MIS 2201 Final Review Quizzes Solved 100%
Correct |Verified Solutions
When working with charts in Excel, and the selected range of values is taller than it is
wide, Excel assumes that the category values and data are laid out in - Answer columns
When working in charts in Excel, and you wish to change the title, legend and data
labels, what part of the chart needs to be changed? - Answer chart elements
Which of these is NOT a reason why you would use tables in an Excel spreadsheet? -
Answer To use different formulas in different rows in the worksheet
Which of these functions in Excel allows you to display selected rows based on some
criteria and hide other rows? - Answer filters
Which of these functions in Excel allows you to summarize certain statistics about the
data and view different outlines with the summaries - Answer subtotals
Which of these functions in Excel allows you to summarize data from selected fields,
view data from different perspectives and compare one item to another item (slicing
and dicing the data) - Answer pivot table
Which of the following is a valid statement on digital security? - Answer Digital security
is everybody's responsibility
Based on the case studies in the textbook, the costs of a digital security breach to a
business like Target, TJX (TJ Maxx, Marshalls), Home Depot, etc., are not only in the
________ in terms of loss, reissuing of credit cards, payouts to court-imposed
restitution, legal fees and more, but also damage to the firm's reputation and long-term
profitability. - Answer billions of dollars
,__________ attacks via the Internet refer to cyber criminals using "zombie" computers
or botnets to repeatedly hit on a victim's website with a crushing load of seemingly
legitimate requests sent simultaneously by thousands of machines. - Answer Distributed
denial of service (DDoS)
A bank customer receives a message, what appears to be from the bank's website,
asking her to provide her login information. Assuming the message is intended to
defraud the customer, what type of infiltration technique is being used here? - Answer
phishing
Which of the following types of infiltration techniques does one open up to by posting
sensitive personal information and details about one's workplace on social networking
sites? - Answer social engineering
Some of the most common guidelines for designing a secure password include: - Answer
The password should be at least eight characters long and include at least one number,
upper and lower case and other special (non-alphabet) characters
Which of the following statements holds true for the term encryption? - Answer
Scrambling data using a code or formula, known as a cipher, such that it is hidden from
those who do not have the unlocking key
A (An) ________ is a type of virus that propagates itself in memory using the Internet or
other computer networks causing them to crash - Answer worm
Programs like viruses, worms, spyware, keylogger, screen capture are all terms that are
collectively called _________ - Answer malware
, Which of these IS NOT a safeguard to prevent threats to your personal and
organizational digital security - Answer Never backup your data. Backup are prone to
security attacks
Anyone can buy information technology. _______ is the strategic asset that is really
valuable, rare, difficult to duplicate and have few substitutes. - Answer Data
Data is stored in databases that become part of a system that creates, maintains and
manipulates data called the: - Answer DBMS
In a relational database, the columns are also called: - Answer fields
In a relational database, the rows are also called: - Answer records
A primary key used in a database is a ________. - Answer column or group of columns
that identifies a unique row in a table
Which universal language is used for creating, maintaining and managing as well as
retrieving data and information from databases - Answer Standard Query Language
(SQL)
In a database, the relationship between entities and objects you want to track can be
depicted graphically with a(n) _________. - Answer Entity Relationship Diagram (ERD)
When working in Microsoft Access, before a table structure can be modified, the table
needs to be closed and viewed in _____________ - Answer design view
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.