ISM Exam 2
Which of the following is a common Internet monitoring technology? A. key logger B. hardware key logger C. cookie D. All of the answer choices are correct.
All of the answer choices are correct.
Which of the following questions is an example of how managers can use business intelligence (BI) to answer tough business questions? A. where has the business been? B. where is the business now? C. where is the business going? D. All of the answer choices are correct.
All of the answer choices are correct.
What must you do with antivirus software to make it protect effectively? A. never upgrade or change vendors B. download a portable button for it to activate C. frequently update it to protect against viruses D. All of the answer choices are correct.
frequently update it to protect against viruses
Which of the following is a problem associated with dirty data? A. formatted data B. misleading data C. correct data D. All of the answer choices are correct.
misleading data
What is a data cube? A. multidimensional data B. storage repository C. column in a spreadsheet D. dirty data
multidimensional data
Which of the following would not be considered for the accurate characteristic of high-quality data? A. Is the name spelled correctly? B. Is the email address invalid? C. Do the name and phone values have the exact same data? D. Is aggregate data in agreement with detailed data?
Is aggregate data in agreement with detailed data?
Which of the following clauses is typically contained in an acceptable use policy? A. nonrepudiation clause B. digital trust clause C. confidentiality clause D. employee use clause
nonrepudiation clause
What is the logical view of data? A. deals with the physical storage of data on a storage device such as a hard disk B. deals with the logical storage of data on a storage device such as a hard disk C. focuses on how users logically access data to meet their particular business needs D. focuses on how users physically access data to meet their particular business needs
focuses on how users logically access data to meet their particular business needs
In the relational database model, what is a person, place, thing, transaction, or event about which data is stored? A. entity B. relationships C. attribute D. foreign key
entity
What is data-driven decision management? A. a business that can answer questions using the why approach B. original format until the business needs it C. a technique for establishing a match, or balance, between the source data and the target data warehouse D. an approach to business governance that values decisions that can be backed up with verifiable data
an approach to business governance that values decisions that can be backed up with verifiable data
What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems? A. data inconsistency B. data integrity issues C. data governance D. master data management
master data management
Which of the following is correct in reference to a database? A. A database can support only one logical view. B. A database can support many physical views. C. A database can support many logical views. D. A database can support up to three logical views.
A database can support many logical views
One of the primary goals of a database is to eliminate data redundancy by recording each piece of data in only one place in the database. What does the elimination of data redundancy do for a database? A. reduces disk space requirements B. makes updating data easier C. improves data quality D. All of the answer choices are correct.
All of the answer choices are correct.
What are the three advantages of using blockchain technology? A. immutability B. digital trust C. Internet of Things integration D. All of the answer choices are correct.
All of the answer choices are correct.
What are the three primary components in a blockchain? A. hash B. data C. previous hash D. All of the answer choices are correct.
All of the answer choices are correct.
What is data redundancy? A. duplication of data B. storing the same data in multiple places C. storing duplicate data in multiple places D. All of the answer choices are correct.
All of the answer choices are correct.
What is the most secure type of authentication? A. something the user knows such as a user ID and password B. something the user has such as a smart card or token C. something that is part of the user such as a fingerprint or voice signature D. All of the answer choices are correct.
All of the answer choices are correct.
Which of the below would you find in a typical Internet use policy? A. user ramifications if the policy is violated B. user responsibility for properly handling offensive material C. user responsibility for protecting the company's good name D. All of the answer choices are correct.
All of the answer choices are correct.
Which of the following should a company email privacy policy do? A. define legitimate email users and explain what happens to accounts after a person leaves the organization B. discourage sending junk email or spam to anyone who doesn't want to receive it C. inform users that the organization has no control over email once it has been transmitted outside the organization D. All of the answer choices are correct.
All of the answer choices are correct.
What is the primary difference between an entity and an attribute? A. An attribute is a table, an entity is a column from the attribute table. B. An entity is specific, where as an attribute is not data at all but brainstorming ideas that take place before the entity is created. C. An attribute refers to applications, and an entity refers to executives. D. An entity is a table that stores data about people, places, or events, where as an attribute is a column or specific field of the data elements associated with an entity.
An entity is a table that stores data about people, places, or events, where as an attribute is a column or specific field of the data elements associated with an entity.
