Question: Big Data _____.

Answer Options:

relies on the use of structured data
captures data in whatever format it naturally exists
relies on the use of unstructured data
imposes a structure on data when it is captured

Answer: captures data in whatever format it naturally exists

 

Question: An _____ might be written by a programmer or it might be created through a DBMS utility program.

Answer Options:

query
operating system
database management system
application

Answer: application

 

Question: _____ exist when different versions of the same data appear in different places.

Answer Options:

Data inconsistency
Poor data security
Structural dependence
Conceptual dependence

Answer: Data inconsistency

 

Question: A desktop database is a _____ database.

Answer Options:

single-user
multiuser
workgroup
distributed

Answer: single-user

 

Question: _____ data exist in the format in which they were collected.

Answer Options:

Structured
Semistructured
Unstructured
Historical

Answer: Unstructured

 

Question: Most data that can be encountered are best classified as _____.

Answer Options:

structured
semistructured
unstructured
historical

Answer: semistructured

 

Question: Which of the following refers to the situation where different versions of the same data are stored at different places because they weren’t updated consistently?

Answer Options:

Structural dependence
Data inconsistency
Conceptual dependence
Poor data security

Answer: Data inconsistency

 

Question: In an attempt to limit their liability in the event of nonperformance, software suppliers frequently write which of the following?

Answer Options:

sureties
warranties
manuals
warnings

Answer: warranties

 

Question: What exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?

Answer Options:

A worm
A botnet
Logic bombing
Spam

Answer: Spam

 

Question: Under the Right to Financial Privacy Act, a financial institution can release a customer’s financial records without the customer’s authorization as long as it is a government authority that is seeking the records.

Answer Options:

True
False

Answer: False

 

Question: Under the USA PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that the information is needed for an ongoing investigation.

Answer Options:

False
True

Answer: True

 

Question: Which of the following terms is used to describe an effort to attract public attention to a negligent, illegal, unethical, abusive, or dangerous act by an individual or organization?

Answer Options:

offshore outsourcing
whistle-blowing
green computing
private contracting

Answer: whistle-blowing

 

Question: In the context of Big Data, _____ refers to the trustworthiness of a set of data.

Answer Options:

value
variability
veracity
visibility

Answer: veracity

 

Question: By default, Hadoop uses a replication factor of _____.

Answer Options:

one
two
three
four

Answer: three

 

Question: Which of the following is NOT a key assumption of the Hadoop Distributed File System?

Answer Options:

High volume
Write many, read-once
Streaming access
File metadata

Answer: File metadata

 

Question: When using a HDFS, a heartbeat is sent every _____ to notify the name node that the data node is still available.

Answer Options:

3 hours
3 seconds
6 hours
6 seconds

Answer: 3 seconds

 

Question: Two of the most popular applications to simplify the process of creating MapReduce jobs are Hive and _____.

Answer Options:

Flume
Pig
Sqoop
Impala

Answer: Pig

 

Question: Data collected or aggregated around a central topic or entity is said to be _____ aware.

Answer Options:

project systems
deliverables
objects
entity

Answer: entity