QUESTION Which of the following is NOT a preventive strategy against cyberthreats? A) firewall B) password C) disaster recovery plan D) biometric authentication E) encryption ANSWER Answer: C Explanation: C) The best way to avoid harm from cyberthreats is to prevent access with strategies such as encryption and firewalls. But attacks can occur despite […]
QUESTION For information to be useful to a business, it must have five characteristics. Firewalls address which of these characteristics? A) relevance B) security C) accuracy D) timeliness E) completeness ANSWER Answer: B Explanation: B) Information must be secure—uncompromised by hackers or data thieves—in order to be useful. A firewall is a system of […]
QUESTION Tuan is analyzing quarterly sales data from 2007 to the present to determine why sales for the company’s hybrid motorcycle released in 2010 have not met projections. To get a more accurate picture, Tuan eliminates all pre-2010 reports from his analysis. Why? A) The information is not secure. B) The information is not timely. […]
QUESTION What organizes and presents information from a decision support system in a way that is easy to read? A) desktop B) control panel C) data warehouse D) dashboard E) database ANSWER Answer: D Explanation: D) A dashboard, like the instrument panel in a car, organizes and presents DSS information in a way that […]
QUESTION Sammy is a customer relationship analyst with a grocery store chain. He is using software to review sales figures after the stores instituted new customer-first policies. The system also weighs demographics from customer loyalty cards. What is helping Sammy determine the new policy’s impact on sales? A) business intelligence system B) data mining system […]
QUESTION Which of the following is NOT a decision support system? A) data mining system B) expert system C) global positioning system D) business intelligence system E) executive support system ANSWER Answer: C Explanation: C) A global positioning system (GPS) can provide raw data that is used by decision support systems.
QUESTION Which of the following best supports the ability to make informed decisions when operating a business? A) external data B) customer preference data C) internal business data D) information E) physical data ANSWER Answer: D Explanation: D) Data are raw facts and figures that may not be helpful when making business decisions. Information […]
QUESTION Petra works at a leading biotech company, where she runs DNA samples and chemical formulas to discover molecule pairs that might cure genetic diseases. What type of computer does Petra use in her job? A) supercomputer B) microcontroller C) laptop D) tablet E) workstation ANSWER Answer: E Explanation: E) Petra deals with highly […]
QUESTION On Neil’s first day interning at the school’s tech lab, the director asked him to gather all the input devices and place them on the counter for inventory. Neil had never seen so much stuff, but he thinks he got everything. Maybe he grabbed too much. What should NOT be in the group on […]
QUESTION Malware makes repeated requests of a computer network, overloading it and denying access to legitimate users. Indicate whether the statement is true or false. ANSWER Answer: FALSE Explanation: Making repeated requests of a computer system or network to deny access by legitimate users is a denial-of-service (DoS) attack.