ISM Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is a common Internet monitoring technology? A. key logger B. hardware key logger C. cookie D. All of the answer choices are correct.

All of the answer choices are correct.

Which of the following questions is an example of how managers can use business intelligence (BI) to answer tough business questions? A. where has the business been? B. where is the business now? C. where is the business going? D. All of the answer choices are correct.

All of the answer choices are correct.

What must you do with antivirus software to make it protect effectively? A. never upgrade or change vendors B. download a portable button for it to activate C. frequently update it to protect against viruses D. All of the answer choices are correct.

frequently update it to protect against viruses

Which of the following is a problem associated with dirty data? A. formatted data B. misleading data C. correct data D. All of the answer choices are correct.

misleading data

What is a data cube? A. multidimensional data B. storage repository C. column in a spreadsheet D. dirty data

multidimensional data

Which of the following would not be considered for the accurate characteristic of high-quality data? A. Is the name spelled correctly? B. Is the email address invalid? C. Do the name and phone values have the exact same data? D. Is aggregate data in agreement with detailed data?

Is aggregate data in agreement with detailed data?

Which of the following clauses is typically contained in an acceptable use policy? A. nonrepudiation clause B. digital trust clause C. confidentiality clause D. employee use clause

nonrepudiation clause

What is the logical view of data? A. deals with the physical storage of data on a storage device such as a hard disk B. deals with the logical storage of data on a storage device such as a hard disk C. focuses on how users logically access data to meet their particular business needs D. focuses on how users physically access data to meet their particular business needs

focuses on how users logically access data to meet their particular business needs

In the relational database model, what is a person, place, thing, transaction, or event about which data is stored? A. entity B. relationships C. attribute D. foreign key

entity

What is data-driven decision management? A. a business that can answer questions using the why approach B. original format until the business needs it C. a technique for establishing a match, or balance, between the source data and the target data warehouse D. an approach to business governance that values decisions that can be backed up with verifiable data

an approach to business governance that values decisions that can be backed up with verifiable data

What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems? A. data inconsistency B. data integrity issues C. data governance D. master data management

master data management

Which of the following is correct in reference to a database? A. A database can support only one logical view. B. A database can support many physical views. C. A database can support many logical views. D. A database can support up to three logical views.

A database can support many logical views

One of the primary goals of a database is to eliminate data redundancy by recording each piece of data in only one place in the database. What does the elimination of data redundancy do for a database? A. reduces disk space requirements B. makes updating data easier C. improves data quality D. All of the answer choices are correct.

All of the answer choices are correct.

What are the three advantages of using blockchain technology? A. immutability B. digital trust C. Internet of Things integration D. All of the answer choices are correct.

All of the answer choices are correct.

What are the three primary components in a blockchain? A. hash B. data C. previous hash D. All of the answer choices are correct.

All of the answer choices are correct.

What is data redundancy? A. duplication of data B. storing the same data in multiple places C. storing duplicate data in multiple places D. All of the answer choices are correct.

All of the answer choices are correct.

What is the most secure type of authentication? A. something the user knows such as a user ID and password B. something the user has such as a smart card or token C. something that is part of the user such as a fingerprint or voice signature D. All of the answer choices are correct.

All of the answer choices are correct.

Which of the below would you find in a typical Internet use policy? A. user ramifications if the policy is violated B. user responsibility for properly handling offensive material C. user responsibility for protecting the company's good name D. All of the answer choices are correct.

All of the answer choices are correct.

Which of the following should a company email privacy policy do? A. define legitimate email users and explain what happens to accounts after a person leaves the organization B. discourage sending junk email or spam to anyone who doesn't want to receive it C. inform users that the organization has no control over email once it has been transmitted outside the organization D. All of the answer choices are correct.

All of the answer choices are correct.

What is the primary difference between an entity and an attribute? A. An attribute is a table, an entity is a column from the attribute table. B. An entity is specific, where as an attribute is not data at all but brainstorming ideas that take place before the entity is created. C. An attribute refers to applications, and an entity refers to executives. D. An entity is a table that stores data about people, places, or events, where as an attribute is a column or specific field of the data elements associated with an entity.

An entity is a table that stores data about people, places, or events, where as an attribute is a column or specific field of the data elements associated with an entity.

What are the primary differences between a data warehouse and a data mart? A. Data warehouses make quick decisions; data marts make slow decisions. B. Data warehouses tackle ethical issues; data marts tackle hypothetical issues. C. Data warehouses have a more organization-wide focus; data marts have a functional focus. D. Data warehouses have a physical focus; data marts have a logical focus.

Data warehouses have a more organization-wide focus; data marts have a functional focus.

Which of the following would not be considered for the consistent characteristic of high-quality data? A. Do all sales columns equal the total for the revenue column? B. Is the two-digit state code missing in the data? C. Is all summary data in agreement with detailed data? D. Does the order number match the item and the color options available?

Is the two-digit state code missing in the data?

What is one of the biggest pitfalls associated with real-time data? A. It is only available to high-level executives due to the expense. B. It is only available in aggregate levels. C. It continually changes. D. It rarely changes.

It continually changes.

What is the role of a foreign key? A. It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables. B. It is a unique way to identify each record. C. It is a field that uniquely identifies a given record in a table. D. It supports a secondary key.

It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

Which of the following is incorrect in terms of data warehousing and business intelligence? A. They do not include data from other operational systems. B. Operational systems are always integrated. C. Operational data is mainly current. D. Operational data frequently has quality issues.

Operational systems are always integrated.

What is competitive click-fraud? A. the electronic defacing of an existing website B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser C. a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link D. an act or object that poses a danger to assets

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link

What is a primary key? A. a field (or group of fields) that uniquely identifies a given entity in a table B. a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables C. a characteristic or property of an entity D. a field (or group of fields) that uniquely identifies a given attribute in a table

a field (or group of fields) that uniquely identifies a given entity in a table

What is ransomware? A. a form of malicious software that infects your computer and asks for money B. a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys C. software that allows Internet advertisers to display advertisements without the consent of the computer user D. a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

a form of malicious software that infects your computer and asks for money

What is the Child Online Protection Act? A. the unauthorized use, duplication, distribution, or sale of copyrighted software B. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. a law passed to protect minors from accessing inappropriate material on the Internet D. the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals

a law passed to protect minors from accessing inappropriate material on the Internet

What is spear phishing? A. reroutes requests for legitimate websites to false websites B. a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses C. a masquerading attack that combines spam with spoofing D. a phishing expedition in which the emails are carefully designed to target a particular person or organization

a phishing expedition in which the emails are carefully designed to target a particular person or organization

What is a data map? A. a business that can answer questions using the why approach B. a storage repository that holds a vast amount of raw data in its original format until the business needs it C. a technique for establishing a match, or balance, between the source data and the target data warehouse D. an approach to business governance that values decisions that can be backed up with verifiable data

a technique for establishing a match, or balance, between the source data and the target data warehouse

What is proof-of-stake? A. a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain B. a way to validate transactions and achieve a distributed consensus C. a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems; it which operates independently of a central bank D. All of the answer choices are correct.

a way to validate transactions and achieve a distributed consensus

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet? A. acceptable use policy B. social media policy C. information privacy policy D. email privacy policy

acceptable use policy

What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user? A. spyware B. hacker C. drive-by hacking D. adware

adware

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and Social Security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches? A. a social engineer B. an insider C. a spammer D. a dumpster diver

an insider

What encompasses all organizational data and its primary purpose is to support the performing of managerial analysis tasks? A. transactional data B. analytical data C. timeliness D. quality

analytical data

What area of information security focuses on preventing identity theft, phishing, and pharming scams? A. prevention and resistance B. detection and authorizing C. detection and response D. authentication and authorization

authentication and authorization

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information? A. script kiddies B. black-hat hacker C. white-hat hacker D. cracker

black-hat hacker

Which of the following occurs during data cleansing? A. cleaning data marts B. cleaning redundant customer data C. cleaning accurate data D. cleaning correct data

cleaning redundant customer data

Employees need to understand that corporate email is solely owned by the A. individual user. B. company. C. human resources department. D. individual user's department.

company

What can compare two or more datasets to identify patterns and trends? A. comparative analysis B. competitive monitoring C. data-driven decision D. management competitive analysis

comparative analysis

What can compare two or more datasets to identify patterns and trends? A. comparative analysis B. competitive monitoring C. data-driven decision management D. competitive analysis

comparative analysis

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link? A. cyberbulling B. cybervandalism C. click-fraud D. competitive click-fraud

competitive click-fraud

Which of the following are examples of external databases in the data warehouse model? A. marketing, sales, inventory, and billing B. accounting data mart C. competitor and industry data, mailing lists, and stock market analyses D. marketing data, sales data, and stock market analyses

competitor and industry data, mailing lists, and stock market analyses

Which of the following is an example of data found in an external database in the data warehouse model? A. marketing data B. sales data C. competitor data D. accounting data

competitor data

Which of the following implies that aggregate or summary data is in agreement with detailed data? A. uniqueness B. completeness C. consistency D. integrity

consistency

Which of the following does not represent a company or group that requires up-to-the-second data? A. 911 responders B. stock traders C. banks D. construction companies

construction companies

What is another name for raw data that has undergone processing? A. raw data B. cooked data C. data map D. source data

cooked data

Which of the following is not a primary trait of the value of data? A. governance B. type C. timeliness D. cost

cost

What compiles all of the metadata about the data elements in the data model? A. data entity B. data element C. data attribute D. data dictionary

data dictionary

Which of the following refers to the extent of detail within the data? A. knowledge data B. data granularity C. data intelligence D. data analytics

data granularity

Which of the following occurs when the same data element has different values? A. data modeling issue B. data gap analysis issue C. data governance issue D. data inconsistency issue

data inconsistency issue

What occurs when a system produces incorrect, inconsistent, or duplicate data? A. data inconsistency B. data integrity issues C. data governance D. master data management

data integrity issues

What is an individual item on a graph or a chart? A. dataset B. dirty data C. data map D. data point

data point

What determines the accuracy and completeness of organizational data? A. data quantity audit B. data quality audit C. data intelligence audit D. data cost audit

data quality audit

What is another term for data cleansing? A. data point B. data scrubbing C. data scrapping D. data aggregation

data scrubbing

Which of the following creates, reads, updates, and deletes data in a database while controlling access and security? A. database element B. database management system C. data governance D. data file

database management system

What decodes information? A. digital certificate B. encryption C. decryption D. cryptography

decryption

Which of the following represents the different data granularities? A. detail, summary, aggregate B. document, presentation, spreadsheet, database C. individual, department, enterprise D. executives, managers, operational employees

detail, summary, aggregate

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution? A. digital rights management B. counterfeit software C. privacy D. pirated software

digital rights management

What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals? A. digital trust B. Child Online Protection Act. C. Rule 41 D. digital child

digital trust

Which of the following is a problem associated with dirty data? A. duplicate data B. correct data C. accurate data D. All of the answer choices are correct.

duplicate data

Which of the following are examples of analytical data? A. airline tickets, sales receipts, packing slips B. hotel reservations, sales receipts, packing slips C. future growth analysis, sales projections, product statistics D. packing slips, grocery receipts, competitor data

future growth analysis, sales projections, product statistics

In a block in a blockchain, what represents a block's unique identifier like a fingerprint? A. data B. hash C. previous hash C. proof-of-stake

hash

What is source data? A. identifies the primary location where data is collected B. a storage repository that holds a vast amount of raw data in its original format until the business needs it C. a technique for establishing a match, or balance, between the source data and the target data warehouse D. an approach to business governance that values decisions that can be backed up with verifiable data

identifies the primary location where data is collected

What is the forging of someone's identity for the purpose of fraud? A. identity crisis B. identity theft C. ediscovery D. All of the answer choices are correct.

identity theft

What simply means unchangeable? A. distributed computing B. ledger C. blockchain D. immutable

immutable

Which of the following is not an advantage of database-stored data? A. increased flexibility B. increased performance C. increased data redundancy D. increased data integrity

increased data redundancy

Which of the following governs the ethical and moral issues arising from the development and use of information technologies and the creation, collection, duplication, distribution, and processing of information? A. ethical information B. information technology C. information policies D. information ethics

information ethics

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity? A. information management B. information compliance C. information secrecy D. information ethics

information secrecy

What program, when installed on a computer, records every keystroke and mouse click? A. key logger B. spyware C. cookie D. adware

key logger

What records classified and summarized transactional data? A. distributed computing B. ledger C. blockchain D. immutable

ledger

What is data inconsistency? A. occurs when the same data element has different values B. occurs when a system produces correct and consistent data C. refers to the overall management of the availability and usability of company data D. the practice of gathering data and ensuring that it is uniform, accurate, and consistent

occurs when the same data element has different values

A company should be able to calculate the cost of downtime by which of the following? A. per hour, per day, and per week B. per employee, per computer, and per company C. per stock, per stockholder, and per investment capital D. None of the answer choices are correct.

