Administration Flashcards
What two functions does authentication perform?
- Establishes that a user is authentic based on a valid username and password.
- Verifies that the user’s account is enabled.
Which organization structure element (organization unit, position, job, or user) is used to determine who a caseworker reports to?
Position
What are rate tables used for?
Rate tables store values that can vary over time
True or False: You can clone an organization structure.
True
How many organization structures can be active at one time? How many root units are allowed in an organization structure?
One, One.
Which Administration component is used to record payment exclusion dates? List the five types of this component
Financial processing calendar.
Cash, check, EFT, voucher, and invoice.
True or False: In the Cúram data model, Jobs are directly linked to Users.
False (Jobs are directly linked to positions, not users.)
Sensitivity security is applied to which four areas?
Work queues, participants, users, and notes.
True or False: Locations represent the workplaces of the agency’s clients
False (They represent the workplaces of the users, not clients.)
What must you do to ensure that new code table items appear in their drop-down lists?
Publish the changes
List the two types of communication templates
Extensible Style Language (XSL), Microsoft Word.
List two resource types that can be assigned a security identifier (SID).
A security identifier (SID) represents a protected resource. Every secured element in Cúram is given a unique SID.
SIDs can be assigned to business processes, specific fields on a screen, organization units, locations, case audits, and products that are offered by the organization.
Mary and Kevin are caseworkers assigned to different locations within the organization.
When Mary performs a search for one of Kevin’s clients, she can see that the client is
registered in the system, but she cannot see the client’s address, date of birth, or any
other information about the client. In this scenario, what is the Location Data Security
setting for the system?
Restricted view.
What are application properties?
They are variables that configure the system to suit the organization’s needs.
A Working Pattern covers how many days?
14 days