Volume 2 Flashcards
<p>In the context of cognitive hierarchy what information is ananlyzed to provide meaning and value, or evaluated as to impolications for the operation?</p>
<p>Data</p>
<p>In the context of cognitive hierarchy, what is knowledge tha thas been synthesized and judgement applied to it in a specific sitation to comprehend the situation's inner relationships?</p>
<p>Understanding</p>
<p>Data analyzed describes what level of the cognitive hierarchy?</p>
<p>Information</p>
<p>Knowledge combined with judgement and experience describes what level of cognitive hierarchy?</p>
<p>Understanding</p>
<p>What objectives will the maturation of the services oriented architecture directly support?</p>
<p>Secretary of the Air Force</p>
<p>What is a data element?</p>
<p>Physical representation of data entity attribute</p>
<p>What term is a structured description of records used to describe databse objects representations, and the relationships among them?</p>
<p>Schema</p>
<p>When storing data structures of a group of ordered data items or elements defines what type of list?</p>
<p>Linked</p>
<p>What term do you use to address the data item instead of addressing the entire size of the data item?</p>
<p>Pointer</p>
<p>What term describes a set of data elements or values organized by using a model of horizontal rows and vertical columns?</p>
<p>Database Table</p>
<p>A tree structure within a hierarchical data structure is best used to display databse records that have what type of fields?</p>
<p>Repeated</p>
<p>Another data structure name for a network that is similar to a tree structure is called a?</p>
<p>Plex</p>
<p>Who must test and certify user-developed software before instaling it on an automated information system?</p>
<p>Local security officials</p>
<p class=”large” style=”text-align:center”;>One method of providing protection of critical data against tampering is to control the physical access to the automated information system itself by?</p>
<p class=”large” style=”text-align:center”;>installing keyboard locks</p>
<p>on e method a database administrator can maintain database access control is to limit a user access to?</p>
<p>use the least priviledge concept</p>
<p>The main purpose of a database is to?</p>
<p>make data independent of its programs</p>
<p>what term best describes the process of organizing data into tables that result in the database being unambiguous as intended?</p>
<p>Normalization</p>
<p>What database normalization form has a type of entity dependency called transitive dependency?</p>
<p>Third</p>
<p>What term best describes the redundant storing of the customer name in the purchase order entity?</p>
<p>Data Denormalization</p>
<p>What method is used by a database administrator to manage the updating of information on an enterprise's computer system?</p>
<p>configuration control</p>
<p>That database maintenance responsibility that addresses disk fragmentation is?</p>
<p>The DBMS</p>
<p>What causes database fragmentation?</p>
<p>Gaps left in the database due to record deletions</p>
<p>The database maintenance responsibility that maintains a collection of metadata, DBMS, software, code libraries, and editing tools is managing?</p>
<p>a Data repository</p>
<p>What option is not a key element in the Air Force enterprise architecture of the Air Force Portal?</p>
<p>Means for faster reliable service</p>
Who is the most important part of the Air Force Portal Inititiative?
User
Who oversees organization's implementation of the Air Force Portal program?
Content Manager
Who ensure the links in your web site are maintained and in working order?
Content Publisher
Which content publishing form is used to complete other forms as well as for its own uses?
Editorial
What environment do you use to enter or edit content into in-line publishing forms?
Publishing center portal
What environment does all Air Force users see when they sign on to the Air Force Portal?
Air Force Portal Production
Content must be entered into what environment before it can be deployed?
Publishing center portal
When you clikc the "Insert" button to import graphics, what happens?
the insert/edit image widget closes
What must you do as a Content Publisher for a user to use image sfrom the Air Force Portal Directory?
The images must have been uploaded to the Air Force Portal Directory prior to creating the document.
What is the highest-level element in a basic web document?
HTML
What section is wehre all content to include text and more HTML code for formatting is placed in a basic web document?
Body
What does the Privacy Advisory on public web sites inform users about?
Why the information is solicited and how it will be used.
When may For Official Use Only material be placed on an Internet web site?
Only if access to the site is limited to a specific target audience and the information is encrypted or password protected.
Knowledge information implementation lead to all the following except
a restricting that knowledge across your organization
Knoweldge results when information is organized and abstracted to produce something that is useful, predictive and expository to the decision-maker, describes which phase of knoweldge management?
I
To use and exploit tacit information, the objective is not to explicitly capture knowledge for the purpose of managing it, but to provide capabilities which allow airmen to reach knowledge experts or centers of professional expertise, describes which phase of knowledge management?
