0% found this document useful (0 votes)
162 views

Assessment 2

This document summarizes the results of a 10 question quiz on business and technology topics. It provides the date and time the quiz was started and completed, along with the total time taken of 6 minutes and 35 seconds. It then lists the scores for each of the 10 multiple choice questions, with the correct answer selected for each, resulting in a total score of 10 out of 10 points and a grade of 100%.

Uploaded by

mwende faiyuu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views

Assessment 2

This document summarizes the results of a 10 question quiz on business and technology topics. It provides the date and time the quiz was started and completed, along with the total time taken of 6 minutes and 35 seconds. It then lists the scores for each of the 10 multiple choice questions, with the correct answer selected for each, resulting in a total score of 10 out of 10 points and a grade of 100%.

Uploaded by

mwende faiyuu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Started on Saturday, February 2, 2019, 4:59 PM

State Finished
Completed on Saturday, February 2, 2019, 5:06 PM
Time taken 6 mins 35 secs
Points 10.00/10.00
Grade 40.00 out of 40.00 (100%)
Question 1
Correct
1.00 points out of 1.00

Flag question

Question text

_____________ helps companies tap into the massive volume of customer opinions expressed
online.
Select one:
a. Media metrics
b. Unstructured analytics
c. Text mining
d. Media mining

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

How does a virtual private network (VPN) provide additional security over other types of
networks?
Select one:
a. It requires a username and password for access.
b. It encrypts data packets prior to transmission.
c. Users are required to answer a set of “challenge questions” prior to being given access.
d. Users are required to pass a retinal scan, finger print scan or some other high level security
test before they can access the network.

Question 3
Correct
1.00 points out of 1.00
Flag question

Question text

Which of the following is not a risk associated with cloud-based BI?


Select one:
a. Slower response time
b. Security risk
c. Backup risk
d. Increased costs

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

Enterprises are moving away from ad hoc adoption of mobile devices and network infrastructure
to a more strategic planning build-out of their mobile capabilities. Factors to be considered when
planning the build out include all of the following except ________.
Select one:
a. Demands of multi-tasking mobile devices on the network
b. Impact of mobile technology on organizational culture
c. More robust mobile OSs
d. Mobile applications

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

To insure QoS of a network, an alternative to “prioritizing traffic” is to __________, which means


holding back traffic from non-time sensitive apps so that apps like voice and video run more
effectively.
Select one:
a. Throttle traffic
b. Block traffic
c. Re-direct traffic
d. Filter traffic

Question 6
Correct
1.00 points out of 1.00

Flag question

Question text

Investments in data networks, IP addresses, routers, and switches are ________ because of
their impact on productivity, security, user experiences, and customer service.
Select one:
a. telecommunication basics
b. tactical issues
c. technology decisions
d. business decisions

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

Distributed databases use ___________ architecture to process information requests.


Select one:
a. Client/server
b. NoSQL
c. Private clouds
d. Public clouds

Question 8
Correct
1.00 points out of 1.00
Flag question

Question text

The report Looking Further with Ford—2014 Trends identifies trends in how the technology
explosion will affect consumer choices and behaviors. Which is not one of those trends?
Select one:
a. We are actively harnessing people’s energy and connections to develop the next generation
of critical, thoughtful thinkers.
b. With so much information at our fingertips, downtime has given way to filling every moment
with bite-sized chunks of information, education, and entertainment.
c. Many organizations have adopted corporate social and environmental responsibility initiatives
with a goal of reducing their networks’ carbon footprints.
d. In an increasingly screen-saturated, multitasking modern world, more and more evidence is
emerging to suggest that when we do everything at once, we sacrifice the quality —and often
safety—of each thing we do.

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

Companies have always faced the challenge of managing physical documents. Which of the
following is the most significant challenge associated with managing physical documents?
Select one:
a. The volume of documents that must be reviewed to determine if they should be retained or
destroyed
b. Loading documents onto company websites
c. Sharing documents across geographic locations
d. Translating documents into other languages

Question 10
Correct
1.00 points out of 1.00

Flag question
Question text

What is the key advantage of an active data warehouse compared to a traditional data
warehouse?
Select one:
a. The ADW is less expensive to install and operate
b. Data from an ADW can be used for DSS, report generation and Business Intelligence
c. Data in an ADW is constantly updated, providing more current data than a traditional data
warehouse
d. The ADW is more widely available from a larger number of vendors

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy