PDF Download
INFO MANAGEMENT QUIZ 2 EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -82 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: Genesis block
Answer:
The first block created in the blockchain Question 2: Authentication and Authorization items:
Answer:
- Fingerprint or voice encryption
- user ID and password
- Smart card or token
Question 3: Database
Answer:
Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses) Question 4: Transactional data examples:
Answer:
sales receipt airline ticket packing slip
Question 5: Data lake
Answer:
A storage repository that holds a vast amount of raw data in its original format until the business needs it
Question 6: Copyright example
Answer:
Creating an iPhone application and securing legal protection so others cannot sell your application
Question 7: Inconsistent data definitions
Answer:
Every department had its own method for recording data so when trying to share information, data did not match and users did not get the data they really needed.
Question 8: Ineffective direct data access
Answer:
Most data stored in operational databases did not allow users direct access; users had to wait to have their queries or questions answered by MIS professionals who could code SQL.
Question 9: Dirty data
Answer:
Erroneous or flawed data
Question 10: Proof-of-stake
Answer:
A way to validate transactions and achieve the distributed consensus
Question 11: Black-Hat hacker
Answer:
Breaks into other people's computer systems and may just look around or may steal and destroy information Question 12: Detection and Response items:
Answer:
- Intrusion detection software
Question 13: Dumpster Diving
Answer:
Looking through people's trash is another way hackers obtain information
Question 14: Distributed computing
Answer:
Processes and manages algorithms across many machines in a computing environment Question 15: Prevention and Resistance Items:
Answer:
- Content filtering
- Firewall
Question 16: Blocks
Answer:
Data structures containing a hash, previous hash, and data
Question 17: Inadequate data usefulness
Answer:
Users could not get the data they needed; what was collected was not always useful for intended purposes.
Question 18: Cracker hacker
Answer:
have criminal intent when hacking
Question 19: Intellectual property example
Answer:
Writing a song and posting it to Youtube
Question 20: Hash
Answer:
A function that converts an input of letters and numbers into an encrypted output of a fixed length
Question 21: Entity
Answer:
Stores information about a person, place, thing, transaction, or event
Question 22: Pirated software example
Answer:
Copying Microsoft Office and distributing it for free
Question 23: Attributes
Answer:
Characteristics or properties of an entity
Question 24: Record
Answer:
Collection of related data elements
Question 25: Metadata
Answer:
Provides details about data
Question 26: Complete
Answer:
Is the address complete, including street, city, state, and zip code?
Question 27: Database management system (DBMS)
Answer:
Creates, reads, updates, and deletes data in a database while controlling access and security
Question 28: Foreign key
Answer:
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables