Info Management HW 2 Review
The traditional components included in most ERP systems and primarily focus on internal operations.
Core ERP Component
Handles production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting, and quality control.
Production and Materials Management ERP
Asks users to write lines of code to answer questions against a database.
Structured Query Language (SQL)
A legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU) a. General Data Protection Regulation (GDPR) b. Fair Information Practices c. Data Scraping d. Information Privacy Policy
a. General Data Protection Regulation (GDPR)
Types of hackers: Works at the request of system owners to find system vulnerabilities and plug the holes. a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist
a. White-Hat Hacker
Types of hackers: Has philosophical and political reasons when breaking into systems and will often deface the website as a protest a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist
f. Hactivist
Manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management.
Accounting and Finance ERP Component
The smallest or basic unit of information.
Data Element
Logical data structures that detail the relationships among data elements using graphics or pictures.
Data Model
Creates, reads, updates, and deletes data in a database while controlling access and security.
Database Management System (DBMS)
Stores information about a person, place, thing, transaction, or event.
Entity
The extra components that meet organizational needs not covered by the core components and primarily focus on external operations.
Extended ERP Component
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
Foreign Key
Field (or group of fields) that uniquely identifies a given record in a table.
Primary Key
Types of hackers: Breaks into other people's computers and may just look around or may steal and destroy information. a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist
b. Black-Hat Hacker
A general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy a. General Data Protection Regulation (GDPR) b. Fair Information Practices c. Data Scraping d. Information Privacy Policy
b. Fair Information Practices
What is the primary problem associated with the enormous volume of organizational data? a. The primary problem is that the organization becomes data poor but information rich. b. The primary problem is that the organization becomes data rich but information poor. c. The primary problem is that departments become information rich and the overall organization becomes data poor. d. The primary problem is that the departments become data poor and the overall organization becomes information rich.
b. The primary problem is that the organization becomes data rich but information poor.
Which of the following is a method or system of government for information management or control? a. information management b. information governance c. information compliance d. All of the above
b. information governance
What supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers? a. Personalization b. Operational CRM c. Analytical CRM d. All of the above
c. Analytical CRM
Types of hackers: Seeks to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction. a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist
c. Cyberterrorist
A process of extracting large amounts of data from a website and saving it to a spreadsheet or computer a. General Data Protection Regulation (GDPR) b. Fair Information Practices c. Data Scraping d. Information Privacy Policy
c. Data Scraping
Contains general principles regarding information privacy a. General Data Protection Regulation (GDPR) b. Fair Information Practices c. Data Scraping d. Information Privacy Policy
d. Information Privacy Policy
Types of hackers: Finds hacking codes on the internet and click-and-point their way into system to cause damage or spread viruses. a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist
d. Script Kiddie
Types of hackers: Has criminal intent when hacking a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist
e. Cracker