What are the primary differences between a data warehouse and a data mart? A. Data warehouses make quick decisions; data marts make slow decisions. B. Data warehouses tackle ethical issues; data marts tackle hypothetical issues. C. Data warehouses have a more organization-wide focus; data marts have a functional focus. D. Data warehouses have a physical focus; data marts have a logical focus.
Data warehouses have a more organization-wide focus; data marts have a functional focus.
Which of the following would not be considered for the consistent characteristic of high-quality data? A. Do all sales columns equal the total for the revenue column? B. Is the two-digit state code missing in the data? C. Is all summary data in agreement with detailed data? D. Does the order number match the item and the color options available?
Is the two-digit state code missing in the data?
What is one of the biggest pitfalls associated with real-time data? A. It is only available to high-level executives due to the expense. B. It is only available in aggregate levels. C. It continually changes. D. It rarely changes.
It continually changes.
What is the role of a foreign key? A. It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables. B. It is a unique way to identify each record. C. It is a field that uniquely identifies a given record in a table. D. It supports a secondary key.
It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
Which of the following is incorrect in terms of data warehousing and business intelligence? A. They do not include data from other operational systems. B. Operational systems are always integrated. C. Operational data is mainly current. D. Operational data frequently has quality issues.
Operational systems are always integrated.
What is competitive click-fraud? A. the electronic defacing of an existing website B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser C. a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link D. an act or object that poses a danger to assets
a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
What is a primary key? A. a field (or group of fields) that uniquely identifies a given entity in a table B. a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables C. a characteristic or property of an entity D. a field (or group of fields) that uniquely identifies a given attribute in a table
a field (or group of fields) that uniquely identifies a given entity in a table
What is ransomware? A. a form of malicious software that infects your computer and asks for money B. a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys C. software that allows Internet advertisers to display advertisements without the consent of the computer user D. a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
a form of malicious software that infects your computer and asks for money
What is the Child Online Protection Act? A. the unauthorized use, duplication, distribution, or sale of copyrighted software B. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. a law passed to protect minors from accessing inappropriate material on the Internet D. the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals
a law passed to protect minors from accessing inappropriate material on the Internet
What is spear phishing? A. reroutes requests for legitimate websites to false websites B. a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses C. a masquerading attack that combines spam with spoofing D. a phishing expedition in which the emails are carefully designed to target a particular person or organization
a phishing expedition in which the emails are carefully designed to target a particular person or organization
What is a data map? A. a business that can answer questions using the why approach B. a storage repository that holds a vast amount of raw data in its original format until the business needs it C. a technique for establishing a match, or balance, between the source data and the target data warehouse D. an approach to business governance that values decisions that can be backed up with verifiable data
a technique for establishing a match, or balance, between the source data and the target data warehouse
What is proof-of-stake? A. a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain B. a way to validate transactions and achieve a distributed consensus C. a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems; it which operates independently of a central bank D. All of the answer choices are correct.
a way to validate transactions and achieve a distributed consensus
Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet? A. acceptable use policy B. social media policy C. information privacy policy D. email privacy policy
acceptable use policy
What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user? A. spyware B. hacker C. drive-by hacking D. adware
adware
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and Social Security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches? A. a social engineer B. an insider C. a spammer D. a dumpster diver
an insider
What encompasses all organizational data and its primary purpose is to support the performing of managerial analysis tasks? A. transactional data B. analytical data C. timeliness D. quality
analytical data
What area of information security focuses on preventing identity theft, phishing, and pharming scams? A. prevention and resistance B. detection and authorizing C. detection and response D. authentication and authorization
authentication and authorization
What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information? A. script kiddies B. black-hat hacker C. white-hat hacker D. cracker
black-hat hacker
Which of the following occurs during data cleansing? A. cleaning data marts B. cleaning redundant customer data C. cleaning accurate data D. cleaning correct data
cleaning redundant customer data
Employees need to understand that corporate email is solely owned by the A. individual user. B. company. C. human resources department. D. individual user's department.
