WRTG 394 Quiz 4 (UMUC)
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>WRTG</strong> <strong>394</strong> <strong>Quiz</strong> 4 (<strong>UMUC</strong>)<br />
BUY HERE⬊<br />
htp://www.homeworkmade.com/umuc/<br />
wrtg-<strong>394</strong>/wrtg-<strong>394</strong>-quiz-4-umuc/<br />
<strong>WRTG</strong> <strong>394</strong> <strong>Quiz</strong> 4<br />
Question<br />
1 / 1 point<br />
1<br />
Which level of management is concerned with updating inventory, scheduling production, and coordinating<br />
shipping?<br />
Question<br />
1 / 1 point<br />
2<br />
Which of the following is used to ensure that the person accessing a system is, indeed, who they present<br />
themselves to be?<br />
Question<br />
1 / 1 point<br />
3<br />
Which of the following is one of the most common ways thieves steal corporate information?<br />
Question<br />
1 / 1 point<br />
4<br />
True or false: A relational database is one in which every data item is related to every other data item.<br />
Question<br />
1 / 1 point<br />
5<br />
Which of the following make up the security triad?<br />
Question<br />
1 / 1 point<br />
6<br />
True or false: For simple uses, a spreadsheet can substitute for a database quite well.<br />
Question<br />
1 / 1 point<br />
7<br />
Which of the following is not true about firewalls?<br />
Question<br />
0 / 1 point<br />
8<br />
Which of the following is described as a measure of the degree to which a set of data satisfies a set of<br />
contstraints?<br />
Question<br />
1 / 1 point<br />
9<br />
True or false: An Intrusion Detection System (IDS) does not add any additional security.<br />
Question<br />
1 / 1 point<br />
10<br />
When looking to secure information resources, organizations must balance the need for security with which of<br />
the following?<br />
Question<br />
1 / 1 point<br />
11<br />
Which of the following are characteristics of Big Data? (select all that apply)<br />
Question<br />
0 / 1 point<br />
12
Which of the following is the process of formalizing the capture, indexing, and storing of the company’s<br />
knowledge in order to benefit from the experiences and insights that the company has captured during its<br />
existence?<br />
Question<br />
1 / 1 point<br />
13<br />
Which of the following is the most popular business social network in the world, according to this week's<br />
reading on Business Social Networks?<br />
Question<br />
1 / 1 point<br />
14<br />
Which of the following should be included in a good backup plan? (select all that apply)<br />
Question<br />
1 / 1 point<br />
15<br />
Which of the following is the process of analyzing data to find previously unknown trends, patterns, and<br />
associations in order to make decisions?<br />
Question<br />
0.75 / 1 point<br />
16<br />
Which of the following are true of a data warehouse? (select all that apply)<br />
Question<br />
1 / 1 point<br />
17<br />
Which level of management is concerned with profitability and market share?<br />
Question<br />
1 / 1 point<br />
18<br />
Which of the following is the process of encoding data upon its transmission or storage so that only authorized<br />
individuals can read it?<br />
Question<br />
1 / 1 point<br />
19<br />
Which of the following is used to transform data into information in order to generate knowledge<br />
that can be used for decision making?<br />
Question<br />
1 / 1 point<br />
20<br />
Which of the following is described as the assurance that the information being accessed has not been altered<br />
and truly represents<br />
what is intended?