In: Computer Science
1) Two of the major challenges business users face when using big data are finding the information they need to make decisions and knowing that the data they have is valid.
(TRUE OR FALSE)
2) In microsoft access, Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.
(TRUE OR FALSE)
3) A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider.
(TRUE OR FALSE)
4) A client is any computer on a network that sends messages requesting services from the servers on the network.
(TRUE OR FALSE)
5) JavaScript can be used to validate data entry in a Web form.
(TRUE OR FALSE
1) Two of the major challenges business users face when using big data are finding the information they need to make decisions and knowing that the data they have is valid.
TRUE
(While using big data it is not very clear whether the decision being taken depends on which data and even if the data column is identified, there is no guarantee that there is no missing value. for example, If we take a data set with characteristics of a set of people, we can draw a conclusion that people with small feet have low income. This statement is generally true, but the inference is wrong. Income is not dependent on size of feet, but actually younger people have smaller feet and young people have no or less income. So, though size of feet seems to correlate with income; actual reason is the age.)
2) In microsoft access, Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.
TRUE
(Projection is the operation used to select specific columns from a database table. So this can be used to eliminate some columns and create another database with fewer columns.)
3) A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider.
TRUE
(In case a company needs to connect two of its local networks, it uses a third party network, e.g. an MPLS connection or a leased line and creates a VPN tunnel over it. Encrypted data is transmitted over VPN and the devices accessing VPN must identify themselves. Thus a secure communication is achieved. Though, this is not the only use of VPN.)
4) A client is any computer on a network that sends messages requesting services from the servers on the network.
TRUE
(In client-server architecture, the machine that sends service requests are called client and the machine that responds to such requests is called a server. These are not absolute designation, but interchangeable. One machine can act as a client for some services but can become the server for some other services.)
5) JavaScript can be used to validate data entry in a Web form.
TRUE
(Javascript can be used to validate data entered in a web form. This is generally done to save some network round trips in case of an invalid entry from the user. But this should also be remembered that javascript validation is not enough and all data must be validated at server end as well as any person can bypass javascript validation and submit invalid or malicious data to the server.)