Business

Which of the following is NOT a preventive strategy against cyberthrea

QUESTION Which of the following is NOT a preventive strategy against cyberthreats? A) firewall B) password C) disaster recovery plan D) biometric authentication E) encryption   ANSWER Answer: C Explanation: C) The best way to avoid harm from cyberthreats is to prevent access with strategies such as encryption and firewalls. But attacks can occur despite […]

Read full post

Date: September 3rd, 2020

For information to be useful to a business, it must have five characte

QUESTION For information to be useful to a business, it must have five characteristics. Firewalls address which of these characteristics? A) relevance B) security C) accuracy D) timeliness E) completeness   ANSWER Answer: B Explanation: B) Information must be secure—uncompromised by hackers or data thieves—in order to be useful. A firewall is a system of […]

Read full post

Date: September 3rd, 2020

Tuan is analyzing quarterly sales data from 2007 to the present to det

QUESTION Tuan is analyzing quarterly sales data from 2007 to the present to determine why sales for the company’s hybrid motorcycle released in 2010 have not met projections. To get a more accurate picture, Tuan eliminates all pre-2010 reports from his analysis. Why? A) The information is not secure. B) The information is not timely. […]

Read full post

Date: September 3rd, 2020

What organizes and presents information from a decision support system

QUESTION What organizes and presents information from a decision support system in a way that is easy to read? A) desktop B) control panel C) data warehouse D) dashboard E) database   ANSWER Answer: D Explanation: D) A dashboard, like the instrument panel in a car, organizes and presents DSS information in a way that […]

Read full post

Date: September 3rd, 2020

Sammy is a customer relationship analyst with a grocery store chain. H

QUESTION Sammy is a customer relationship analyst with a grocery store chain. He is using software to review sales figures after the stores instituted new customer-first policies. The system also weighs demographics from customer loyalty cards. What is helping Sammy determine the new policy’s impact on sales? A) business intelligence system B) data mining system […]

Read full post

Date: September 3rd, 2020

Which of the following is NOT a decision support system? A) data mini

QUESTION Which of the following is NOT a decision support system? A) data mining system B) expert system C) global positioning system D) business intelligence system E) executive support system   ANSWER Answer: C Explanation: C) A global positioning system (GPS) can provide raw data that is used by decision support systems.

Read full post

Date: September 3rd, 2020

Which of the following best supports the ability to make informed deci

QUESTION Which of the following best supports the ability to make informed decisions when operating a business? A) external data B) customer preference data C) internal business data D) information E) physical data   ANSWER Answer: D Explanation: D) Data are raw facts and figures that may not be helpful when making business decisions. Information […]

Read full post

Date: September 3rd, 2020

Petra works at a leading biotech company, where she runs DNA samples a

QUESTION Petra works at a leading biotech company, where she runs DNA samples and chemical formulas to discover molecule pairs that might cure genetic diseases. What type of computer does Petra use in her job? A) supercomputer B) microcontroller C) laptop D) tablet E) workstation   ANSWER Answer: E Explanation: E) Petra deals with highly […]

Read full post

Date: September 3rd, 2020

Malware makes repeated requests of a computer network, overloading it

QUESTION Malware makes repeated requests of a computer network, overloading it and denying access to legitimate users. Indicate whether the statement is true or false.   ANSWER Answer: FALSE Explanation: Making repeated requests of a computer system or network to deny access by legitimate users is a denial-of-service (DoS) attack.

Read full post

Date: September 3rd, 2020