Basics of Databases Module

Question 1

10 out of 10Suppose you need to store and manipulate all data related to customers: names, addresses, items purchased, total purchases for the past year, invoices sent and invoices paid, and shipment records. Your best option for handling this kind of data is a.

Question 2

10 out of 10In terms of customer service issues, which of the following is the least likely reason for using a robust CRM?

Question 3

10 out of 10True or false? A data warehouse will typically contain the history of all previous interactions with specific users (including product use and transactions), but rarely includes other types of data.

Question 4

10 out of 10A staff/faculty member uses proprietary (owned and protected by the university) data from the university’s student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?

Question 5

0 out of 10If a patch is required to address a potential loophole in the security of a database, this would be considered a potential security.

Question 6

0 out of 10True or false? A record can contain only character data—letters, numbers, or special symbols.

Question 7

10 out of 10What are procedures that help keep a database current?

Question 8

10 out of 10A savvy hacker uses a poorly secured vendor’s website to obtain all the information needed to access the main database of a large chain store, including the store’s database password. Which threat best describes this database breach?

Question 9

10 out of 10You are frustrated to find that the only way to contact the customer service department is to make a phone call. The number listed would result in long distance charges to your phone bill. Which issue should be addressed by the company to keep its CRM in line with your expectations?

Question 10

10 out of 10You receive an offer for a credit card that can be use to accrue points that apply to purchase of airline tickets. This comes from a bank that you currently do not use for any banking services. This is a form of CRM that is most typically used for.

Question 11

10 out of 10Which of the following would be an example of a loss of availability to records within a database?

Question 12

0 out of 10You make an airline reservation using the airline’s website. While at the site, you are encouraged to “Follow us on…” Facebook, YouTube, or Twitter. You visit the airline’s Facebook page and read notices and comments. What is this an example of?

Question 13

10 out of 10True or false? A database breach always involves PII.

Question 14

10 out of 10True or false? Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.

Question 15

10 out of 10What is one advantage of using a relational database over a spreadsheet or flat file to store data?

Question 16

10 out of 10True or false? It is just too challenging to have different passwords for every device you use and every online site that requires an ID and password. It would be OK to use a very strong base word or phrase and change the same 2 or 3 characters in that word/phrase for each site.

 

Order now