Chat with us, powered by LiveChat UMUC IFSM201 2018 December All Week Quizess (Few Answers) Latest - Credence Writers
+1(978)310-4246 [email protected]

IFSM201 Concepts and Applications of Information Technology
Week 1 Quiz
 
Data 1
Data 2
Question 2
(True/False). Information about a person, place or thing remains the same over time.
 
Question options:
                True
                False
 
Question 3
(True/False). Data is made up by many pieces of information.
 
Question options:
                True
                False
 
Question 7                         
Knowledge flows from the information that has been generated. Which of the following does not necessarily flow from information that has been generated:
 
Question options:
 
The information can provide a better comprehension of a specific problem
 
 
Since information is based on data, and data is just the facts, the knowledge gained from the information is always correct.
 
 
The information can indicate what should be done and how it might be accomplished.
 
 
The information might suggest how one might be personally involved
 
Question 8                         
The following would be an example of which type of data:
 
Responses posted to an open-ended questionnaire related to religious beliefs
 
Question options:
 
Quantitative
 
 
Qualitative
 
 
Categorical
 
Question 12                       
Which of the following would be the best way to collect data regarding where your extended family would like to hold the next family reunion.
 
Question options:
 
A survey you design yourself
 
 
Acquire the data from a web site that lists favorite locations for family reunions
 
 
Acquire the data from a source the Open Access Directory’s data repository
 
Question 16       
Based on your readings regarding the volume of big data, choose the list that represents the items in the list in terms of general to specific:
 
Question options:
 
Data Set, Data on the Internet, Big Data, Information in a 1,000-page Research Report
 
 
Big Data, Data on the Internet, Data Set, Information in a 1,000-page Research Report
 
 
Data on the Internet, Big Data, Information in a 1,000-page Report, Data Set
 
Question 18       
Excel files are called:
 
Question options:
 
Worksheets
 
 
Workbooks
 
 
Pages
 
 
Tabs
 
Question 19                       
The Excel Ribbon has three modes – Auto Hide, Show Tabs, and Show Tabs and Command.  Which mode would you choose to enable the worksheet itself to take up the entire screen?
 
Question options:
 
Show Tabs
 
 
Auto-hide
 
 
Show Tabs and Commands
 
IFSM201 Concepts and Applications of Information Technology
Week 2 Quiz  
 
Question 1
Chat messages are an example of:
 
Question options:
 
Information shared by individuals
 
 
Information shared by organizations
 
 
Information shared by firmware/software.
 
Question 6         
If your home network has more than one computer computer or laptop or tablet or other internet enabled device that requires internet access or to use wifi, the component needed to support this is the:
 
Question options:
 
modem.
 
 
router.
 
 
fax machine
 
 
mouse.
 
Question 8         
If you are connecting only one device (computer or laptop or tablet or other internet enabled device) to the network from a single location in your home and do not need wifi, the component needed is:
 
Question options:
 
a modem.
 
 
a router.
 
 
a fax machine.
 
 
a mouse.
 
Question 10       
When discussing home networks, a server or a host is:
 
Question options:
 
the modem.
 
 
the router
 
 
One device that is physically connected to the router and through the router to the internet
 
 
Another computer in the home that needs to be connected
 
 
Question 13       
(True or False). The Internet of Things means web pages with descriptions of devices that can connect through the Internet.
 
Question options:
                True
                False
 
Question 18       
Which of the following would not be considered an example of a pre-defined function?
 
Question options:
 
MIN(A1:A8)
 
 
(A1 + A2)
 
 
SUM (A1 + A2)
 
 
COUNTA (A1:A8)
 
 
Question 20
Before you use the subtotal command, your data must be:
Question options:
 
filtered.
 
 
sorted.
 
 
summarized
 
IFSM201 Concepts and Applications of Information Technology
Week 3 Quiz
 
Question 1
Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):
 
Question options:
 
Facilitating better, more informed decisions
 
 
Stimulating cultural change and innovation
 
 
Utilizing information technology to manage data and information
 
 
Impacting performance across an organization
 
 
Building knowledge that can be used to streamline operations and improve processes.
 
 
Question 5         
What are procedures that help keep a database current?
 
Question options:
 
A)
 
Database query procedures
 
 
B)
 
Report generation procedures
 
 
C)
 
File maintenance procedures
 
 
D)
 
Data entry procedures
 
Question 7                         
Does a database report allow the user to enter or modify data in the records? Select Yes or No.
 
Question options:
 
A)
 
Yes
 
 
B)
 
No
 
Question 9                         
Which of the following would be an example of a loss of record confidentiality in a database?
 
Question options:
 
A)
 
You make all your personal information on the Facebook site “public” and available to everyone.
 
 
B)
 
Although you clicked the option to “Do not share information with any other companies or sites” on an online bookstore’s website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.
 
 
C)
 
Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.
 
 
D)
 
Your credit card company issued you a new card when your old one was about to expire.
 
Question 11                       
Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.
 
Question options:
 
A)
 
threat to
 
 
B)
 
vulnerability of
 
Question 12                       
A staff/faculty member uses proprietary (owned and protected by the university) data from the university’s student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?
 
Question options:
 
A)
 
Malicious data loss
 
 
B)
 
Intentional data leak
 
 
C)
 
Accidental data loss
 
 
D)
 
Malicious data leak
 
Question 13       
Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?
 
Question options:
 
A)
 
Intentional malicious data loss
 
 
B)
 
Intentional malicious data leak
 
 
C)
 
Accidental malicious data loss
 
 
D)
 
Accidental malicious data leak
 
 
Question 14                       
(True/False). In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.
 
Question options:
                A) True
                B) False
 
Question 19                       
When creating a named range in Excel, which of the following rules apply:
 
Question options:
 
The first character of a name can be any character.
 
 
A named range can consist of any single character.
 
 
The name may include spaces.
 
 
The length of name is restricted to 255 characters.
 
 
Question 20       
Which of the following is a valid named range in Excel:
 
Question options:
 
%ABCE
 
 
C
 
 
My Named Range
 
 
AVGCosts
IFSM201 Concepts and Applications of Information Technology
Week 4 Quiz
Question 2         
All other issues aside, a customer is __________ to do business or increase business with a company if a customer perceives that a service issue is not dealt with fairly.
 
Question options:
 
A)
 
likely
 
 
B)
 
not likely
 
Question 3                         
(True/False). The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.
 
Question options:
                A) True
                B) False
 
Question 11       
(True/False). Whether the focus is acquisition, loyalty, retention, or service, a company’s use of CRM results in greater profits for the company.
 
Question options:
                A) True
                B) False
 
Question 12                       
Is the following an example of increasing brand awareness through groups or fans? Select Yes or No
 
When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.
 
Question options:
 
A)
 
Yes
 
 
B)
 
No
 
Question 15       
Is the following an example of increasing brand awareness through groups or fans? Select Yes or No.
 
Your instant messaging service attaches a message to the bottom of each message inviting the recipient to sign up for this same service provider.
 
Question options:
 
A)
 
Yes
 
 
B)
 
No
 
Question 17       
When you sign on to your favorite social media website, a number of sponsored ads appear on your home page. Which category of social media advertising does this represent?
 
Question options:
 
A)
 
Direct advertising.
 
 
B)
 
Sending ads to a person’s network of friends.
 
 
C)
 
Increasing brand awareness through groups or fans.
 
 
D)
 
Using the company’s own social networking site.
 
 
E)
 
Viral marketing
 
Question 19       
(True/False). Goal Seek allows to you put various parts together to calculate a result.
 
Question options:
                True
                False
Question 20       
(True/False). To create a Pivot Chart, you would first select the Design tab from the PivotTable Tools.
 
Question options:
                True
                False
IFSM201 Concepts and Applications of Information Technology
Week 5 Quiz
Question 1
(True/False). If the definition of an IS is the medium for recording and storing data, and disseminating information, this would be an IS from a functional perspective.
 
Question options:
                True
                False
 
Question 6         
A decision support information system is which type of system?
 
Question options:
 
Operational
 
 
Tactical
 
 
Strategic
 
Question 7         
Which of the following is an example of a tactical information system?
 
Question options:
 
TPS
 
 
MIS
 
 
DSS
 
IFSM201 Concepts and Applications of Information Technology
Week 6 Quiz
 
Question 1                         
Which of the following statements would be most likely to appear in a professional association’s code of ethics for its members?
 
Question options:
 
A)
 
I will be use organizational supplies for official purposes only.
 
 
B)
 
I will maintain the confidentiality of my username and password.
 
 
C)
 
I will use my network account only for the purpose specified in my job description.
 
 
D)
 
I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.
 
Question 2                         
(Yes/No). Is this statement correct: Professional associations develop a code of conduct for members in order to guide and govern the professional behaviors of the members.
 
Question options:
 
A)
 
Yes
 
 
B)
 
No
 
Question 13                       
What is the typical relationship between a user access agreement and an employee code of conduct?
 
Question options:
 
A)
 
An employee code of conduct is a legally binding version of a user access agreement.
 
 
B)
 
An employee code of conduct is usually one part of a user access agreement.
 
 
C)
 
A user access agreement is usually one part of an employee code of conduct.
 
 
D)
 
A user access agreement specifies what penalties will be imposed when an employee violates the employee code of conduct.
 
Question 15                       
(Yes/No). Would the following be considered a violation of user access agreement?
 
Visiting social networking sites during lunch breaks.
 
Question options:
 
A)
 
Yes
 
 
B)
 
No
 
 
C)
 
Maybe
 
Question 23                       
A computer is completely compromised when it won’t turn on or operate. What is the best way to fix it?
 
Question options:
 
A)
 
Change all of your passwords in your online accounts
 
 
B)
 
Have it fixed by a computer professional

error: Content is protected !!