Quiz 7 - Chapter 15 - IT Fundamentals

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

The idea of only backing up files that have changed since the last backup is known as a(n) ____ backup.

a) temporal

b) occasional

c) timely

d) incremental

e) measurable

Get a hint
Hint

d) incremental

Get a hint
Hint

The Unix operating system has no security holes in it, unlike Windows.

a) True

b) False

Get a hint
Hint

b) False

Card Sorting

1/39

Anonymous user
Anonymous user
encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

The idea of only backing up files that have changed since the last backup is known as a(n) ____ backup.

a) temporal

b) occasional

c) timely

d) incremental

e) measurable

d) incremental

2
New cards

The Unix operating system has no security holes in it, unlike Windows.

a) True

b) False

b) False

3
New cards

A decision tree can be generated automatically from a database of records.

a) True

b) False

a) True

4
New cards

An intranet LAN has which of the following properties?

a) The LAN uses IP to easily extend the network to the Internet.

b) The network uses one-to-many network address translation.

c) The network uses no routers.

d) All resources use wireless communication.

e) All communication is encrypted.

a) The LAN uses IP to easily extend the network to the Internet.

5
New cards

When combining data from various databases into a data warehouse, which process might be required?

a) Data transformation

b) Data mining

c) Data matching

d) Data visualization

e) Slicing

a) Data transformation

6
New cards

Some will refer to wisdom as an understanding of ...

a) where.

b) what.

c) when.

d) why.

e) how.

d) why.

7
New cards

In rule association learning, a high frequency always means a useful rule.

a) True

b) False

b) False

8
New cards

To generate a decision tree, we need to convert numeric data into discretized or segmented groupings. For instance, we would not want to use age but instead categories of age like "youth", "teen", "young adult", "adult", "senior".

a) True

b) False

a) True

9
New cards

Symmetric key encryption is also known as ...

Correct answer:

a) private key encryption.

b) public key encryption.

c) dual usage encryption.

d) message digest encryption.

e) wireless encryption.

a) private key encryption.

10
New cards

Of these forms of RAID, which one offers no redundancy at all?

a) 0

b) 3

c) 1

d) 2

e) None of these: they all offer redundancy.

a) 0

11
New cards

What method is often used to determine closeness in clustering?

a) computing averages of all of the fields

b) rule association

c) encryption

d) pivoting

e) Euclidean distance formula

e) Euclidean distance formula

12
New cards

When generating goals of an organization, you might find that some goals contradict or conflict with other goals requiring that they be prioritized.

a) True

b) False

a) True

13
New cards

Which of the following forms of RAID is not used because the redundancy information is too time consuming to compute efficiently?

a) 0

b) 4

c) 1

d) 3

e) 2

e) 2

14
New cards

To support confidentiality of data stored in files, we might want to implement ...

a) All of the above.

b) redundancy.

c) backups.

d) physical security like guards and cameras.

e) access control (permissions).

e) access control (permissions).

15
New cards

Encryption supports ...

a) confidentiality.

b) availability.

c) All of the above

d) integrity.

e) authenticity.

a) confidentiality.

16
New cards

database is commonly a collection of ...

a) relationships.

b) fields.

c) records.

d) data marts.

e) relations.

e) relations.

17
New cards

Data mining, as a process, is not very computationally intensive and so it is highly attractive even if it cannot guarantee finding any information that is useful.

a) True

b) False

b) False

18
New cards

All information systems are stored on computer.

a) True

b) False

b) False

19
New cards

Why was Y2K an issue?

a) Early programmers used 2 digits to store the year.

b) Early programmers did not test their code.

c) Early programmers used GO TO statements in their code.

d) It was predicted by the Mayan calendar.

e) A computer virus was unleashed on January 1, 2000.

a) Early programmers used 2 digits to store the year.

20
New cards

A database projection returns _____ of a database relation.

a) specific fields of some records that match given criteria

b) all fields of some records that match given criteria

c) all fields of all records

d) None of the above: the projection modifies data, it does not return data.

e) specific fields of all records

e) specific fields of all records

21
New cards

We should think of information as ...

a) confidential data.

b) stored data.

c) sorted data.

d) interpreted data.

e) processed knowledge.

d) interpreted data.

22
New cards

The idea that collected data are correct and accurate is known as ...

a) assurance.

b) availability.

c) authenticity.

d) integrity.

e) confidentiality.

d) integrity.

23
New cards

A company may draw upon multiple sources to build their data warehouse. Which of the following would not be one of those sources?

a) Project reports

b) Enterprise resource planning systems

c) Marketing reports

d) All of the above are possible sources.

e) Sales records

d) All of the above are possible sources.

24
New cards

Which of the following is not a threat that involves an individual in an organization but instead is a threat to the technology itself?

a) social engineering

b) phishing

c) protocol attack

d) insider attack

e) They all involve individuals.

c) protocol attack

25
New cards

Which of the following is a form of protocol attack?

a) TCP hijacking

b) SQL injection

c) They are all forms of protocol attacks.

d) Phishing

e) Buffer overflow

a) TCP hijacking

26
New cards

Which of the following forms of secure communication protocol/software is used specifically for wireless communication?

a) WPA2

b) TLS

c) HTTPS

d) SSH

e) SSL

a) WPA2

27
New cards

Some organization are using biometrics in place of or in addition to passwords to support the idea of ...

a) All of the above

b) what you can do.

c) where you are.

d) who you are.

e) what you know.

d) who you are.

28
New cards

In OLAP, which of the following techniques allows you to move from a multi-dimensional view of the data to a single dimensional view of the data?

a) drilling up

b) pivoting

c) dicing

d) drilling down

e) slicing

e) slicing

29
New cards

Which level of RAID provides redundancy in the form of a complete duplicate (mirror) of the data?

a) 5

b) 1

c) 6

d) 3

e) 0

b) 1

30
New cards

Data should not only be checked for accuracy as it is gathered but it should be checked for accuracy as it is entered (or after it has been entered) into an information system.

a) True

b) False

a) True

31
New cards

RAID technology uses which of the following?

a) cloud computing

b) the Internet

c) encryption

d) hard disks

e) magnetic tape

d) hard disks

32
New cards

Projections, restrictions and joins collectively are forms of database ...

a) intersections.

b) queries.

c) inserts.

d) unions.

e) updates.

b) queries.

33
New cards

In order to demonstrate that you are an authentic operator, your web site should use ...

a) self-signed digital certificates.

b) RAID technology.

c) public key encryption.

d) non-repudiation.

e) digital certificates signed by a certificate authority.

e) digital certificates signed by a certificate authority.

34
New cards

Assume that we have 1000 store receipts and of those, we find 500 receipts include the purchase of beer. Of those 500, 400 indicate that the person also bought pretzels. The frequency of the rule "if someone buys beer they will also buy pretzels" is ...

a) 90%

b) There is no way to compute this.

c) 50%

d) 80%

e) 100%

d) 80%

35
New cards

The best way to protect the vulnerabilities of the human in IT is through ...

a) training

b) strong passwords

c) monitoring (such as camera)

d) access control

e) paying higher salaries

a) training

36
New cards

Law enforcement uses data mining to identify possible crime "hot spots" in their city to predict where future crimes might occur.

a) True

b) False

a) True

37
New cards

Which of the following encryption algorithms has been declared as insecure?

a) None of the above: they are all secure forms.

b) AES

c) SHA-1

d) DES

e) MD5

d) DES

38
New cards

In OLAP, which of the following techniques allows you to alter the perspective of the data records, for instance instead of focusing on yearly records, seeing the records broken down by products?

a) pivoting

b) dicing

c) drilling up

d) slicing

e) drilling down

a) pivoting

39
New cards

Of these RAID levels, which uses the smallest possible stripe sizes?

a) 0

b) 3

c) 1

d) 5

e) 4

b) 3

40
New cards

The goal of availability often can conflict with the goals of confidentiality and integrity.

a) True

b) False

a) True