per hour, per day, and per week

In a block in a blockchain, what represents the hash of the previous block? A. data B. hash C. previous hash D. proof-of-stake

previous hash

What is distributed computing? A. processes and manages algorithms across many machines in a computing environment B. records classified and summarized transactional data C. a type of distributed ledger, consisting of blocks of data D. simply means unchangeable

processes and manages algorithms across many machines in a computing environment

What is a way to validate transactions and achieve a distributed consensus? A. distributed computing B. proof-of-work C. blockchain D. proof-of-stake

proof-of-stake

What is the primary tool that retrieves data and helps users graphically design the answer to a question? A. data visualization tool B. structured tool C. query-by-example tool D. relational fact tool

query-by-example tool

Which of the following provides real-time data in response to requests? A. sales system B. transactional system C. real-time system D. salary system

real-time system

What is a ledger? A. processes and manages algorithms across many machines in a computing environment B. records classified and summarized transactional data C. a type of distributed ledger, consisting of blocks of data D. simply means unchangeable

records classified and summarized transactional data

What are rules that enforce basic and fundamental information-based constraints? A. data integrity B. integrity constraint C. business-critical integrity constraint D. relational integrity constraint

relational integrity constraint

What is a central location in which data is stored and managed? A. repository B. data warehouse C. data warehouse D. data element

repository

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand? A. social media monitoring B. social media manager C. social media policy D. information privacy manager

social media manager

What is the use of a false identity to artificially stimulate demand for a product, brand, or service? A. personally identifiable information (PII) B. nonsensitive PII C. sensitive PII D. sock puppet marketing

sock puppet marketing

What includes invoices, spreadsheets, time sheets, and transactions? A. data aggregation B. competitive monitoring C. data map D. source data

source data

What is unsolicited email that plagues employees at all levels and clogs email systems? A. spyware B. spam C. adware D. GDPR

spam

Which of the following is not a dirty data problem? A. duplicate data B. inaccurate data C. specific data D. nonintegrated data

specific data

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission? A. sniffer B. spyware C. spoofware D. splog

spyware

Gender can be referred to in many ways (male, female, M/F, 1/0) in a data warehouse. Ensuring gender is referenced the same way is an example of A. data scaling. B. streamlining data points. C. standardizing data D. standardizing protocols.

standardizing data

Which of the following asks users to write lines of code to answer questions against a database? A. structured query language B. relational query language C. structured elements D. data mining tools

structured query language

What is ediscovery? A. the unauthorized use, duplication, distribution, or sale of copyrighted software B. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. a law passed to protect minors from accessing inappropriate material on the Internet D. the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals

the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

Which of the following represents the definition of information compliance? A. the act of conforming, acquiescing, or yielding information B. the ability to comply with software C. the understanding of technology D. the verbalization of information governance in a company's policies and procedures

the act of conforming, acquiescing, or yielding information

Which of the following describes confidentiality? A. the assurance that messages and information are available only to those who are authorized to view them B. policies and procedures that address the ethical use of computers and the Internet in the business environment C. the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent D. the principles and standards that guide our behavior toward other people

the assurance that messages and information are available only to those who are authorized to view them

What is data validation? A. the time it takes for data to be stored or retrieved B. the management and oversight of an organization's data assets C. the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data D. when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps

the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data

What is data latency? A. the time it takes for data to be stored or retrieved B. the management and oversight of an organization's data assets C. the person responsible for ensuring policies and procedures are implemented across the organization D. when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps

the time it takes for data to be stored or retrieved

Why do relational databases use primary keys and foreign keys? A. to create an entity B. to create physical relationships C. to create logical relationships D. to create an attribute

to create logical relationships

What is it called when each transaction, entity, and event is represented only once in the data? A. uniqueness B. accuracy C. consistency D. timeliness

uniqueness

What is data gap analysis? A. the time it takes for data to be stored or retrieved B. the management and oversight of an organization's data assets C. the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data D. when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps

when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps


Set pelajaran terkait

Chapter 14: Preparing a Family for Childbirth and Parenting

View Set

Ch. 3 Preparing the Speech: A Process Outline

View Set

Pro - and anti social behaviour of the individual

View Set

Finance--Ch. 3 -- Time Value of Money

View Set

Yoost Chapter 21: Ethnicity and Culture Review Questions

View Set

Chapter 13: The Spinal Cord and Nerves

View Set