Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Basics of Databases Module Question 1 Select one answer. 10 points True or false

ID: 669266 • Letter: B

Question

Basics of Databases Module

Question 1

Select one answer.

10 points

True or false? Spreadsheets provide more options for graphical representation of the data than databases.

True

False

Question 2

Select one answer.

10 points

True or false? The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.

True

False

Question 3

Select one answer.

10 points

True or false? Demographic data is the collection of data related to customer age, gender, location, income level, and so on.

True

False

Question 4

Select one answer.

10 points

Paul has been working long hours. He is tired and distracted by family issues, so he has not been doing record updates regularly. There is a sudden power outage in the building and the last 15 records he has been working on have not been saved to the database. Which of the following best describes this data issue?

Accidental data loss

Accidental data leak

Malicious data loss

Malicious data leak

Question 5

Fill in the blanks by selecting one option from each menu.

10 points

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. This could be considered a --threat or vulnerability.

Question 6

Select one answer.

10 points

True or false? Tables are composed of fields, and fields are composed of records.

True

False

Question 7

Select one answer.

10 points

What are procedures that help keep a database current?

Database query procedures

Report generation procedures

File maintenance procedures

Data entry procedures

Question 8

Select one answer.

10 points

A savvy hacker uses a poorly secured vendor's website to obtain all the information needed to access the main database of a large chain store, including the store's database password. Which threat best describes this database breach?

Unprotected personal hardware collection

Accidental breach resulting from incorrect (but not malicious) usage

Weak authentication

Theft of database backup tapes or hard drives

Question 9

Select one answer.

10 points

A large travel agency has a customer service group that monitors its Facebook page on a 24/7 basis and responds immediately to posts about operational problems. Which of the following best describes the component of CRM in play here?

Cleaning up the data

Privacy

Mining the social media inputs

Keeping valuable staff

Question 10

Fill in the blanks by selecting one option from each menu.

10 points

You want to change your cell phone plan and call the company to discuss options. This is a typical example of CRM that focuses on --loyalty programs for current customerscustomer service and supportprofitability for the companyacquisition of new customers.

Question 11

Select one answer.

10 points

Which of the following would be an example of a loss of record integrity in a database?

Although you clicked the option to "Do not share information with any other companies or sites" on the bookstore's website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.

You enter the wrong password three times and find that you are locked out of the site you are trying to access.

Because the word “mortgage” appears in the subject line of an e-mail you sent to your son or daughter, you begin receiving unsolicited e-mail messages from mortgage companies.

You receive a notice from your favorite online shopping site that you have an outstanding balance for items that you did not order.

Question 12

Select one answer.

10 points

You make an airline reservation using the airline’s website. While at the site, you are encouraged to “Follow us on...” Facebook, YouTube, or Twitter. You visit the airline’s Facebook page and read notices and comments. What is this an example of?

Viral marketing

Using the company’s own social networking site

Increasing brand awareness through groups or fans

Direct advertising

Question 13

Select one answer.

10 points

True or false? Hacking accounts for the least number of all reported database breaches in 2013.

True

False

Question 14

Select one answer.

10 points

True or false? In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

True

False

Question 15

Select one answer.

10 points

Which of the following database model choices would be best for storing video clips organized by various vacations you have taken?

Object-oriented

Hierarchical

Network

Flat-file

Question 16

Select one answer.

10 points

True or false? You are traveling and use the free Wi-Fi unsecured internet connection in your hotel room. You successfully connect to your company's database using proper encryption software and passwords and work on some data you need for your next client meeting. You have successfully safeguarded your own PII.

True

False

Explanation / Answer

Question 1

Database is a collection of data which is being organized in such a way that it can be easily accessed, managed and updated. To build and process databases, Database Management Systems are used. The main purpose of the database is to help the people to easily know the details of a particular thing. It helps in easily retrieving the required information from the database using query.

Spreadsheets are used to arrange data in rows and columns. Using spreadsheets, the data can be analyzed in various ways. Charts can be used to analyze the data. There are various types of charts like column, line, bar, pie area etc.

Hence, the statement that says “Spreadsheets provide more options for graphical representation of the data than databases”is true.

Question 2

The primary aim of Customer relationship management (CRM) is to retain the existing or current customers. The goal of CRM is to improve the business relationships with customers.

Hence, the statement that says “The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers ”is true.

Question 3

Demographic data is the data that is related to the age, gender, salary of people in a population.

Hence, the statement that says “Demographic data is the collection of data related to customer age, gender, location, income level, and so on”is true.

Question 4

Accidental data loss refers to the data that is lost unexpectedly like due to power failure .

Accidental data leak refers to unintentional transfer of data to unauthorized or untrusted person/organization.

Malicious data loss refers to the data that is lost due to virus or worms present in the system.

Malicious data leak refers to the intentional transfer of data by hackers or virus that is injected o perform the task.

So considering the given scenario, the loss of data is considered to be accidental data loss as it was caused by sudden power outage.

Hence, the correct option is Accidental data loss.

Question 5

Threat refers to anything that can cause damage to the system.

Vulnerability refers to any loop hole or flaw that is available in the system that can allow an attacker to cause damage.

So considering the given scenario, the appropriate word is vulnerability.

Question 6

A table is a collection of records. A record is a collection of fields that describes a real world entity. A field is a smallest unit of data that can be accessed by a user.

Hence the statement “Tables are composed of fields, and fields are composed of records” is FALSE.

Question 7

File maintenance procedures are the procedures used to keep the database up to date.

Database query procedures are the procedures used to retrieve data from the database.

Report generation procedures are the procedures used to generate reports from the database.

Data entry procedures are the procedures used to enter data into the database.

Hence, the correct option is File maintenance procedures.

Question 8

As the vendor’s website is poorly secured, it allowed the hacker to easily access the information.

Hence, the correct option is Weak authentication.

Question 9

The customer service group takes care of operational problems. This describes the Mining the social media inputs.

Hence, the correct option is Mining the social media inputs.

Question 10

Customer support and service (CSS) provides the necessary support for the customer while purchasing an item or changing plans. Customer support and service is a part of Customer relationship management (CRM).

Hence, the correct option is Customer support and service.

Question 11

Although you clicked the option to "Do not share information with any other companies or sites" on the bookstore's website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.

This relates to loss of record integrity as your information is known to the some of the companies that post ads on that site.

Question 12

Viral marketing is a marketing technique through which the feedback about the company is being shared from one user to another via internet.

When any company site redirects to follow us on any social networking site, then it means that the comapmy is promoting itself Using the company’s own social networking site.

In direct advertising, the company uses any media like phone calls, messages, emails etc to adversite about their company.

Hence, the correct option is Using the company’s own social networking site.

Question 14

Risk assessment refers to the process of evaluating the risks that may occur in any activity. So in terms of database access, risk assessment should address providing correct credentials for accessing the database

Hence the statement is TRUE.

Question 15

In object-oriented database model, information is represented in the form of objects. Object-oriented database model is best for storing data such as video clips.

Hence, the correct option is Object-oriented.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote