Exam 5 - Technology Flashcards

1
Q

The term _____ data refers to the records remaining in the old system after replacement.

a) limitation
b) obsolete
c) deleted
d) legacy
e) legal

A

d. legacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ is a set of open standards for tagging information so that it can be transmitted via Internet protocols and readily interpreted by disparate computer systems.

a) JPG
b) HIPAA
c) HTML
d) XML
e) SQL

A

d. XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The acronym RAID is a:

a) Read Archival Institutional Data
b) Redundant Assortment of Insufficient Data
c) Redundant Array of Independent Disks
d) Reassignment Authenticity Independent Data
e) Reassignment Audit of Insignificant Data

A

c. Redundant Array of Independent Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.

a) Malware
b) Phishing
c) Pirating
d) Spamming
e) Benchmarking

A

b. Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data _____ are designed to support decision-making in an organization so queries and analyses can be performed without disturbing the content of data in native applications.

a) archives
b) centers
c) captures
d) warehouses
e) platforms

A

d. warehouses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is a mathematical process performed by special computer software for scrambling plain text and other digital information for security purposes

a) Phishing
b) Discovery
c) Emulation
d) Encryption
e) Coding

A

d. encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is the extent to which a given recordkeeping medium retains its physical and chemical properties, or the period of time during which the medium remains useful for its intended purpose.

a) Media stability
b) Media conversion
c) Life expectancy
d) Native format
e) Migration

A

a. media stability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A data backup technique in which data recorded on disk drives is copied onto identical media for ease of restoration is:

a) cropping
b) mirroring
c) vaulting
d) spoliation
e) outsourcing

A

b. mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A statement formulated by a person seeking information from a recordkeeping system defining the information or records sought is a search:

a) structure
b) taxonomy
c) query
d) production
e) request

A

c. query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is the process of two or more people or organizations working together to complete a task or achieve a goal.

a) Reporting
b) Planning
c) Decision making
d) Collaboration
e) Operationalization

A

d. collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most common size microfilm used for filming business documents is:

a) 105mm
b) 35mm
c) 8mm
d) 22mm
e) 16mm

A

e. 16mm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Records may be removed from a decommissioned system only:

a) if the system manager feels they are no longer needed.
b) if they have not been migrated to a new system.
c) in accordance with retention schedule guidelines.
d) when the activity the system supported is completed.
e) following implementation and testing of a replacement system.

A

c. in accordance with retention schedule guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing schemes and viruses are typical _____ issues.

a) version rendering
b) vendor management
c) planning and deployment
d) archival
e) security

A

e. security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is used by the operating system to track data scattered on a disk?

a) Search tools
b) Log files
c) File allocation tables
d) File servers
e) Protocols

A

c. file allocation tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A limitation of the ___ systems development methodology is that information learned in one phase requires cycling back to a previous phase.

a) waterfall
b) agile
c) unified
d) collaboration
e) rapid

A

a. waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is an early sample, model, or release of a product built to test a concept or process or to act as a thing to be replicated or learned from.

a) server
b) device
c) pattern
d) prototype
e) standard

A

d. prototype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

To ensure that information in a system is available to users within anticipated time frames, it is important to set specific system ____ requirements.

a) disposition
b) documentation
c) recovery
d) back-up
e) performance

A

e. performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A graphic display of the logic and flow of processes that helps analyze how problems occur and how processes can be improved is a:

a) Gantt chart
b) flowchart
c) histogram
d) Pert chart
e) Project diagram

A

b. flowchart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When evaluating outside vendors for aservice, creating a(an) ___ is considered an informal approach in gathering data.

a) assessment
b) RFI
c) Requisition
d) FTP
e) SOP

A

b. RFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The agile systems development methodology:

a) initially creates a list of features and then builds the system feature by feature.
a) less documentation.
b) employs five clearly defined development steps.
c) requires frequent meetings of all participants
d) involves a very small team that performs all systems development work.
e) stresses continuous learning and just-in-time decision making

A

c. requires frequent meetings of all participants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Robotics, vision systems, natural language processing, learning systems, and neural networks are examples of:

a) machine learning
b) knowledge management
c) complex systems
d) competitive intelligence
e) artificial intelligence

A

e. artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Image quality in video conferencing is affected by the:

a) size of the monitor
b) experience of the users
c) number of sites
d) transmission bandwidth
e) transmission media

A

d. transmission bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

______ identify the top-level abstractions that underlie IT systems and allow the architectures of existing and future systems to be compared.

a) Meta models
b) Systems configurations
c) Reference models
d) Survey diagrams
e) Taxonomies

A

c. Reference models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A ____ strategy, used when upgrading software, allows testing a working version of the new system prior to organizational deployment.

a) governance
b) parsed
c) direct cutover
d) pilot conversion
e) parallel conversion

A

d. pilot conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A knowledge base consists of:

a) facts, images, and interface.
b) facts, assumptions, and rules.
c) answers and assumptions.
d) answers and logic.
e) probabilities and outcomes.

A

b. facts, assumptions, and rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A benefit of presentation graphics software is the ability to:

a) prepare text easily
b) impress an audience
c) integrate with images
d) display data in charts and graphs
e) insert hyperlinks to other documents

A

d) display data in charts and graphs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

One component of the system development life cycle (SDLC) is:

a) strategy
b) design
c) retention
d) storage
e) retiring

A

b. design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The sequence of events in a project that takes the longest time to complete is the:

a) constraint
b) backward pass
c) critical path
d) duration
e) noncritical path

A

c. critical path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A table of contents for an electronic storage medium is a (an):

a) pointer
b) directory
c) ASCII table
d) file hierarchy
e) vocabulary

A

b. directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Question 1
\_\_\_\_\_ systems are designed to capture, route, and organize electronic documents on an enterprise-wide scale.
a)	COLD 
b)	EDMS
c)	DBMS
d)	CAD
e)	DMB
A

b. EDMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The main purpose of _____ is to enable an application to work better by preserving a history of Web pages a user had visited previously.

a) cookies
b) portals
c) attributes
d) categorization
e) taxonomies

A

a. cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A widely used coding scheme that specifies bit patterns for computer-processible information is:

a) HTML
b) ASCII
c) XML
d) JPEG
e) PDF

A

b. ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

File _____ software enables the user to visually organize file names and directories.

a) builder
b) optimization
c) manager
d) directory
e) audit

A

c. manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A management information system designed to handle large volumes of routine, recurring actions is a(an) _____ system.

a) applications-processing
b) transaction-processing
c) operations-processing
d) executive support
e) routine support

A

b. transaction-processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A(An) _____ specifies the location of publicly available information on the Internet.

a. search engines
b. uplink
c. URL
d. HTML
e. PDF

A

c. URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

_____ can cause internal computer power problems in an office.

a) A modem dysfunction
b) A circuit overload
c) Encryption
d) Pitted Disk Syndrome (PDS)
e) Dual core processors

A

b. a circuit overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In addition to conformity with records retention schedules, a RIM audit may consider:

a) staffing numbers
b) security of records
c) RIM budget
d) disciplinary procedures
e) job descriptions

A

b. security of records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

When evaluating a new ECM, the most important element to consider is the:

a) color of the source documents
b) location of existing records
c) effectiveness of the new system
d) intrinsic value of the records
e) amount of space saved

A

c. effectiveness of the new system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When using ____, physical storage spans multiple servers and the physical environment is typically owned and managed by a hosting company.

a) cloud storage
b) file share
c) ECM
d) record center
e) LAN

A

a. cloud storage

40
Q

Some organizations make the decision not to map all ESI but only data they deem:

a) a risk to the organization
b) inactive
c) active
d) recoverable
e) professional in nature

A

a. a risk to the organization

41
Q

Changes in _____ can render previously recorded information unusable.

a) migration
b) servers
c) software
d) retention
e) users

A

c. software

42
Q

Categorization software products employ synonym lists, pattern matching algorithms, word clustering, and word _____ to analyze a document’s content and identify key words for indexing purposes.

a) dictionaries
b) proximities
c) images
d) counts
e) rules

A

b. proximites

43
Q

ISO ______ is a framework of policies and procedures that includes all legal, physical, and technical controls involved in an organization’s information risk management processes.

a) 15489
b) 74009
c) 89541
d) 27001
e) 26773

A

d. 27001

44
Q

What type of photographic negative should never be frozen while attempting to stabilize water damage?

a) gelatin dry plates
b) collodion wet plates
c) acetate
d) nitrate
e) silver halide

A

a. gelatin dry plates

[plates have a photo on them so freezing it will separate the photo from the plate]

45
Q

____ software typically has no licensing fee, is not proprietary, and permits users access to sources code.

a) Office suite
b) Wiki
c) Enterprise content management
d) Web 2.0
e) Open source

A

e) open source

46
Q

A ______ is a digital audio file made available on the internet for downloading to a computer or mobile device.

a) voicemail
b) podcast
c) wiki
d) blog
e) firewall

A

b) podcast

47
Q

Systems designed to create, manage, store, preserve, and deliver information in electronic form are:

a) ISO
b) ECM
c) SQL
d) RMA
e) ERP

A

b) ECM

48
Q

In conducting a requirements analysis for ECM systems, the key departments involved should include: a) legal, marketing and sales

b) legal, compliance, RIM, and IT
c) library services, compliance, and marketing
d) human resources, compliance, and accounting
e) human resources, accounting and marketing

A

b) legal, compliance, RIM and IT

49
Q

A(An) ____ microform scanner supports high-volume digitization of micro images.

a) production-level
b) reader-printer
c) microfilm reader
d) offline COM
e) enlarger printer

A

a) production-level

50
Q

A web portal is an example of a(an):

a) method of content management
b) web page
c) integrated database
d) portable document format
e) convenience copy

A

b) web page

51
Q

____ is used when there is no backward compatibility or an export/import gateway to move records from a legacy application to a new system.

a) Deletion
b) Copying
c) Migration
d) Reformatting
e) Transfer

A

c) Migration

52
Q

For document security purposes, a thin label with a programmable integrated circuit and antenna is a ____ device.

a) radio frequency identification
b) barcode
c) magnetic tracking strip
d) range searching
e) remote diagnostic

A

a) radio frequency identification

53
Q

A faint pattern added to a digital image for identification purposes is a:

a) document map
b) tag
c) watermark
d) markup
e) highlight

A

c) watermark

54
Q

Virtual private networks are used by many businesses and government agencies because they provide:

a) free access to the internet
b) intranet technology
c) the ability to create virtual documents
d) website security
e) safe business to business transactions

A

e) safe business to business transactions

55
Q

______ is the function of document imaging that requires the most planning, customization, and quality control.

a) Scanning
b) Indexing
c) Sorting
d) Filing
e) Batches

A

b) Indexing

56
Q

Tasks associated with operating a document imaging system would not include:

a) indexing
b) document preparation
c) refiling
d) silver recovery
e) quality assurance

A

d) silver recovery

57
Q

Converting hard copy records to an electronic format:

a) requires minimal technical expertise
b) ensures 100% retrieval ratio
c) eliminates the need for a retention schedule
d) will not be effective if there are non-standard sized documents
e) increases the speed of retrieval while decreasing storage space

A

e) increases the speed of retrieval while decreasing storage space

58
Q

The investigative phase of litigation when the opposing party can obtain access to recorded information believed to be relevant to its case is:

a) spoliation
b) reference activity
c) court investigation
d) pre-trial discovery
e) continuity

A

d) pre-trial discovery

59
Q

One of the most significant differences between Web 2.0 and traditional Web 1.0 is greater____ among internet users.

a) stability
b) collaboration
c) confidentiality
d) intelligence
e) privacy

A

b) collaboration

60
Q

Transfer of record ownership takes place during the __________process.

