IFSM201 Concepts and Applications of Information Technology
Week 1 Quiz
Data 1
Data 2
Question 2
(True/False). Information about a person, place or thing remains the same over time.
Question options:
True
False
Question 3
(True/False). Data is made up by many pieces of information.
Question options:
True
False
Question 7
Knowledge flows from the information that has been generated. Which of the following does not necessarily flow from information that has been generated:
Question options:
The information can provide a better comprehension of a specific problem
Since information is based on data, and data is just the facts, the knowledge gained from the information is always correct.
The information can indicate what should be done and how it might be accomplished.
The information might suggest how one might be personally involved
Question 8
The following would be an example of which type of data:
Responses posted to an open-ended questionnaire related to religious beliefs
Question options:
Quantitative
Qualitative
Categorical
Question 12
Which of the following would be the best way to collect data regarding where your extended family would like to hold the next family reunion.
Question options:
A survey you design yourself
Acquire the data from a web site that lists favorite locations for family reunions
Acquire the data from a source the Open Access Directory’s data repository
Question 16
Based on your readings regarding the volume of big data, choose the list that represents the items in the list in terms of general to specific:
Question options:
Data Set, Data on the Internet, Big Data, Information in a 1,000-page Research Report
Big Data, Data on the Internet, Data Set, Information in a 1,000-page Research Report
Data on the Internet, Big Data, Information in a 1,000-page Report, Data Set
Question 18
Excel files are called:
Question options:
Worksheets
Workbooks
Pages
Tabs
Question 19
The Excel Ribbon has three modes – Auto Hide, Show Tabs, and Show Tabs and Command. Which mode would you choose to enable the worksheet itself to take up the entire screen?
Question options:
Show Tabs
Auto-hide
Show Tabs and Commands
IFSM201 Concepts and Applications of Information Technology
Week 2 Quiz
Question 1
Chat messages are an example of:
Question options:
Information shared by individuals
Information shared by organizations
Information shared by firmware/software.
Question 6
If your home network has more than one computer computer or laptop or tablet or other internet enabled device that requires internet access or to use wifi, the component needed to support this is the:
Question options:
modem.
router.
fax machine
mouse.
Question 8
If you are connecting only one device (computer or laptop or tablet or other internet enabled device) to the network from a single location in your home and do not need wifi, the component needed is:
Question options:
a modem.
a router.
a fax machine.
a mouse.
Question 10
When discussing home networks, a server or a host is:
Question options:
the modem.
the router
One device that is physically connected to the router and through the router to the internet
Another computer in the home that needs to be connected
Question 13
(True or False). The Internet of Things means web pages with descriptions of devices that can connect through the Internet.
Question options:
True
False
Question 18
Which of the following would not be considered an example of a pre-defined function?
Question options:
MIN(A1:A8)
(A1 + A2)
SUM (A1 + A2)
COUNTA (A1:A8)
Question 20
Before you use the subtotal command, your data must be:
Question options:
filtered.
sorted.
summarized
IFSM201 Concepts and Applications of Information Technology
Week 3 Quiz
Question 1
Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):
Question options:
Facilitating better, more informed decisions
Stimulating cultural change and innovation
Utilizing information technology to manage data and information
Impacting performance across an organization
Building knowledge that can be used to streamline operations and improve processes.
Question 5
What are procedures that help keep a database current?
Question options:
A)
Database query procedures
B)
Report generation procedures
C)
File maintenance procedures
D)
Data entry procedures
Question 7
Does a database report allow the user to enter or modify data in the records? Select Yes or No.
Question options:
A)
Yes
B)
No
Question 9
Which of the following would be an example of a loss of record confidentiality in a database?
Question options:
A)
You make all your personal information on the Facebook site “public” and available to everyone.
B)
Although you clicked the option to “Do not share information with any other companies or sites” on an online bookstore’s website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.
C)
Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.
D)
Your credit card company issued you a new card when your old one was about to expire.
Question 11
Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.
