27.04.2017 Views

WRTG 394 Quiz 4 (UMUC)

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>WRTG</strong> <strong>394</strong> <strong>Quiz</strong> 4 (<strong>UMUC</strong>)<br />

BUY HERE⬊<br />

htp://www.homeworkmade.com/umuc/<br />

wrtg-<strong>394</strong>/wrtg-<strong>394</strong>-quiz-4-umuc/<br />

<strong>WRTG</strong> <strong>394</strong> <strong>Quiz</strong> 4<br />

Question<br />

1 / 1 point<br />

1<br />

Which level of management is concerned with updating inventory, scheduling production, and coordinating<br />

shipping?<br />

Question<br />

1 / 1 point<br />

2<br />

Which of the following is used to ensure that the person accessing a system is, indeed, who they present<br />

themselves to be?<br />

Question<br />

1 / 1 point<br />

3<br />

Which of the following is one of the most common ways thieves steal corporate information?<br />

Question<br />

1 / 1 point<br />

4<br />

True or false: A relational database is one in which every data item is related to every other data item.<br />

Question<br />

1 / 1 point<br />

5<br />

Which of the following make up the security triad?<br />

Question<br />

1 / 1 point<br />

6<br />

True or false: For simple uses, a spreadsheet can substitute for a database quite well.<br />

Question<br />

1 / 1 point<br />

7<br />

Which of the following is not true about firewalls?<br />

Question<br />

0 / 1 point<br />

8<br />

Which of the following is described as a measure of the degree to which a set of data satisfies a set of<br />

contstraints?<br />

Question<br />

1 / 1 point<br />

9<br />

True or false: An Intrusion Detection System (IDS) does not add any additional security.<br />

Question<br />

1 / 1 point<br />

10<br />

When looking to secure information resources, organizations must balance the need for security with which of<br />

the following?<br />

Question<br />

1 / 1 point<br />

11<br />

Which of the following are characteristics of Big Data? (select all that apply)<br />

Question<br />

0 / 1 point<br />

12


Which of the following is the process of formalizing the capture, indexing, and storing of the company’s<br />

knowledge in order to benefit from the experiences and insights that the company has captured during its<br />

existence?<br />

Question<br />

1 / 1 point<br />

13<br />

Which of the following is the most popular business social network in the world, according to this week's<br />

reading on Business Social Networks?<br />

Question<br />

1 / 1 point<br />

14<br />

Which of the following should be included in a good backup plan? (select all that apply)<br />

Question<br />

1 / 1 point<br />

15<br />

Which of the following is the process of analyzing data to find previously unknown trends, patterns, and<br />

associations in order to make decisions?<br />

Question<br />

0.75 / 1 point<br />

16<br />

Which of the following are true of a data warehouse? (select all that apply)<br />

Question<br />

1 / 1 point<br />

17<br />

Which level of management is concerned with profitability and market share?<br />

Question<br />

1 / 1 point<br />

18<br />

Which of the following is the process of encoding data upon its transmission or storage so that only authorized<br />

individuals can read it?<br />

Question<br />

1 / 1 point<br />

19<br />

Which of the following is used to transform data into information in order to generate knowledge<br />

that can be used for decision making?<br />

Question<br />

1 / 1 point<br />

20<br />

Which of the following is described as the assurance that the information being accessed has not been altered<br />

and truly represents<br />

what is intended?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!