company
What can compare two or more datasets to identify patterns and trends? A. comparative analysis B. competitive monitoring C. data-driven decision D. management competitive analysis
comparative analysis
What can compare two or more datasets to identify patterns and trends? A. comparative analysis B. competitive monitoring C. data-driven decision management D. competitive analysis
comparative analysis
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link? A. cyberbulling B. cybervandalism C. click-fraud D. competitive click-fraud
competitive click-fraud
Which of the following are examples of external databases in the data warehouse model? A. marketing, sales, inventory, and billing B. accounting data mart C. competitor and industry data, mailing lists, and stock market analyses D. marketing data, sales data, and stock market analyses
competitor and industry data, mailing lists, and stock market analyses
Which of the following is an example of data found in an external database in the data warehouse model? A. marketing data B. sales data C. competitor data D. accounting data
competitor data
Which of the following implies that aggregate or summary data is in agreement with detailed data? A. uniqueness B. completeness C. consistency D. integrity
consistency
Which of the following does not represent a company or group that requires up-to-the-second data? A. 911 responders B. stock traders C. banks D. construction companies
construction companies
What is another name for raw data that has undergone processing? A. raw data B. cooked data C. data map D. source data
cooked data
Which of the following is not a primary trait of the value of data? A. governance B. type C. timeliness D. cost
cost
What compiles all of the metadata about the data elements in the data model? A. data entity B. data element C. data attribute D. data dictionary
data dictionary
Which of the following refers to the extent of detail within the data? A. knowledge data B. data granularity C. data intelligence D. data analytics
data granularity
Which of the following occurs when the same data element has different values? A. data modeling issue B. data gap analysis issue C. data governance issue D. data inconsistency issue
data inconsistency issue
What occurs when a system produces incorrect, inconsistent, or duplicate data? A. data inconsistency B. data integrity issues C. data governance D. master data management
data integrity issues
What is an individual item on a graph or a chart? A. dataset B. dirty data C. data map D. data point
data point
What determines the accuracy and completeness of organizational data? A. data quantity audit B. data quality audit C. data intelligence audit D. data cost audit
data quality audit
What is another term for data cleansing? A. data point B. data scrubbing C. data scrapping D. data aggregation
data scrubbing
Which of the following creates, reads, updates, and deletes data in a database while controlling access and security? A. database element B. database management system C. data governance D. data file
database management system
What decodes information? A. digital certificate B. encryption C. decryption D. cryptography
decryption
Which of the following represents the different data granularities? A. detail, summary, aggregate B. document, presentation, spreadsheet, database C. individual, department, enterprise D. executives, managers, operational employees
detail, summary, aggregate
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution? A. digital rights management B. counterfeit software C. privacy D. pirated software
digital rights management
What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals? A. digital trust B. Child Online Protection Act. C. Rule 41 D. digital child
digital trust
Which of the following is a problem associated with dirty data? A. duplicate data B. correct data C. accurate data D. All of the answer choices are correct.
duplicate data
Which of the following are examples of analytical data? A. airline tickets, sales receipts, packing slips B. hotel reservations, sales receipts, packing slips C. future growth analysis, sales projections, product statistics D. packing slips, grocery receipts, competitor data
future growth analysis, sales projections, product statistics
In a block in a blockchain, what represents a block's unique identifier like a fingerprint? A. data B. hash C. previous hash C. proof-of-stake
hash
What is source data? A. identifies the primary location where data is collected B. a storage repository that holds a vast amount of raw data in its original format until the business needs it C. a technique for establishing a match, or balance, between the source data and the target data warehouse D. an approach to business governance that values decisions that can be backed up with verifiable data
identifies the primary location where data is collected
What is the forging of someone's identity for the purpose of fraud? A. identity crisis B. identity theft C. ediscovery D. All of the answer choices are correct.
identity theft
What simply means unchangeable? A. distributed computing B. ledger C. blockchain D. immutable
immutable
Which of the following is not an advantage of database-stored data? A. increased flexibility B. increased performance C. increased data redundancy D. increased data integrity
increased data redundancy
Which of the following governs the ethical and moral issues arising from the development and use of information technologies and the creation, collection, duplication, distribution, and processing of information? A. ethical information B. information technology C. information policies D. information ethics
information ethics
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity? A. information management B. information compliance C. information secrecy D. information ethics
information secrecy
What program, when installed on a computer, records every keystroke and mouse click? A. key logger B. spyware C. cookie D. adware
key logger
What records classified and summarized transactional data? A. distributed computing B. ledger C. blockchain D. immutable
ledger
What is data inconsistency? A. occurs when the same data element has different values B. occurs when a system produces correct and consistent data C. refers to the overall management of the availability and usability of company data D. the practice of gathering data and ensuring that it is uniform, accurate, and consistent
occurs when the same data element has different values
A company should be able to calculate the cost of downtime by which of the following? A. per hour, per day, and per week B. per employee, per computer, and per company C. per stock, per stockholder, and per investment capital D. None of the answer choices are correct.
