• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

INFO MANAGEMENT QUIZ 2 EXAM QUESTIONS

EXAMS AND CERTIFICATIONS Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

INFO MANAGEMENT QUIZ 2 EXAM QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -82 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation

Question 1: Genesis block

Answer:

The first block created in the blockchain Question 2: Authentication and Authorization items:

Answer:

  • Fingerprint or voice encryption
  • user ID and password
  • Smart card or token

Question 3: Database

Answer:

Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses) Question 4: Transactional data examples:

Answer:

sales receipt airline ticket packing slip

Question 5: Data lake

Answer:

A storage repository that holds a vast amount of raw data in its original format until the business needs it

Question 6: Copyright example

Answer:

Creating an iPhone application and securing legal protection so others cannot sell your application

Question 7: Inconsistent data definitions

Answer:

Every department had its own method for recording data so when trying to share information, data did not match and users did not get the data they really needed.

Question 8: Ineffective direct data access

Answer:

Most data stored in operational databases did not allow users direct access; users had to wait to have their queries or questions answered by MIS professionals who could code SQL.

Question 9: Dirty data

Answer:

Erroneous or flawed data

Question 10: Proof-of-stake

Answer:

A way to validate transactions and achieve the distributed consensus

Question 11: Black-Hat hacker

Answer:

Breaks into other people's computer systems and may just look around or may steal and destroy information Question 12: Detection and Response items:

Answer:

  • Intrusion detection software

Question 13: Dumpster Diving

Answer:

Looking through people's trash is another way hackers obtain information

Question 14: Distributed computing

Answer:

Processes and manages algorithms across many machines in a computing environment Question 15: Prevention and Resistance Items:

Answer:

  • Content filtering
  • Firewall

Question 16: Blocks

Answer:

Data structures containing a hash, previous hash, and data

Question 17: Inadequate data usefulness

Answer:

Users could not get the data they needed; what was collected was not always useful for intended purposes.

Question 18: Cracker hacker

Answer:

have criminal intent when hacking

Question 19: Intellectual property example

Answer:

Writing a song and posting it to Youtube

Question 20: Hash

Answer:

A function that converts an input of letters and numbers into an encrypted output of a fixed length

Question 21: Entity

Answer:

Stores information about a person, place, thing, transaction, or event

Question 22: Pirated software example

Answer:

Copying Microsoft Office and distributing it for free

Question 23: Attributes

Answer:

Characteristics or properties of an entity

Question 24: Record

Answer:

Collection of related data elements

Question 25: Metadata

Answer:

Provides details about data

Question 26: Complete

Answer:

Is the address complete, including street, city, state, and zip code?

Question 27: Database management system (DBMS)

Answer:

Creates, reads, updates, and deletes data in a database while controlling access and security

Question 28: Foreign key

Answer:

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: EXAMS AND CERTIFICATIONS
Description:

PDF Download INFO MANAGEMENT QUIZ 2 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -82 Questions and Answers -format set of multiple-choic...

UNLOCK ACCESS $11.99