Summary

This document is a collection of multiple-choice questions on privacy and security. The questions cover various topics such as data types (nominal, ordinal, interval), data storage, business activities, and data management.

Full Transcript

## Privacy and Security ### 225. Considering your privacy on the web, the ______ contains web page content and instructions for displaying this content. * a. Temporary internet files * b. Bugs files * c. Anonymity files * d. Plug-in cache ### 226. Considering privacy, some companies get the...

## Privacy and Security ### 225. Considering your privacy on the web, the ______ contains web page content and instructions for displaying this content. * a. Temporary internet files * b. Bugs files * c. Anonymity files * d. Plug-in cache ### 226. Considering privacy, some companies get the agreement from the users to own their data. This is mostly related to which privacy concern? * a. Property * b. Accuracy * c. Technology * d. Access ### 227. When visiting a website for a second time, sometimes you find your username without typing it. This usually happens because this website has stored ______ into your computer's hard disk. * a. Advertisement - Movies * b. Track System * c. Cookies * d. Plug-in ### 228. The most significant concerns for implementation of computer technology involve privacy, security, and ______ * a. Information * b. Ethics * c. Privacy * d. Security ### 229. Which of the following is an Nominal data type? * a. Dresses sizes like XS, S, M, L, XL * b. Bags colors like black, brown, blue * c. Video, audio, images, text * d. Customer satisfaction in a 1-10 scale ### 230. Which of the following is an ordinal data type? * a. Dresses sizes like 8, 10, 12, 14 * b. Shirts colors like red, green, blue * c. Video, audio, images, text * d. Customer satisfaction in a 1-10 scale ### 231. Which of the following is an interval data type? * a. Dresses sizes like XS, S, M, L, XL * b. Shirts colors like red, green, blue * c. Video, audio, images, text * d. Customer satisfaction in a 1-10 scale ### 232. Business activities are recorded on paper or using electronic media. These records become ______ * a. Data * b. Plagiarism * c. Business * d. Disk ### 233. ______ is an all-inclusive term that refers to extremely large, very fast, highly diverse, and complex data that cannot be managed with traditional data management tools. * a. Medium Data * b. Big Data * c. Traditional Data * d. Small Data ### 234. ______ helps decision makers to understand data easily. * a. Data protection * b. Database * c. Data visualizing * d. Data plagiarism ### 235. The second step to be followed to benefit from the data after modelling it in databases is ______ * a. Data visualization * b. Data intelligence * c. Data warehousing * d. Data mining ### 236. A ______ is an organized store of data from all over the organization specially designed to help make management decisions. * a. Data copyright * b. Data warehouse * c. Data protection * d. Data plagiarism ### 237. Search engines like Google have no intelligence at all. * a. True * b. False ### 238. The last step to be followed to benefit from the data in a systematic way is: * a. Data mining * b. Data warehousing * c. Data visualization * d. Data modeling and storage ### 239. ______ helps decision makers to understand data easily. * a. Data visualizing * b. Data protection * c. Database * d. Data plagiarism ### 240. _____ can be done using graphs, dashboards, animations. * a. Data visualizing * b. Data plagiarism * c. Data protection * d. Database ### 241. ______ is the art and science of discovering useful novel patterns from data which help in solving problems and decision making. * a. Data protection * b. Data Mining * c. Data Plagiarism * d. Data Security ### 242. ______ is the act of doing something productive to serve someone's needs. * a. Plagiarism * b. Business * c. Data * d. Intellectual property ### 243. The cycle that starts with business data generation, data mining and ends with intelligence is fed back into business is called ______ * a. Business Plagiarism (BP) cycle * b. Business Creation and Integration (BCI) cycle * c. Business Intelligence and Data Mining (BIDM) cycle * d. Business Intelligence and Intellectual Property (BIIP) cycle ### 244. Which of the following is the correct sequence to be followed to benefit from the data is systematic way? * a. Data warehousing, Data modeling in databases, Data mining, Data