1 Data extraction in a database relies on which is a query format providing instructions for building and modifying the structure of a database A SQL B DBMS C Primary Key D Foreign Key A 2 The principle refers to sights sounds and other stimuli that remind us of related products and ideas eg Rebecca Black s Friday A Emotion B Stories C Public D Trigger D 3 Hason s Shoe Repair is a cocktail bar in downtown Orlando The only way to gain entrance is by calling a phone number and following the directions on a scratchy recording Callers receive reservations through a call back that gives a password to enter the bar They made themselves a secret yet highly popular on social media This is an example of principle A Trigger B SOcial currency C Emotion D Practical value B 4 Bytes are made up of A Tables B Fields C Records D Bits D 5 Encryption is the process of encoding messages or information in such a way that only authorized parties can understand it A True B False A 6 A crisis is a change either sudden or evolving that results in an urgent problem that management must address A True B False A 7 is a targeted form of phishing in which fraudulent emails target specific individuals in an effort to gain access to confidential information The attackers usually disguise themselves as a trustworthy friend or entity to trick a target into opening an attachment or click on a malicious link A Pretxing B Baiting C Spear phishing D Tailgating C 8 Computer operation includes four partsL register ALU control unit and data storage is the one that carries out math and logic functions A Register B ALU C COntrol Unit D Data storage A 9 Object oriented database handles multimedia and graphic based data A True B False A 10 As discussed in class tables in a relationship database are linked bu A POublic key and foreign key B Primary Key and foreign key C Primary Key and private key D Public Key and private Key B 11 When facing a large volume of information customers cnanot always process all the information Such a process is called A Cognitive load B Choice overload effect C Selective information processing D Need for cognition C 12 A workstation is a A Server B Network C CPU D Personal computer D 13 is needed for nodes to join a network A Network clients B Network operating system C Network server D Network interface card D 14 As discussed in class ongoing IT expenditures such as maintenance and support expenses should not exceed of market value of your information systems A 1 B 5 C 10 D 15 A 15 There are two types of computer memory is temporary whereas is permanent A RAM ROM B ROM RAM 16 Computer network is defined as a collection of computers and network hardware interconnected by communication channels that allow sharing of resources and information such as printers PMS and databases A True B False A 17 Electronic Data Processing has several advantages WHich of the following is NOT an advantage of EDP A Speed B Accuracy C Redundancy D Control C 18 uses a fake access point that is designed to look like a real hotspot When users log in to the network they unknowingly expose their passwords and other sensitive information to hackers A Social engineering B Sniffing C Sidejacking D Evil twin attack D 19 The most common type of database in the hospitality business is A Hierarchical database B Relational database C Network database D Object oriented database B 20 Application software tools provide the platform for running system software A True B False B 21 Data warehousing is an analysis of data for potential relationships A True B False B 22 Analog signals consist of just two states 0 and 1 A True B False B 23 encryption requires one key and encryption requires a pair of keys A Symmetric Asymmetric B Asymmetric Symmetric A 24 It is easier for a hacker to hack the network than to trick someone into giving them the password A True B False B 25 A MAN metropolitan area network is a group of computers and network devices connected together usually within the same building A True B False B 26 Based on what we discussed in class which of the following passwords is the safest A B C D PaSsWOrd 1c dailysupercarrychain super123 MONKEY B 27 is a glass or plastic fiber that carries light along its length This kind of cable is the fastest and most expensive transmission medium in the world today A Twisted pair cable B Coaxial cable C Fiber optic D Glass optic C 28 What kind of cable layout is this A Bus topology B Star topology C Ring topology D Mesh topology B 29 Inventing stories or scenarios to get people to complete an action which will provide some or all of the necessary details to extract data or breach a network A Baiting B Tailgating C Phishing D Pretexting D 30 Which of the following is NOt one of the guidelines provided by NIST A Turn on multi factor authentication wherever possible B Giving each important account a unique password C Don t rely on passwords alone to protect your system D Change your password regularly 31 DBMS is a type of system software that provides user user and database administration with the ability to access and manipulate data A True B False A 32 Which of the following is NOT a component of computer hardware A Input Output Units B Central processing unit C Operating system D Computer memory C 33 A node on a network can be A A computer B A server C A scanner D All of the above D 34 Bandwidth is the amount of data that can be transmitted in a fixed amount of time It is expressed in A Byte per second B Bits per second C Byte per set D Bits per set B 35 The network database model was the first attempt to organize data in a structure so as to reduce redundancy With the network model a parent can have multiple children and children can only have one parent A True B False B Part 2 Lost the six stages of crisis management and use this framework to perform an analysis of a crisis Please focus on only one of the stages
View Full Document