Isom test 2
Which of the following represents the different information formats?
Document, presentation, spreadsheet, database
what are information formats
Document, presentation, spreadsheet, database
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
copyright
Database Management System (DBMS)
creates, reads, updates, and deletes data in a database while controlling access and security
How would law enforcement industry use business intelligence
crime patterns
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
ethics
what represents the two fundamental building blocks that protect organizational information
ethics and security
What is a real-time system?
Provides real-time information in response to query requests
Which of the following is not a primary trait of information?
Quantity
Which of the following is not one of the five characteristics common to high-quality information?
Quantity
information integrity
a measure of the quality of information
Is there an incorrect value in the information? (names, money)
accurate
Data cleaning/scrubbing
all of the above
Why were data warehouses created
all of the above
What passed to protect children
child online protection act
Primary purpose of data warehouse
combine strategic information
Examples of external databases
competitive
Is a value missing from the information? (every part of the address)
complete
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
confidentiality
Which of the following implies that aggregate or summary information is in agreement with detailed information?
consistency
is aggregate or summary information in agreement with detailed information? (does everything equal)
consistent
query by example (QBE)
helps users graphically design the answer to a question against a database
data latency
the time it takes for data to be stored or retrieved
Which of the following implies that information is current with respect to the business requirement?
timeliness
is the information current with respect to business needs? (is it up to date)
timely
What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performing of daily operational tasks?
transactional information
what are the four primary traits of the value of information
type, timeliness, quality, governance
How would bank industry use business intelligence
understand credit card
Is each transaction and event represented only once in the information? (no duplicates)
unique
Is a problem with dirty data
violates the business rules
Which of the below represents the definition of information governance?
A method or system of government for information management or control.
What is it called when each transaction, entity, and event is represented only once in the information?
Uniqueness
the ability of a company to identify, search, gather, seize, or investigate, or information inquiry
ediscovery
Primary Key
A field (or group of fields) that uniquely identifies a given entity in a table
Which of the below represents the definition of information property?
An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanges.
What encompasses all organizational information and its primary purpose is to support the performing of managerial analysis tasks?
Analytical information
Which of the following encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks?
Analytical information
Which of the following represents the different information granularities?
Detail, summary, aggregate
Which of the below represents the definition of information management?
Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.
Which of the following represents the different information levels?
Individual, department, enterprise
Which of the following refers to the extent of detail within the information?
Information granularity
Which of the following represent the four primary traits that help determine the value of information?
Information type, information timeliness, information quality, and information governance
Which is incorrect in data warehouse and intelligence
Integrate
What is one of the biggest pitfalls associated with real-time information?
It continually changes
Employees need to compare different types of information for what they commonly reveal to make strategic decisions. Which of the below represents the three common types of information found throughout an organization?
Levels, formats, granularities
What is the difference between pirated and counterfeit software?
Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such
What is immediate, up-to-date information?
Real-time information
What provides real-time information in response to query requests?
Real-time system
Which of the below represents the definition of information compliance?
The act of conforming, acquiescing, or yielding information.
Which of the below represents the definition of information secrecy?
The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
data element (data field)
The smallest or basic unit of information
What are the two different categories for information type?
Transactional and analytical
Which of the following encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks?
Transactional information
Teergrubing
an anti-spamming approach
Structured Query Language (SQL)
asks users to write lines of code to answer questions against a database
attribute
associated with entity
What is info that people use to help make decision
business intelligence
Which of the following is the term of multidimensional
cube
metadata
data about data
occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist
data gap analysis
refers to the overall management of the availability, usability, integrity, and security of company data
data governance
Sub set of data mining
data mart
What is the data organization and cleaning
data quality audit
the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner
data stewardship
includes the tests and evaluations used to determine compliance with data governance polices
data validation
business rule
defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer
What are information granularities
detail, summary, aggregate
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
digital rights management
a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
digital rights management
Is a problem with dirty data
duplicate
Trust between companies, customers, partners, and suppliers are the support structure of which of the following?
ebusiness
Quadrant IV
illegal and unethical
Quadrant II
illegal but ethical
Real time information
immediate, up-to-date information
dynamic information
includes data that change based on user actions
what are information levels
individual, department, enterprise
What is the method or system of government for information management or control?
information governance
Information cleaning
information scrubbing
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
information secrecy
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?
informational
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function, and grow effectively?
informational management
What is intangible data work that includes copyrights
intellectual property
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?
intellectual property
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and ________.
legal and ethical
Quadrant I
legal and ethical
Quadrant III
legal but unethical
data models
logical data structures that detail the relationships among data elements using graphics or pictures
the practice of gathering data and ensuring that is uniform, accurate, consistent and complete
master data management
Acceptable Use Policy (AUP)
must agree to follow to be provided access to corporate email
Acting properly and ethically
none of the above
information integrity issues
occur when a system produces incorrect, inconsistent, or duplicate data
information inconsistency
occurs when the same data element has different values
Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.
pirated software
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
privacy
Real-time systems
provide real-time information in response to requests
the part of the united states federal rules of criminal procedure that covers the search and seizure of physical and digital evidence
rule 41
relational integrity constraints
rules that enforce basic and fundamental information-based constraints
What is not a data cleaning activity
sales trends
entity
stores information about a person, place, thing, transaction, or event
Information Granularity
the extent of detail within the information