a) Legal Review
b) Business Review
c) Disposition Review
d) Audit Review
e) Archive Review

A

e) archive review

61
Q

_____ is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.

a) Malware
b) Phishing
c) Pirating
d) Spamming
e) Benchmarking

A

b. Phishing

62
Q

A computer-to-computer interchange of information using a pre-defined format based on agreed definitions through electronic networks is a(an) _____ interchange.

a) system
b) electronic data
c) electronic network
d) electronic document
e) network document

A

b) electronic data

63
Q

_____ is a condition aggravated by high humidity that can seriously and permanently damage microfilm.

a) Methylene blue
b) Hydrostatic deterioration
c) Water absorption
d) Splotching
e) Mildew

A

e) Mildew

64
Q

_____ applications are easier to deploy, take up fewer resources, and run faster without the full capabilities of their richer versions.

a) Website
b) Thin client
c) Cloud
d) Thick client
e) Mobile

A

b) thin client

65
Q

Varieties of metadata can be described as:

a) substantive, system-based, and embedded.
b) real and unreal.
c) governed and ungoverned.
d) system-based, group, and associated.
e) language driven, group, and systems.

A

a) substantive, system-based, and embedded

66
Q

The character storage capacity of a CD-ROM depends on the:

a) software used to create the document.
b) transfer rates.
c) data density.
d) number of read-write heads.
e) block width.

A

c) data density

67
Q

A _____ is a federated repository for all the data collected by an enterprise’s various operational systems.

a) laptop
b) file share
c) file room
d) data warehouse
e) offsite records center

A

d) data warehouse

68
Q

The process of periodically converting electronic records to new file formats or new storage media is:

a) reusability
b) digital asset management
c) printing
d) media stability
e) data migration

A

e) data migration

69
Q

Which one of the following categories of government records is expressly covered by the United States Freedom of Information Act (FOIA)?

a) Judicial branch
b) Executive branch
c) Legislative branch
d) Archives and Records Management branch
e) All records of the federal government

A

e) All records of the federal government

70
Q

An acquisition policy serves as a basic document to:

a) Determine cooperative digital projects and repositories with similar collections.
b) Plan preservation priorities by determining areas of importance to the repository.
c) Assess potential donations and inform donors looking for a suitable repository for their records.
d) Develop public programming and prepare long-term strategic planning.
e) Provide information to researchers and external customers.

A

d) Develop public programming and prepare long-term strategic planning

71
Q

Which of the following is used by the operating system to track data scattered on a disk?

a) Search tools
b) Log files
c) File allocation tables
d) File servers
e) Protocols

A

c) file allocation tables

72
Q

An ERMS is different from an EDMS because an ERMS has the ability to:

a) allow for assembly of large, compound documents
b) maintain an audit trail of actions completed on a document
c) render documents into many formats.
d) incorporate encryption technology for digital signatures.
e) create holds on documents for impending legal action.

A

e) create holds on documents for impending legal action

73
Q

A _____ allows you to create a secure connection to another network over the internet.

a) VPN
b) SSO
c) MFA
d) COM
e) RFI

A

a) VPN

74
Q

____ allows customers and vendors to transfer information into each other’s data files

a) USB drives
b) Encryption
c) E-Mail
d) EDI
e) Authentication

A

d) EDI

75
Q

Magnetic tapes, USB drives and external hard drives are all examples of ______ storage.

a) off-line
b) centralized
c) near-line
d) cloud
e) on-line

A

a) off-line

76
Q

Network ________ is the high-level concepts and frameworks for the physical, methodological, and social components to work together in an organized manner.

a) architecture
b) attached storage
c) operating system
d) segmentation
e) modeling

A

a) architecture

77
Q

In computing, information technology _______ is (are) composed of physical and virtual resources that support the flow, storage, processing, and analysis of data.

