Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 If you need to determine impacts on revenue resulting from an increase or decrease in prices and/or sales, the best option to use

Question 1

If you need to determine impacts on revenue resulting from an increase or decrease in prices and/or sales, the best option to use is a

Database

Spreadsheet

Question 2

True or false? The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.

A. True

B. False

Question 3

True or false? A data warehouse will typically contain the history of all previous interactions with specific users (including product use and transactions), but rarely includes other types of data.

A. True

B. False

Question 4

An e-mail message to all the members of your department asks each person to reply to the sender with data on his or her recent sales figures. This is data that is normally not shared with others in the department. You accidentally hit the Reply All button instead of replying to just the sender. Which of the following best describes the data issue at play in this situation?

A. Intentional data loss

B. Accidental data loss

C. Accidental data leak

D. Intentional data leakage

Question 5

Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential ____________ to the confidentiality of the data in the files.

Threat

Vulnerability

Question 6

True or false? A record can contain only character dataletters, numbers, or special symbols.

A. True

B. False

Question 7

What is the software called that allows the user to create, access, and manage a database?

A. DLP

B. DBMS

C. OO model

D. Relational model

Question 8

You have voluntarily resigned from your company where you were the database administrator. But you find that you still have access to the databases six months after leaving the company. Which threat best describes this database breach?

A. Exploiting weaknesses in an operating system or network

B. Unprotected personal hardware collection

C. Accidental breach resulting from incorrect (but not malicious) usage

D. Weak authentication

Question 9

You are frustrated to find that the only way to contact the customer service department is to make a phone call. The number listed would result in long distance charges to your phone bill. Which issue should be addressed by the company to keep its CRM in line with your expectations?

A. Mining the social media inputs

B. Cleaning up the data

C. Privacy

D. Customers expect more

Question 10

You receive an offer for a credit card that can be use to accrue points that apply to purchase of airline tickets. This comes from a bank that you currently do not use for any banking services. This is a form of CRM that is most typically used for ___________

acquiring new customers

promoting loyalty to the company

a special service for current customers

retention of customers.

Question 11

Which of the following would be an example of a loss of record integrity within a database?

A. Your bank statement is not reflecting a refund that you know was deposited in your account last week (your account balance does reflect the refund).

B. A faculty member posts the full names and final grades on the main page of the class's website.

C. Your online banking site tells you your password has expired and requests that you submit a new one to access your accounts.

D. You are denied a new credit card because the credit card company checked your credit score and found that it did not meet its minimum standards for new accounts. Your credit report does not show any invalid records.

Question 12

Fill in the blanks by selecting one option from each menu.

Are the following examples of social media viral marketing? Indicate your response by selecting yes or no for each example.

A company with an easily recognized product brand has a Facebook page where fans of the product can Friend or Like the page and post comments.

Yes

No

Each time a user sends a message via Twitter, another message is attached to the end advertising the availability of that tool.

Yes

No

When you sign onto your favorite social networking website, you get messages from friends who have seen a television show they thought was a must see!

Yes

No

When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.

Yes

No

Question 13

True or false? Not all of the top database breaches in 2013 involved U.S. companies.

A. True

B. False

Question 14

True or false? In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

A. True

B. False

Question 15

Which of the following database model choices would be best for storing video clips organized by various vacations you have taken?

A. Flat-file

B. Network

C. Hierarchical

D. Object-oriented

Question 16

True or false? You are traveling and use the free Wi-Fi unsecured internet connection in your hotel room. You successfully connect to your company's database using proper encryption software and passwords and work on some data you need for your next client meeting. You have successfully safeguarded your own PII.

A. True

B. False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DB2 Universal Database V7.1 Application Development Certification Guide

Authors: Steve Sanyal, David Martineau, Kevin Gashyna, Michael Kyprianou

1st Edition

0130913677, 978-0130913678

More Books

Students also viewed these Databases questions

Question

b. What are its goals and objectives?

Answered: 1 week ago

Question

What is Taxonomy ?

Answered: 1 week ago

Question

1. In taxonomy which are the factors to be studied ?

Answered: 1 week ago

Question

1.what is the significance of Taxonomy ?

Answered: 1 week ago

Question

What are the advantages and disadvantages of leasing ?

Answered: 1 week ago