per hour, per day, and per week
In a block in a blockchain, what represents the hash of the previous block? A. data B. hash C. previous hash D. proof-of-stake
previous hash
What is distributed computing? A. processes and manages algorithms across many machines in a computing environment B. records classified and summarized transactional data C. a type of distributed ledger, consisting of blocks of data D. simply means unchangeable
processes and manages algorithms across many machines in a computing environment
What is a way to validate transactions and achieve a distributed consensus? A. distributed computing B. proof-of-work C. blockchain D. proof-of-stake
proof-of-stake
What is the primary tool that retrieves data and helps users graphically design the answer to a question? A. data visualization tool B. structured tool C. query-by-example tool D. relational fact tool
query-by-example tool
Which of the following provides real-time data in response to requests? A. sales system B. transactional system C. real-time system D. salary system
real-time system
What is a ledger? A. processes and manages algorithms across many machines in a computing environment B. records classified and summarized transactional data C. a type of distributed ledger, consisting of blocks of data D. simply means unchangeable
records classified and summarized transactional data
What are rules that enforce basic and fundamental information-based constraints? A. data integrity B. integrity constraint C. business-critical integrity constraint D. relational integrity constraint
relational integrity constraint
What is a central location in which data is stored and managed? A. repository B. data warehouse C. data warehouse D. data element
repository
Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand? A. social media monitoring B. social media manager C. social media policy D. information privacy manager
social media manager
What is the use of a false identity to artificially stimulate demand for a product, brand, or service? A. personally identifiable information (PII) B. nonsensitive PII C. sensitive PII D. sock puppet marketing
sock puppet marketing
What includes invoices, spreadsheets, time sheets, and transactions? A. data aggregation B. competitive monitoring C. data map D. source data
source data
What is unsolicited email that plagues employees at all levels and clogs email systems? A. spyware B. spam C. adware D. GDPR
spam
Which of the following is not a dirty data problem? A. duplicate data B. inaccurate data C. specific data D. nonintegrated data
specific data
What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission? A. sniffer B. spyware C. spoofware D. splog
spyware
Gender can be referred to in many ways (male, female, M/F, 1/0) in a data warehouse. Ensuring gender is referenced the same way is an example of A. data scaling. B. streamlining data points. C. standardizing data D. standardizing protocols.
standardizing data
Which of the following asks users to write lines of code to answer questions against a database? A. structured query language B. relational query language C. structured elements D. data mining tools
structured query language
What is ediscovery? A. the unauthorized use, duplication, distribution, or sale of copyrighted software B. the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. a law passed to protect minors from accessing inappropriate material on the Internet D. the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals
the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
Which of the following represents the definition of information compliance? A. the act of conforming, acquiescing, or yielding information B. the ability to comply with software C. the understanding of technology D. the verbalization of information governance in a company's policies and procedures
the act of conforming, acquiescing, or yielding information
Which of the following describes confidentiality? A. the assurance that messages and information are available only to those who are authorized to view them B. policies and procedures that address the ethical use of computers and the Internet in the business environment C. the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent D. the principles and standards that guide our behavior toward other people
the assurance that messages and information are available only to those who are authorized to view them
What is data validation? A. the time it takes for data to be stored or retrieved B. the management and oversight of an organization's data assets C. the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data D. when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps
the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data
What is data latency? A. the time it takes for data to be stored or retrieved B. the management and oversight of an organization's data assets C. the person responsible for ensuring policies and procedures are implemented across the organization D. when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps
the time it takes for data to be stored or retrieved
Why do relational databases use primary keys and foreign keys? A. to create an entity B. to create physical relationships C. to create logical relationships D. to create an attribute
to create logical relationships
What is it called when each transaction, entity, and event is represented only once in the data? A. uniqueness B. accuracy C. consistency D. timeliness
uniqueness
What is data gap analysis? A. the time it takes for data to be stored or retrieved B. the management and oversight of an organization's data assets C. the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data D. when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps
when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps