Info Management HW 2 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The traditional components included in most ERP systems and primarily focus on internal operations.

Core ERP Component

Handles production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting, and quality control.

Production and Materials Management ERP

Asks users to write lines of code to answer questions against a database.

Structured Query Language (SQL)

A legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU) a. General Data Protection Regulation (GDPR) b. Fair Information Practices c. Data Scraping d. Information Privacy Policy

a. General Data Protection Regulation (GDPR)

Types of hackers: Works at the request of system owners to find system vulnerabilities and plug the holes. a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist

a. White-Hat Hacker

Types of hackers: Has philosophical and political reasons when breaking into systems and will often deface the website as a protest a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist

f. Hactivist

Manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management.

Accounting and Finance ERP Component

The smallest or basic unit of information.

Data Element

Logical data structures that detail the relationships among data elements using graphics or pictures.

Data Model

Creates, reads, updates, and deletes data in a database while controlling access and security.

Database Management System (DBMS)

Stores information about a person, place, thing, transaction, or event.

Entity

The extra components that meet organizational needs not covered by the core components and primarily focus on external operations.

Extended ERP Component

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

Foreign Key

Field (or group of fields) that uniquely identifies a given record in a table.

Primary Key

Types of hackers: Breaks into other people's computers and may just look around or may steal and destroy information. a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist

b. Black-Hat Hacker

A general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy a. General Data Protection Regulation (GDPR) b. Fair Information Practices c. Data Scraping d. Information Privacy Policy

b. Fair Information Practices

What is the primary problem associated with the enormous volume of organizational data? a. The primary problem is that the organization becomes data poor but information rich. b. The primary problem is that the organization becomes data rich but information poor. c. The primary problem is that departments become information rich and the overall organization becomes data poor. d. The primary problem is that the departments become data poor and the overall organization becomes information rich.

b. The primary problem is that the organization becomes data rich but information poor.

Which of the following is a method or system of government for information management or control? a. information management b. information governance c. information compliance d. All of the above

b. information governance

What supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers? a. Personalization b. Operational CRM c. Analytical CRM d. All of the above

c. Analytical CRM

Types of hackers: Seeks to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction. a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist

c. Cyberterrorist

A process of extracting large amounts of data from a website and saving it to a spreadsheet or computer a. General Data Protection Regulation (GDPR) b. Fair Information Practices c. Data Scraping d. Information Privacy Policy

c. Data Scraping

Contains general principles regarding information privacy a. General Data Protection Regulation (GDPR) b. Fair Information Practices c. Data Scraping d. Information Privacy Policy

d. Information Privacy Policy

Types of hackers: Finds hacking codes on the internet and click-and-point their way into system to cause damage or spread viruses. a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist

d. Script Kiddie

Types of hackers: Has criminal intent when hacking a. White-Hat Hacker b. Black-Hat Hacker c. Cyberterrorist d. Script Kiddie e. Cracker f. Hactivist

e. Cracker


Set pelajaran terkait

CHARLIE Y SOPHIE LLEGAN A BUENOS AIRES

View Set

NUR334 PrepU: Chapter 37 - Disorders of Brain Function

View Set

Patho PrepU Chapter 41 Thyroid and Diabetes

View Set

Chapter 23: Aggregate Demand and Aggregate Supply

View Set

Microbiology Chapter 8: Microbial Metabolism

View Set

Vocabulary Lesson 23: Words, ba 5 approved words [vl1-vl21], Vocabulary 22 - 26

View Set