visualization * b. Data mining, Data warehousing, Data visualization, Data modeling in databases * c. Data modeling in databases, Data warehousing, Data mining, Data visualization * d. Data visualization, Data warehousing, Data visualization, Data mining ### 245. ______ are programs that sets up, or structures, a database * a. Spreadsheets * b. Database management systems * c. Word processors * d. Presentation graphics ### 246. ______ is an example of open source, free, database Management System * a. MySQL * b. Field * c. Table * d. Oracle ### 247. ______ is an example of commercial database Management System * a. MySQL * b. Oracle * c. Field * d. Table ### 248. Which of the following is a privacy issue: * a. Access * b. Accuracy * c. Property * d. All answers ### 249. The three privacy issues are: * a. Accuracy, Property, Access * b. Hardware, software Data * c. Virus, Worm, Trojan horse * d. Data, information, knowledge ### 250. Considering privacy, ______ relates to the responsibility of those who have data to control and able to use that data. * a. Property * b. Accuracy * c. Technology * d. Access ### 251. Considering your privacy on the web, ______ are small data files that are deposited on your hard disk. * a. Third-party cookies * b. Apps-party cookies * c. First-party cookies * d. Plug-ins cookies ### 252. Considering privacy, ______ relates to the responsibility of those who collect data to ensure that the data is correct. * a. Access * b. Property * c. Accuracy * d. Technology ### 253. Considering privacy, some companies get the agreement from the users to control and use their data. This action is mostly related to which privacy concern? * a. Technology * b. Access * c. Accuracy * d. Property ### 254. According to statistics done in one of insurance companies among 5000 records entered there are 10 errors. This issue is related to which privacy concern * a. Property * b. Access * c. Accuracy * d. Technology ### 255. According the statistics held in one company the error rate in data entry is 10%. This issue is related to which privacy concern? * a. Property * b. Accuracy * c. Access * d. Entry ### 256. Ali is a bank employee whose job is to ensure that the data collected is correct. Ali's job is related to which privacy concern? * a. Property * b. Accuracy * c. Access * d. Technology ### 257. Which of the following is a privacy issue: * a. Access * b. Accuracy * c. Property * d. All answers ### 258. To prevent copyright violations, corporations sometimes use ______ * a. Ethics * b. Software Piracy * c. Databases * d. Digital Rights Management ### 259. Some users choose to make unauthorized copies of digital media. This action violates ______ rules * a. Software Piracy * b. Database * c. Data * d. Copyright ### 260. Material that can be copyrighted include: * a. Films * b. Paintings * c. All answers are correct * d. Books ### 261. The ever-growing volume of data that is gathered about us and stored in large databases is called small data * a. True * b. False ### 262. "Analysis and Insight" is NOT an example of Big Data application * a. True * b. False ### 263.Cyberbullying specifically focuses on protecting information, hardware and software from damage and natural disasters. * a. True * b. False ### 264. Security involves protecting individuals and organizations from theft and danger. * a. True * b. False ### 265. Information resellers collect, analyze, and sell data. * a. True * b. False ### 266. Google search engine is an application of Artificial Intelligence * a. True * b. False ### 267. Robotic surgery is an application of Artificial intelligence * a. True * b. False ### 268. Robotic surgery has no intelligence at all * a. True * b. False ### 269. Computer hackers are the persons who try to gain unauthorized access to our computers or other computers that contain information about us. * a. True * b. False ### 270. Cyber-spam involves protecting individuals and organizations from theft and danger * a. True * b. False ### 271. Many organizations monitor employee email and computer files using special software called employee-monitoring software. * a. True * b. False ### 272. Computer security specifically focuses on protecting information, hardware, and software from unauthorized use, as well as the damage * a. True * b. False ### 273. Automated voice instructions from GPS is an application of Artificial Intelligence * a. True * b. False

Use Quizgecko on...
Browser
Browser