedback: Answer: A Reference: Audit Trails/Access Logs Question 3 of 20 5.0/ 5.0 Points Which of the following are categories of intrusion detection devices? A.Perimeter intrusion detectors B.Motion detectors Correct C.Both of the above D.Neither of the above Answer Key: C Feedback: Answer: C Reference: Intrusion Detection Question 4 of 20 5.0/ 5.0 Points Which of the following is NOT a resource that operations security identifies the controls for? A.Software B.Hardware C.Media Correct D.All of the above are resources Answer Key: D Feedback: Answer: D Reference: Introduction Question 5 of 20 5.0/ 5.0 Points Which of the following is NOT a key element of a system of internal and security controls? A.Employ competent people B.Have adequate separation of job duties Correct C.Execute internal and external transactions D.Maintain adequate documents and records Answer Key: C Feedback: Answer: C Reference: Operations Security...
Words: 929 - Pages: 4
...| Question 1 |5 of 5 points | |[pic] |An alternative to combining tables by a subquery is to use a join. | | |[pic] | | |Selected Answer: | | |[pic]True | | | | |[pic] Question |5 of 5 points | |2 | | |[pic] |Regarding the interchangeability of subqueries and joins, | | |[pic] | | |Selected Answer: | | |[pic] a join can sometimes be used as an alternative...
Words: 5695 - Pages: 23
...technology Correct B.people C.processes D.organizations Answer Key: B Question 2 of 20 2.0 Points The three objectives of information security are: Correct A.confidentiality, integrity, and availability. B.resilience, privacy, and safety. C.confidentiality, secrecy, and privacy. D.none of the above. Answer Key: A Question 3 of 20 2.0 Points Which of the following topics would not be part of a program in information security? A.laws and ethical practices B.file access control C.security architecture Correct D.All of the above would be classes you would expect in an IS program. Answer Key: D Question 4 of 20 2.0 Points Defense in depth is needed to assure that which three mandatory activities are present in a security system? A.prevention, response, and prosecution B.response, collection of evidence, and prosecution Correct C.prevention, detection, and response D.prevention, response, and management Answer Key: C Question 5 of 20 2.0 Points The three types of security controls are: A.people, functions, and technology. Correct B.people, process, and technology. C.technology, roles, and separation of duties. D.separation of duties, processes, and people. Answer Key: B Question 6 of 20 2.0 Points The absence or weakness in a system that may possibly be exploited is called a(n): Correct A.vulnerability. B.threat. C.risk. D.exposure. Answer Key: A Question...
Words: 796 - Pages: 4
...Question 1 Correct Mark 3.00 out of 3.00 Flag question Question text The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity is _________ . Select one: a. accountability b. authenticity c. privacy d. integrity Feedback Your answer is correct. The correct answer is: privacy Question 2 Correct Mark 3.00 out of 3.00 Flag question Question text ._________ attacks attempt to alter system resources or affect their operation. Select one: a. .Active b. Release of message content c. Passive d. Traffic analysis Feedback Your answer is correct. The correct answer is: .Active Question 3 Correct Mark 3.00 out of 3.00 Flag question Question text The most common key length in modern...
Words: 1535 - Pages: 7
...equivalent to an IPv4 network ID. What is the term for this part of the address? Correct A.Site prefix B.Interface ID C.Subnet ID D.MAC address Answer Key: A Feedback: That is correct! Question 2 of 5 0.25/ 0.25 Points The IP address for Jack's laptop is 192.168.1.103. Which of the following statements about Jack's network is true? A.Jack's network is a server-based network. B.Jack's network is a directory-based network. C.Jack's network uses IPv6 addressing. Correct D.Jack's network uses private IP addressing. Answer Key: D Feedback: That is correct! Question 3 of 5 0.25/ 0.25 Points Which of the following components manages network resources and enables the provision of services to network clients? A.Internet Protocol version 6 (IPv6) Correct B.A network operating system (NOS) C.A network interface card (NIC) D.A non-dedicated server Answer Key: B Feedback: That is correct! Question 4 of 5 0.25/ 0.25 Points Any addressable and manageable device on the network other than the network cabling is referred to as a: Correct A.node. B.domain controller. C.back end. D.front end. Answer Key: A Feedback: That is correct! Question 5 of 5 0.25/ 0.25 Points Most home networks are: A.mainframe networks. B.server-based networks. Correct C.peer-to-peer networks. D.directory-based networks. Answer Key: C Feedback: That is...