Question options:
A)
threat to
B)
vulnerability of
Question 12
A staff/faculty member uses proprietary (owned and protected by the university) data from the university’s student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?
Question options:
A)
Malicious data loss
B)
Intentional data leak
C)
Accidental data loss
D)
Malicious data leak
Question 13
Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?
Question options:
A)
Intentional malicious data loss
B)
Intentional malicious data leak
C)
Accidental malicious data loss
D)
Accidental malicious data leak
Question 14
(True/False). In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.
Question options:
A) True
B) False
Question 19
When creating a named range in Excel, which of the following rules apply:
Question options:
The first character of a name can be any character.
A named range can consist of any single character.
The name may include spaces.
The length of name is restricted to 255 characters.
Question 20
Which of the following is a valid named range in Excel:
Question options:
%ABCE
C
My Named Range
AVGCosts
IFSM201 Concepts and Applications of Information Technology
Week 4 Quiz
Question 2
All other issues aside, a customer is __________ to do business or increase business with a company if a customer perceives that a service issue is not dealt with fairly.
Question options:
A)
likely
B)
not likely
Question 3
(True/False). The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.
Question options:
A) True
B) False
Question 11
(True/False). Whether the focus is acquisition, loyalty, retention, or service, a company’s use of CRM results in greater profits for the company.
Question options:
A) True
B) False
Question 12
Is the following an example of increasing brand awareness through groups or fans? Select Yes or No
When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.
Question options:
A)
Yes
B)
No
Question 15
Is the following an example of increasing brand awareness through groups or fans? Select Yes or No.
Your instant messaging service attaches a message to the bottom of each message inviting the recipient to sign up for this same service provider.
Question options:
A)
Yes
B)
No
Question 17
When you sign on to your favorite social media website, a number of sponsored ads appear on your home page. Which category of social media advertising does this represent?
Question options:
A)
Direct advertising.
B)
Sending ads to a person’s network of friends.
C)
Increasing brand awareness through groups or fans.
D)
Using the company’s own social networking site.
E)
Viral marketing
Question 19
(True/False). Goal Seek allows to you put various parts together to calculate a result.
Question options:
True
False
Question 20
(True/False). To create a Pivot Chart, you would first select the Design tab from the PivotTable Tools.
Question options:
True
False
IFSM201 Concepts and Applications of Information Technology
Week 5 Quiz
Question 1
(True/False). If the definition of an IS is the medium for recording and storing data, and disseminating information, this would be an IS from a functional perspective.
Question options:
True
False
Question 6
A decision support information system is which type of system?
Question options:
Operational
Tactical
Strategic
Question 7
Which of the following is an example of a tactical information system?
Question options:
TPS
MIS
DSS
IFSM201 Concepts and Applications of Information Technology
Week 6 Quiz
Question 1
Which of the following statements would be most likely to appear in a professional association’s code of ethics for its members?
Question options:
A)
I will be use organizational supplies for official purposes only.
B)
I will maintain the confidentiality of my username and password.
C)
I will use my network account only for the purpose specified in my job description.
D)
I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.
Question 2
(Yes/No). Is this statement correct: Professional associations develop a code of conduct for members in order to guide and govern the professional behaviors of the members.
Question options:
A)
Yes
B)
No
Question 13
What is the typical relationship between a user access agreement and an employee code of conduct?
Question options:
A)
An employee code of conduct is a legally binding version of a user access agreement.
B)
An employee code of conduct is usually one part of a user access agreement.
C)
A user access agreement is usually one part of an employee code of conduct.
D)
A user access agreement specifies what penalties will be imposed when an employee violates the employee code of conduct.
Question 15
(Yes/No). Would the following be considered a violation of user access agreement?
Visiting social networking sites during lunch breaks.
Question options:
A)
Yes
B)
No
C)
Maybe
Question 23
A computer is completely compromised when it won’t turn on or operate. What is the best way to fix it?
Question options:
A)
Change all of your passwords in your online accounts
B)
Have it fixed by a computer professional