• Question 1

7.25 out of 7.25 points

This typically consists of transactions from the transaction processing system.
Selected Answer:  

Internal data

Answers: System software
External data
Decision model
 

Internal data

  • Question 2

7.25 out of 7.25 points

People that collect and sell personal data are called _______.
Selected Answer:  

information resellers

Answers: direct marketers
fund-raisers
 

information resellers

government agencies
  • Question 3

7.25 out of 7.25 points

An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.
Selected Answer:  

Exception

Answers: Periodic
Demand
Inventory
 

Exception

  • Question 4

7.25 out of 7.25 points

When using wildcards in validation rules, which of the following must surround the criteria of your expression?
Selected Answer:  

” “

Answers: &
( )
 

” “

!
  • Question 5

7.25 out of 7.25 points

This records assets, liabilities, and the equity owned by the owners of an organization.
Selected Answer:  

Balance sheet

Answers:  

Balance sheet

Accounts payable
Income statement
Payroll
  • Question 6

7.25 out of 7.25 points

Regional managers can compare their regular sales reports with that of the other regional managers by using _______.
Selected Answer:  

periodic reports

Answers: management reports
 

periodic reports

exception reports
demand reports
  • Question 7

7.25 out of 7.25 points

A transaction processing system is also referred to as a _______.
Selected Answer:  

data processing system

Answers: sales order processing
 

data processing system

management information system
database management
  • Question 8

7.25 out of 7.25 points

Project resources can be scheduled, planned, and controlled using _______.
Selected Answer:  

project managers

Answers:  

project managers

operational managers
knowledge work systems
CAD/CAM systems
  • Question 9

7.25 out of 7.25 points

Programs used to secretly record an individual’s activities on the Internet are called _______.
Selected Answer:  

spyware

Answers:  

spyware

cookies
sniffer programs
keystroke loggers
  • Question 10

7.25 out of 7.25 points

This law gives you the right to look at your personal records held by government agencies.
Selected Answer:  

Freedom of Information Act

Answers: Gramm-Leach-Bliley Act
 

Freedom of Information Act

Family Educational Rights and Privacy Act
Computer Fraud and Abuse Act
  • Question 11

7.25 out of 7.25 points

Who is responsible for operational matters and monitoring day-to-day events?
Selected Answer:  

Supervisors

Answers:  

Supervisors

Middle management
Stockholders
Top management
  • Question 12

7.25 out of 7.25 points

Which of the following record validation rules requires the user to enter a value into either Field1 or Field2, but not into both fields?
Selected Answer:  

([Field1] is Null) XOR ([Field2] is Null)

Answers:  

([Field1] is Null) XOR ([Field2] is Null)

[Field1] <> [Field2]
(([Field1] > [Field2]) AND [Field2]>10))
none of the above
  • Question 13

7.25 out of 7.25 points

Which of the following characters separates the parts of an input mask?
Selected Answer:  

;

Answers: #
$
 

;

[ ]
  • Question 14

7.25 out of 7.25 points

Free computer games and free screen saver programs are typical carriers of _______.
Selected Answer:  

Trojan horses

Answers: DoS
worms
viruses
 

Trojan horses

  • Question 15

7.25 out of 7.25 points

Which of the following is not a measure to protect computer security?
Selected Answer:  

Keeping the same password on all systems consistently

Answers: Restricting access
Encrypting data
Copying data and storing it at a remote location
 

Keeping the same password on all systems consistently

  • Question 16

7.25 out of 7.25 points

Which of the following data types would you use to display a spreadsheet object in a field?
Selected Answer:  

OLE Object

Answers: Currency
AutoNumber
 

OLE Object

Hyperlink
  • Question 17

7.25 out of 7.25 points

Which of the following is the most widely used wireless network encryption for home wireless networks?
Selected Answer:  

WPA2

Answers: WEP
WPE
WPA
 

WPA2

  • Question 18

7.25 out of 7.25 points

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
Selected Answer:  

Internet scam

Answers: Malicious program
 

Internet scam

Theft
Data manipulation
  • Question 19

7.25 out of 7.25 points

The _______ activity records the customer requests for products or services.
Selected Answer:  

sales order processing

Answers: payroll
 

sales order processing

inventory
accounts receivable
  • Question 20

7.25 out of 7.25 points

To add a new field to a table, on what must you click in the first cell?
Selected Answer:  

Append Row

Answers: Record Selector
form
 

Append Row

datasheet