Words: 275 - Pages: 2
...| query | Correct Answer: | query | | Question 2 4 out of 4 points | | | Protecting the database from unauthorized access or modification is calledAnswer | | | | | Selected Answer: | data security | Correct Answer: | data security | | | | | Question 3 4 out of 4 points | | | In a bank, all of the following are examples of end users EXCEPT aAnswer | | | | | Selected Answer: | database administrator | Correct Answer: | database administrator | | | | | Question 4 4 out of 4 points | | | A data dictionary can be used toAnswer | | | | | Selected Answer: | record the database structure | Correct Answer: | record the database structure | | | | | Question 5 4 out of 4 points | | | The miniworld that is represented in a database is also called theAnswer | | | | | Selected Answer: | universe of discourse | Correct Answer: | universe of discourse | | | | | Question 6 4 out of 4 points | | | In the staged database design approach, in what order are the three models developed?Answer | | | | | Selected Answer: | conceptual, logical, physical | Correct Answer: | conceptual, logical, physical | | | | | Question 7 0 out of 4 points | | | The process of categorizing objects by identifying the properties they have in common is calledAnswer | | | | | Selected Answer: | conceptualization | Correct Answer: | abstraction...
Words: 773 - Pages: 4
...Feedback: What you chose is correct. Part 2 of 5 - 20.0/ 30.0 Points Question 7 of 30 5.0/ 5.0 Points Communicating information to external decision makers is accomplished through ___ as part of the process of ___. A. Financial statements, bookkeeping  B. Financial statements, accounting C. Journal entries, bookkeeping D. Journal entries, accounting Answer Key: B Feedback: What you chose is correct. Question 8 of 30 5.0/ 5.0 Points Human judgment is important in which of the following AIS tasks: (i) designing source documents, (ii) recognizing recordable transactions. A. I only B. II only  C. Both I and II D. Neither I nor II Answer Key: C Feedback: What you chose is correct. Question 9 of 30 0.0/ 5.0 Points Courses intended for freshmen at a local university are numbered from 100 to 199, while courses intended for seniors at the same university are numbered from 400 to 499. Which coding system is the university using? A. Sequential B. Block  C. Hierarchical D. Mnemonic Answer Key: B Feedback: What you chose was incorrect. Question 10 of 30 5.0/ 5.0 Points As an internal control measure in the accounting cycle, physical security most clearly applies to:  A. Source documents B. The balance sheet C. The income statement D. The statement of cash flows Answer Key: A Feedback: What you chose is correct. Question 11 of 30 5.0/ 5.0 Points ...
Words: 1867 - Pages: 8
...called aAnswer | | | | | Selected Answer: | table | Correct Answer: | view | | | | | Question 2 4 out of 4 points | | | The person who designs, creates, and manages the database is theAnswer | | | | | Selected Answer: | DBA | Correct Answer: | DBA | | | | | Question 3 0 out of 4 points | | | Data consistency meansAnswer | | | | | Selected Answer: | there is no redundancy of data | Correct Answer: | all occurrences of the same data item agree | | | | | Question 4 0 out of 4 points | | | The data model that supports collections of nodes, each with its own structure, is theAnswer | | | | | Selected Answer: | relational | Correct Answer: | semistructured | | | | | Question 5 0 out of 4 points | | | The organization for which the database is designed is referred to asAnswer | | | | | Selected Answer: | the metadata | Correct Answer: | the enterprise | | | | | Question 6 4 out of 4 points | | | The behavior of an object is specified by itsAnswer | | | | | Selected Answer: | methods | Correct Answer: | methods | | | | | Question 7 0 out of 4 points | | | Which of the following activities is performed during the conceptual model design phase?Answer | | | | | Selected Answer: | planning layout of data | Correct Answer: | identifying entities, attributes, and relationships...
Words: 780 - Pages: 4
...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...
Words: 97238 - Pages: 389
...data. Furthermore, in a well-designed business intelligence environment, these unknowns are often resolved later as data that is more complete is entered into the operational systems. Irrespective of the nature of the applications, missing information has always been a problem for data warehouses. As business intelligence environments become more mature, real time and mission critical, the increased number of operational applications accentuates this problem. It is important to keep in mind the time-specific value of information. As General George S. Patton once said, "A good plan, violently executed now, is better than a perfect plan executed next week." To form a good plan, one needs adequate information now, rather than perfect and correct information...
Words: 988 - Pages: 4
...Points Earned: | 2.0/2.0 | | Correct Answer(s): | B | 2. The asterisk symbol (*) can be used in a SELECT statement to indicate that all rows in the table should be displayed in the results. A) True B) False Points Earned: | 2.0/2.0 | | Correct Answer(s): | False | 3. An index is implicitly created when a NOT NULL constraint is added to a table. A) True B) False Points Earned: | 2.0/2.0 | | Correct Answer(s): | False | 4. Commands used to modify data are called ____ commands. A) data control language (DCL) B) data manipulation language (DML) C) data modification language (DML) D) data definition language (DDL) Points Earned: | 2.0/2.0 | | Correct Answer(s): | B | 5. SQL*Plus can only be accessed via an internet interface. A) True B) False Points Earned: | 2.0/2.0 | | Correct Answer(s): | False | 6. The DISTINCT keyword can be used to indicate that duplicate data should be suppressed in the results of a query. A) True B) False Points Earned: | 2.0/2.0 | | Correct Answer(s): | True | 7. The precision of a NUMBER does not include the decimal point itself in the total number of digits that can be stored in a column. A) True B) False Points Earned: | 0.0/2.0 | | Correct Answer(s): | True | 8. When a role is removed from the database, users will lose any privileges assigned to them through that role. A) True B) False Points Earned: | 2.0/2.0 | | Correct Answer(s): | True | 9. Which...
Words: 1814 - Pages: 8
...system from an O-O perspective is called a: Answer Correct Answer: CRC card. Question 2 2 out of 2 points Which leaves a stub behind as a record when separated? Answer Correct Answer: perforated form Question 3 2 out of 2 points Which of the following is true when implementing a one-to-many relationship? Answer Correct Answer: The file on the many end has a foreign key consisting of the primary key on the one end. Question 4 2 out of 2 points Which of the following is not a form of electronic output? Answer Correct Answer: Report Question 5 2 out of 2 points Which type of class acts as a coordinator when implementing classes? Answer Correct Answer: Control Question 6 2 out of 2 points Which of the following is not one of the main components of UML? Answer Correct Answer: Entities Question 7 2 out of 2 points Which is not one of the seven main sections of a strong form? Answer Correct Answer: footnote Question 8 2 out of 2 points What is an important operation because it can take two relations and combine them to make a larger relation Answer Correct Answer: join Question 9 2 out of 2 points Which type of report prints a line for all records that match a set of conditions? Answer Correct Answer: Exception Question 10 2 out of 2 points ...
Words: 1389 - Pages: 6
...about the problem wrong, and that good men are good, not through knowledge but by some other means (Meno 96e). Meno, does not quite follow what Socrates is saying. Socrates begins that good men must be good, and that the reason they are good is by giving correct instructions, to which Meno agrees. Socrates then says that one cannot give correct instructions, unless they have knowledge of instructions is an incorrect statement (97a). While Meno does not necessarily follow, Socrates is saying that there is in fact more than one way that a man can give correct directions, one does not simply need knowledge . To explain this he asks Meno that if a man knew the way to the city Larissa, he would surely be able to give correct directions to it (97a). Meno agrees. If the man has experienced the road and the travel, he has the knowledge to lead others to Larissa correctly. Socrates then asks Meno that if a man had the correct opinion about how to get to Larissa, but had not actually traveled to Larissa himself, he would still give just as good directions as the man who had knowledge of the path to Larissa (97b). It has been shown one does not need knowledge in order to give correct directions, one simply must need a correct opinion about the directions. Socrates reaffirms this new finding and carries on the conversation about the nature of virtue by saying that they forgot that true opinion can also guide good men not only knowledge (97c). Meno counters, claiming that true...
Words: 1084 - Pages: 5
...Expression Web is a GUI Web development application that offers which distinct functions? Correct A.Site management, page layout and design, and data connection B.Page layout and design, server hosting, and server extensions C.Server hosting, secure connection, and site management D.Secure connection, e-commerce capabilities, and server extensions Answer Key: A Question 2 of 5 2.0/ 2.0 Points Expression Web allows you to: A.open only entire Web sites, not individual pages. B.create HTML pages that must be modified manually. C.modify only Web sites and individual pages created with Expression Web. Correct D.modify any individual X/HTML page or site created with or without Expression Web. Answer Key: D Question 3 of 5 2.0/ 2.0 Points Which Expression Web view shows the files in your Web site on both the local (source) machine and on the remote (destination) server? A.Folders view B.Hyperlinks view Correct C.Publishing View D.Page view Answer Key: C Question 4 of 5 2.0/ 2.0 Points Which Expression Web view is used for layout and design? A.Hyperlinks view B.Folders view Correct C.Page view D.Reports view Answer Key: C Question 5 of 5 2.0/ 2.0 Points What functionality does Expression Web offer to develop XHTML-compliant code? A.Expression Web does not offer any functionality for developing XHTML-compliant code. Correct B.Expression Web automatically generates code that fully complies with current XHTML specifications...
Words: 319 - Pages: 2