Determine impacts on revenue resulting

Assignment Help Database Management System
Reference no: EM13837046

1) If you need to determine impacts on revenue resulting from an increase or decrease in prices and/or sales, the best option to use is a:

A. Database

B. Spreadsheet

2) True or false? The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.

A. True

B. False

3) True or false? A data warehouse will typically contain the history of all previous interactions with specific users (including product use and transactions), but rarely includes other types of data.

A.True

B. False

4) An e-mail message to all the members of your department asks each person to reply to the sender with data on his or her recent sales figures. This is data that is normally not shared with others in the department. You accidentally hit the Reply All button instead of replying to just the sender. Which of the following best describes the data issue at play in this situation?

Accidental data loss
Intentional data loss
Accidental data leak
Intentional data leakage

5) Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential --threatvulnerability to the confidentiality of the data in the files.

A. Threat

B. Vulnerability

6) True or false? Tables are composed of fields, and fields are composed of records.

A. True

B. False

7) What are procedures that help keep a database current?

Database query procedures
Report generation procedures
File maintenance procedures
Data entry procedures

8) You have voluntarily resigned from your company where you were the database administrator. But you find that you still have access to the databases six months after leaving the company. Which threat best describes this database breach?

Unprotected personal hardware collection
Exploiting weaknesses in an operating system or network
Weak authentication
Accidental breach resulting from incorrect (but not malicious) usage

9) A large travel agency has a customer service group that monitors its Facebook page on a 24/7 basis and responds immediately to posts about operational problems. Which of the following best describes the component of CRM in play here?

Mining the social media inputs
Keeping valuable staff
Cleaning up the data
Privacy

10) You want to change your cell phone plan and call the company to discuss options. This is a typical example of CRM that focuses on

A. loyalty programs for current customers
B.Customers service and support
C.profitabilty for the company
D. Acquisition of new customers

11) Which of the following would be an example of a loss of record integrity within a database?

You are denied a new credit card because the credit card company checked your credit score and found that it did not meet its minimum standards for new accounts. Your credit report does not show any invalid records.
A faculty member posts the full names and final grades on the main page of the class's website.
Your bank statement is not reflecting a refund that you know was deposited in your account last week (your account balance does reflect the refund).
Your online banking site tells you your password has expired and requests that you submit a new one to access your accounts.

12) When you sign on to your favorite social media website, a number of sponsored ads appear on your home page. Which category of social media advertising does this represent?

Sending ads to a person's network of friends
Direct advertising
Using the company's own social networking site
Viral marketing
Increasing brand awareness through groups or fans

13) True or false? Not all of the top database breaches in 2013 involved U.S. companies.

True

False

14) True or false? Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.

True

False

15) Which of the following database model choices would be best for storing video clips organized by various vacations you have taken?

Flat-file
Object-oriented
Hierarchical
Network

16) True or false? You do not like the fact that your computer "times out" after 10 minutes of non-use and goes into a hibernation state (blank screen). You set the timeout period to 1 hour and allow it to activate without reentering a password. This would be considered a good practice for safeguarding your personally identifiable information.

True

False

Reference no: EM13837046

Questions Cloud

What is the moral point of view and why is it important : What is the moral point of view and why is it important
Discuss the method of quantitative : What is quantitative easing. Hasn't the Fed already tried quantitative easing. When. What were the results. Discuss the method of quantitative easing used by the Federal Reserve during the most recent U.S. recession, including any criticisms of th..
Organizational behavior case study : Organizational Behavior Case Study
Analyse how the different energy sources supply demand : Identify two geographical regions in the world where energy demand is growing. Analyse how the different energy sources supply demand. Evaluate which region will be able to adequately supply their demand internally versus importing energy sources.
Determine impacts on revenue resulting : If you need to determine impacts on revenue resulting from an increase or decrease in prices and/or sales, the best option to use is a
What industry will the new technology affect : What industry will the new technology affect? (Medical, agricultural, computer, business, etc....). In your opinion, will the new technology be beneficial to society? Why or why not.
What is double-entry bookkeeping. give a brief example : What are the three major business activities in which accountants play a major role. Give an example of each. What is double-entry bookkeeping. Give a brief example.
Project network and activity times : Consider the following project network and activity times (in weeks):
Objectives of total compensation : Explain how an organization's approach to total compensation can help IT be effective or prevent it from being effective and how and why do the objectives of total compensation, vary across organizations - How and why do the objectives of total compe..

Reviews

Write a Review

Database Management System Questions & Answers

  Briefly how to make use of indexes such as b+ tree

Summarize briefly how to make use of indexes such as B+ tree or a hash indexes in selection, projection, and join operations?

  Explain the need for key restructuring

Give at least three reasons why ETL functions are most challenging in a data warehouse environment.

  Design of database systems

Write a trigger that will increment the new field numHours in the Employee table automatically whenever a record is inserted in the Works table - Create a view that shows the eids and managerids in Sales department.

  Protection of network administrator

what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the ..

  Write a prolog program that implements a family database

Write a PROLOG program that implements a family database for your family. Save it as an ordinary text file named family.pro. Your program should implement the following facts for your immediate family, grandparents, and great-grandparents.

  Databases can grow in data structure and data capacity

Databases can grow in data structure and data capacity throughout time. At certain times, it is necessary to perform optimization techniques in order to ensure optimal performance of the database.

  Who knows how to make an erd for database

Who knows how to make an ERD for database

  Whats the difference between a filter and a query

Whats the difference between a filter and a query

  Create an xml file with markup tags

Create an XML file with markup tags and some sample data to represent a list of invoices. Include the XML tags for two invoices in the list. Also, assume the invoices are created from a database whose tables are shown in the following database rela..

  Normalizationpractice on topic of normalization for each of

normalizationpractice on topic of normalization for each of the following questions give the revised table

  Data dictionary serves as important data management tool

The data dictionary serves as an important data management tool by? assigning attributes to the data, maintaining data in updated form.

  Explain why is hashing all database inputs not considered

question 1 what are the similarities between an md5 hash and a fingerprint?question 2 how would you encrypt a web

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd