Question

Q16. Records can be arranged in several ways on a storage medium. The arrangement of records...

Q16. Records can be arranged in several ways on a storage medium. The arrangement of records determines:
   a. how individual records can be accessed.
   b. how long it takes to access records.
   c. how individual records can be accessed and how long it takes to access them.
   d. the storage media used for storage.

Q17. Which is not a benefit of having a unified view of customers?
   a. More accurate customer data to support marketing, sales, support, and service initiatives.
   b. Better responsiveness to ensure that customer service representatives have up-to-date, reliable information on the customers.
   c. Faster transaction processing by organizing the data in one location.
   d. Better revenue management and more responsive business decisions.

Q18. In the healthcare industry, data errors __________.
   a. increase healthcare costs by billions of dollars
   b. have minimized healthcare costs
   c. have no impact on patient care
   d. have been eliminated by the use of data warehousing

Q19. Which is not a characteristic of a data warehouse?
   a. Data are organized by subject, such as customer, vendor, or product.
   b. Data are coded in a consistent manner.
   c. Data are kept for many years to be used for identifying trends, forecasting, and comparisons over time.
   d. Most applications of data warehousing are in real-time.

Q20. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.
   a. electronic records management
   b. database management
   c. archive management
   d. infrastructure management

Q21. What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.
   a. packet-switched IP system
   b. circuit-switched subsystem
   c. WiMAX standard
   d. GSM-based LTE subsystem

Q22. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.
   a. content indexing
   b. usernames and passwords
   c. biometrics
   d. encryption

Q23. __________ is a general term that means fast transmission speed.
   a. Bandwidth
   b. Protocol
   c. TCP/IP
   d. Broadband

Q24. __________ transmits voice and data in packets and has become one of the most cost effective ways to communicate.
   a. TCP
   b. UDP
   c. VoIP
   d. UM

Q25. Which of the following is a dysfunction of the group process?
   a. Social pressures of conformity can lead to groupthink.
   b. A group may produce synergy during problem solving.
   c. Group members may have their egos embedded in the decision, and so they may be committed to the solution.
   d. Groups are better than individuals at understanding problems.

Q26. __________ are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home.
   a. MANs
   b. Hot spots
   c. LANs
   d. WANs

Q27. What is the most cost-effective approach to managing fraud?
   a. prevention
   b. detection
   c. prosecution
   d. compliance

Q28. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
   a. Wireless packet analyzers
   b. Password crackers
   c. Firewall sniffers
   d. Intrusion detectors

Q29. A(n) __________ is the probability of a threat exploiting a vulnerability.
   a. threat
   b. risk
   c. vulnerability
   d. exploit

Q30. Crime can be divided into two categories depending on the tactics used to carry out the crime. What are those two categories?
   a. personal and non-personal
   b. felonies and misdemeanors
   c. insider and outsider
   d. violent and nonviolent

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Q16. Records can be arranged in several ways on a storage medium. The arrangement of records determines:

Answer - option C - how individual records can be accessed and how long it takes to access them.

2 ways of access are there -

- Sequential Access - takes more time , need to traverse from first record till the required record

- Random access - takes less time , less overhead ,can directly access required file directly

Q17. Which is not a benefit of having a unified view of customers?

option-C. Faster transaction processing by organizing the data in one location.

Q18. In the healthcare industry, data errors

option-D have been eliminated by the use of data warehousing

Q19. Which is not a characteristic of a data warehouse?

option B - b. Data are coded in a consistent manner. this is wrong

Add a comment
Know the answer?
Add Answer to:
Q16. Records can be arranged in several ways on a storage medium. The arrangement of records...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 14) The process that screens individual IP packets based solely on the contents of the source...

    14) The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as A) access control list. B) deep packet inspection. C) intrusion filtering. D) packet filtering. 15) The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as A) deep packet inspection. B) stateful packet filtering. C) static...

  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ā€˜Cā€™....

  • 36. What kind of virus runs in place of the computer's normal system files? A. Worms...

    36. What kind of virus runs in place of the computer's normal system files? A. Worms B. Macro viruses C. File-infector viruses D. Boot sector viruses 37. What of the following features does not distinguish an NGFW from traditional firewalls? A. Application Control B. IDS and/or IPS C. User awareness D. UTM (Unified Threat Management) 38. The act of taking advantage of vulnerability is known as which of the following? a. hacker b. poisoning c. snooping d. exploit 39. What...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • Homework. Answered Which is not true of the Transmission Control Protocol (TCP)? Multiple answers: You can...

    Homework. Answered Which is not true of the Transmission Control Protocol (TCP)? Multiple answers: You can select more than one option O A it supports full duplex communication o B it has graceful connection shutdown O с its connections are logical D it uses the message paradigm E it is an end-to-end protocol O F None of the above Answered Change your responses to resubmit Match the NIST Framework Category with the Task Premise Response Drag and drop to match...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is...

    Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is used to measure bandwidth? Question 1 options: a. msec b. bit/sec c. bytes d. number of packets/sec Question 2 (1 point) Saved Ethernet is one of access network technologies. Question 2 options: True False Question 3 (1 point) Saved Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters,...

  • Chapter 18: wireless networks TRUE OR FALSE                                    

    Chapter 18: wireless networks TRUE OR FALSE                                                                                                     T          F          1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance   on optical fiber and coaxial cable. T          F          2. A BWA provider services one or more cells. T          F          3. Wireless systems are more expensive than wired systems. T          F          4. IEEE 802.16 and the associated WiMAX specification now deal with      both fixed and mobile BWA. T          F         ...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT