1. Which of the following scenarios would not lend itself to using a database in
ID: 3764708 • Letter: 1
Question
1. Which of the following scenarios would not lend itself to using a database instead of a spreadsheet?
a) You need to create mailing labels from the information.
b)You need to create reports that pull related pieces of data from multiple records/sources within the data.
c) You need to apply some complex numerical functions on the data.
d) You have a large amount of information with complex relationships between the items.
2. In terms of customer service issues, which of the following is the least likely reason for using a robust CRM?
a) A CRM can provide a more rapid response to queries and concerns by forwarding the query to the right department.
b) A CRM can enable members of pertinent departments to have access to all the relevant information, enabling them to answer queries and resolve problems quickly and easily.
c) A CRM can provide a company's marketing department with information needed to identify and target new customers.
d)A CRM can optimize the information shared among departments, resulting in better management of existing accounts.
3. A data warehouse will typically contain the history of all previous interactions with specific users (including product use and transactions), but rarely includes other types of data.
True or false?
4. Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?
a) Accidental malicious data leak
b) Intentional malicious data loss
c) Accidental malicious data loss
d) Intentional malicious data leak
5. If a patch is required to address a potential loophole in the security of a database, this would be considered a potential security.
a) Threat
b) Vulnerability
6. A record can contain only character data—letters, numbers, or special symbols.
True or False?
7. What is a DBMS wizard?
a) A form on the screen that allows the user to enter or modify data
b) A form that allows the user to retrieve data
c) A software application that allows a user to create, modify, and maintain a database
d) A type of hardware that allows you to create, access, and manage a database
8. Just before a major layoff, a nervous employee uses his legitimate access to the company's database and begins downloading information related to the company that he might be able to use when applying for a new job—proposed projects, sales information, contact lists, and so on. Which threat best describes this database breach?
a) Weak authentication
b) Accidental breach resulting from incorrect (but not malicious) usage
c) Unauthorized access by insiders
d) Unprotected personal hardware collection
9. A large travel agency has a customer service group that monitors its Facebook page on a 24/7 basis and responds immediately to posts about operational problems. Which of the following best describes the component of CRM in play here?
a) Mining the social media inputs
b) Keeping valuable staff
c) Privacy
d) Cleaning up the data
10. You receive an offer for a credit card that can be use to accrue points that apply to purchase of airline tickets. This comes from a bank that you currently do not use for any banking services. This is a form of CRM that is most typically used for __________.
a) aquiring new customers
b) promoting loyalty to the company
c) a special service for current customers
d) retention of customers
11. Which of the following would be an example of a loss of availability to records within a database?
a) A classmate tells you that she could see your grades—not just her own—posted in the class’s roster.
b) Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.
c) You are applying for a new credit card and the company indicates that they will be checking your credit score at one of the three primary credit reporting companies.
d) You do a lot of banking online. Today, when you attempted to log in to your account, your valid ID and password are denied, and you cannot get access to your accounts.
12. You make an airline reservation using the airline’s website. While at the site, you are encouraged to “Follow us on...” Facebook, YouTube, or Twitter. You visit the airline’s Facebook page and read notices and comments. What is this an example of?
a) Direct advertising
b) Viral marketing
c) Using the company’s own social networking site
d) Increasing brand awareness through groups or fans
13. A database breach always involves PII.
True or False?
14. In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.
True or False?
15. What is one advantage of using a relational database over a spreadsheet or flat file to store data?
a) It enables reduced memory and storage allocation.
b) It allows for reduced complexity in the design and implementation.
c) It reduces risk of unauthorized access to the data.
d) It reduces data redundancy.
16. It is just too challenging to have different passwords for every device you use and every online site that requires an ID and password. It would be OK to use a very strong base word or phrase and change the same 2 or 3 characters in that word/phrase for each site.
True or False?
Explanation / Answer
1. Which of the following scenarios would not lend itself to using a database instead of a spreadsheet?
Answer:
c) You need to apply some complex numerical functions on the data.
2. In terms of customer service issues, which of the following is the least likely reason for using a robust CRM?
Answer:
a) A CRM can provide a more rapid response to queries and concerns by forwarding the query to the right department.
3. A data warehouse will typically contain the history of all previous interactions with specific users (including product use and transactions), but rarely includes other types of data.
Answer : True.
4. Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?
Answer:
b) Intentional malicious data loss
5. If a patch is required to address a potential loophole in the security of a database, this would be considered a potential security.
Answer:
a) Threat
6. A record can contain only character data—letters, numbers, or special symbols.
Answer : False
7. What is a DBMS wizard?
Answer:
c) A software application that allows a user to create, modify, and maintain a database
8. Just before a major layoff, a nervous employee uses his legitimate access to the company's database and begins downloading information related to the company that he might be able to use when applying for a new job—proposed projects, sales information, contact lists, and so on. Which threat best describes this database breach?
Answer:
c) Unauthorized access by insiders
9. A large travel agency has a customer service group that monitors its Facebook page on a 24/7 basis and responds immediately to posts about operational problems. Which of the following best describes the component of CRM in play here?
Answer:
a) Mining the social media inputs
10. You receive an offer for a credit card that can be use to accrue points that apply to purchase of airline tickets. This comes from a bank that you currently do not use for any banking services. This is a form of CRM that is most typically used for __________.
Answer:
b) promoting loyalty to the company
11. Which of the following would be an example of a loss of availability to records within a database?
Answer:
d) You do a lot of banking online. Today, when you attempted to log in to your account, your valid ID and password are denied, and you cannot get access to your accounts.
12. You make an airline reservation using the airline’s website. While at the site, you are encouraged to “Follow us on...” Facebook, YouTube, or Twitter. You visit the airline’s Facebook page and read notices and comments. What is this an example of?
Answer:
d) Increasing brand awareness through groups or fans
13. A database breach always involves PII.
Answer: False
14. In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.
Answer: False
15. What is one advantage of using a relational database over a spreadsheet or flat file to store data?
Answer:
d) It reduces data redundancy.
16. It is just too challenging to have different passwords for every device you use and every online site that requires an ID and password. It would be OK to use a very strong base word or phrase and change the same 2 or 3 characters in that word/phrase for each site.
Answer: False
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.