a) software
b) hardware
c) infrastructure
d) cloud
e) network

A

c) infrastructure

78
Q

With electronic records, closed series may consist of _______ data associated with computer applications that have been replaced.

a) structured
b) unstructured
c) legacy
d) application
e) destruction

A

c) legacy

79
Q

A(an) ______ database works with traditional database information and complex data types such as diagrams, schematic drawings, video, and sound and text documents.

a) structured
b) object-oriented
c) hierarchical
d) social network
e) relational

A

b) object-oriented

80
Q

A data ______ is a subset of a data warehouse in which only a focused portion of the data warehouse information is kept.

a) lake
b) dictionary
c) mine
d) repository
e) mart

A

e) mart

81
Q

_____ is a crime in which an imposter obtains key Personally Identifiable Information (PII) to impersonate someone else.

a) Virus implementation
b) Identity theft
c) Malware
d) Worm detection
e) Degaussing

A

b) Identity theft

82
Q

A _____ is software that aids in the management of records, especially electronic records, including the use of a file plan for classifying records and a retention schedule for identifying records that are due for destruction.

a) COM
b) PDF
c) SaaS
d) RMA
e) DMS

A

d) RMA

83
Q

______ data is difficult to process with traditional database and software techniques and may include both structured and unstructured data.

a) Huge
b) Big
c) Meta
d) Access
e) Large

A

b) Big

84
Q

The last phase of the systems development life cycle is:

a) Development
b) Design
c) Maintenance
d) Testing
e) Planning

A

c) Maintenance

85
Q

The development of a project plan including task, resources, and timeframes takes place during the _____ phase of the systems development life cycle.

a) maintenance
b) implementation
c) analysis
d) planning
e) testing

A

d) planning

86
Q

_______ methodology is a sequential, activity-based process in which one phase of the system development life cycle is followed by another from planning through implementation.

a) Waterfall
b) Agile
c) Rapid application development
d) Prototyping
e) Milestone

A

a) Waterfall

87
Q

____ are the detailed set of end-user requests that the system must meet to be successful which are collected during the analysis phase of the SDLC.

a) Data error rates
b) Installation markers
c) Capture processes
d) Business requirements
e) Knowledge points

A

d) Business requirements

88
Q

Data ______ is the process of documenting a complex software system design as an easily understood diagram, using text and symbols to represent the way data needs to flow.

a) structuring
b) mapping
c) modeling
d) collaboration
e) defining

A

c) modeling

89
Q

A ___ is a standardized set of activities that accomplishes a specific task.

a) communications protocol
b) click-through
c) collocation procedure
d) business process
e) broadband

A

d) business process

90
Q

Digital records conversion and migration processes are covered in:

a) ISO 50012
b) ISO 15489
c) ISO 13008
d) ISO 14672
e) ISO 72356

A

c) ISO 13008

91
Q

______ analysis is a research tool used to determine the presence of certain words or concepts within texts and sets of texts.

a) Proximity
b) Relational
c) Unstructured
d) Semantic
e) Content

A

e) Content

92
Q

Data ____ is the overall management, usability, integrity, and security of data used in an enterprise.

a) preservation
b) mapping
c) control
d) innovation
e) governance

A

e) governance

93
Q

ECM is the strategies, methods, and tools used to capture, manage, store, preserve, and _______ content and documents related to organizational processes.

a) develop
b) deliver
c) classify
d) code
e) certify

A

b) deliver

94
Q

A ______ is a predetermined pattern of vertical lines that when read by an optical reader, can be converted to machine-readable language.

a) RFID
b) blog
c) barcode
d) BYOD
e) folksonomy

A

c) barcode

95
Q

______ is a digitized, decentralized, immutable ledger for recording the history cryptocurrency transactions.

a) Collaboration software
b) Biometric sensor
c) Virtual reality
d) Blockchain
e) Edge computing

A

d) Blockchain

96
Q

_____ software enables you to solve specific problems or perform specific tasks.

a) Biomimicry
b) Antivirus
c) Broadband
d) Collaboration
e) Application

A

e) Application