II
Technologies and processes enable effiecient and targeted workflows, dynamic subscription, proactive push, smart pull, and cross-mission collaboration, describes which phase of knowledge management?
III
When Communities of Interest are formed, they will not initially focus on developing
locations for implementation
Which information using assets do knowledge based operations manage in an integrated environment?
People, processes, and tools
What goal is not one of Knowledge Based Operations?
Increase the creation of official Air Force information assets on paper.
What is the vision of Enterpirse Information Management?
Provide tools to empower users to exploit information in an enterprise wide environment
What type of Community of Practice workspace allows you to view its home page as well as all of its contents?
Open
What type of Community of Practice workspace allows you to view its home page, but not its content; as well as allowing you to check out the membership and purpose statement before applying for membership?
Restricted
A link class is a?
logical grouping of similar or related links
To keep a Community of Practice working smoothly you should not
approve new members to keep certain topics or areas up to date
Knowledge owners can maintain interest in a Community of Practice by doing all of the following except?
make all content available and do not delete old content
If you do not have a graphic or image uploaded to a SharePoint picture library and you want to load one, what is the next step?
On the site page, click the site actions menu, and then click the create link.
Sharepoint central administrators will set-up workflows, but are not capable of?
reassigning approvers
Who has full control over the SharePoint site when establishing a collaborative site?
Owners
What information architecture goal provides a corporate portal interface with the necessary breadth of information sources required withouth overwhelming the user with an overly complicated environment?
Taxonomy
Which Windows server special group contains only members who have logged on use an ordinary user account?
Authenticated
What SharePoint features are activated by default for all information stored in the central adminstration level of SharePoint?
Indexing and Search
What are the four classes of information in cognitive hierarchy?
Data , Information, Knowledge, Understanding
What must you do to data for it to become meaningful to the end user?
It must be processed and organized.
How is metadata used?
Used to describe how the data is structured using a prescriped syntax and to associate the data with semantics.
What is cognition?
The act of learning of integrating from various pieces of information.
What is the object of transparency?
To ensure that the process of transforming data into infomration used for decision making is traceable, auditable, and demonstrably proven, and making it authoritative (trustable)
Content delivery services deliver information assets to end users. These services can be of two types, what are they?
Core data services and aggregation services.
What does Services Oriented Enterprise Provide?
It provides a means of achieving IT agility and flexibility to support rapidly evolving mission processes and changing goals and objectives
How are data elements obtained?
Form data models and represent DOD data requirements
What is a standard?
A standard is defined as something that is measurable and repeatable.
What is data structure?
A specialized format for organizing and storing data.
How are data structures organized?
they are organized with the capability to request or query on the information necessary to fulfill a requirement.
What is a schema?
The structured description of the records is known as a schema.
What are physical data structures concerned with?
How data resides in a database.
Explain the difference between using linked and sequential lists?
Linked lists use pointers to identify the order of items; sequential lists use the natural order of items
What do logical data structures allow user to do?
View stored data in the database.
How do tables and view differ?
A database table is a set of data elements (values) that is organized using a model of horizontal rows and vertical columns. Views are also relational tables, but their data is calculated at query time.
Define the following parts of a hierarchical data structure: Parent node, Child Node, Root Node
Parent Node: The node on the top end of a branch. Child Node: the node on the bottom of the branch. Root node: A special type of parent node; the top of a hierarchical tree.
What is special about having a network data structure?
The relationship from child-to-parent and the relationship from parent-to-child can be one too many.
What must you ensure before installing any software product on an operational Air Force computer?
That local security officials have certificed and appropriate actions have been taken to ensure the security of the system will not be degraded by the addition of the new software programs.
What security features should security software implement?
to detwct and respond to unauthorized attempts to change, circumvent, or otherwise violate security features. The system should also abort/suspend the unauthorized activity and record the incident in the audit log.
What restriction applies to maintenance activities?
Restrict softare maintenance to authorized maintenance personnel with the appropriate security clearance.
Why should you perform a security audit trail?
To determine if the security features on your system are working.
What event are auditable?
Use of identification and authentication, user actions to create, modify, or delete program/files, actions taken by computer operators, system admins, and system security admins, any event that attempts to cahnge the security profile on the system, any events that attempt to violate the security policy of the systems.
What information should be recorded during the audit?
Type of event, date and time of the event, the unique identifier of the user or device generating the event, success or failure of the event, origin of the request for identification and authentication events, name of program/file introduced, accessed, or deleted.
How can you protect critical data against tampering?
Provide this protection by controlling physical acess to the AIS itself, by installing keyboard locks or other security mechanisms on the computer, or by establishing procedures requiring removal an secure storage or critical data from an unattended AIS.
List one important guideline for enhancing data security?
Backup critical files and software and storage apart from the immediate work area, establish contingency and recovery procedures, establish procedures for obtaining equipment maintenance when necessary and for confirming the clearance and identity of maintenance personnel, train all users on COMPUSEC awareness and local instructions.
What access controls can you apply to a database?What is the main purpose of a database?
Control access to files, segements, software, and devices so only authorized users, based on need to know, can use the system and data resources. Limit access to priviledge programs, utilities and data files.
Define Normalization
Normalization is the process of organizing data into tables in such a way that the results of using the database are unambiguous.
What is the main purpose of a database?
To makde data independent of the programs that use it.
Describe the first three normal forms.
First normal form: Each attribute of the entity occurs only once and there are no repeating groups of data. Second Normal form: An entity is in first normal form and each attribute is dependent on its entire primary key. Third normal form: An entity is in second normal form and no attribute of the entity is dependent on another non-key attribute.
What is data denormalization?
The process of deliberately violating data normalization techniques.
Who is responsible for the technical implementation and maintenance of the database?
Database Administrator
What permissions can the DBA grant?
Access, insert, delete, and modify existing data.
Name four functions a DBA performs.
Managing the database structure and the DBMS; the data activity; and maintaining the data repository.
What is the DBA's final responsibility when managing the database structure?
Updating the system documentation is the DBA's final responsibility when managing the database structure.
What are the symptoms of database fragmentation?
Slow response to on-line inquiries report extracts tha ttake longer than normal and abnormally large database files.
List the three steps or reorganization.
1: copy current records to another media. 2: Initialize the database. 3: Reload database.
In an effort to combat situations we have little control over power failures, floods, fires, etc. What should a DBA consider using?
Uninterruptable Power Supply (UPS)
To minimize database destruction how often should the database be backed up?
Daily, weekly, or monthly.
What is the purpose of the portal?
Be a major starting point for users when they connect to the web
What is a key enabler for the information technology task force?
Air Force Portal
What does the Air Force Portal provide as a key element in the Air Force Enterprise architecture?
Common virtual platform for access and sharing accurate information, a catalyst for reducing overlap and duplication among cross-functional information systems, and a means for doing self-service functions.
The air Force Portal covers the spectrum of air Force missions and processes to include what?
Business, combat support and command and control processes.
What is the most important part of the Air Force Portal initiative?
The user
What does single-sign on enable with the Air Force Portal?
To enter their passwords once and gain access to all their applications with no further log-in
Who works in collaboration with the content publishers to ensure information on the Air Force Protal is accurate and applicable with AFI's and Air Force Portal guidance?
Content Manager
Who is considered the "owner" of some amount of content on the Air Force Portal?
Content Publisher
Which form provides the ability to upload an individuals' biography with a picture or to manually type in all components to the form itself?
Biography
Which form provides the ability to create contact lists?
Point of Contact
Which form is used for uploading photos, clipart, and videos?
Multimedia
Which form is used for all types of content?
Editorial
Which form is used for compilling a list of links?
URL
What are the two main environments used to publish to the Air Force Portal?
Development and publishing
What is the Publishing Center Portal environment used for?
To enter data into inline publishing forms
What is the primary purpose of the Air Force Portal production environment?
Production. It is the "live" production environment
How many sections are on a landing page and what are the sections called?
There are 8 sections which consist of Page Tools, Header, Feature Portlet, Search, Block area, Left Navigational Pane, Contact the Content Manager, and Right Navigational Pane
What is the process of making content visible on the production environment on the Air Force Portal?
Deployment
Where must content be entered before it can be "deployed"?
Publishing center portal
What option to Content Publishers use to keep users from clicking on channels and programs that contain no content?
Off-line
What must you do to use image from the Air Force portal directory?
The images must have been uploaded prior to creating the document.
What form is used to include links on the Air Force Portal?
editorial Form
What is Hypertext Markup Language?
The set of markup symbols or codes inserted in a file intended for display on a Web browser page.
What are tags?
Markups that define the structure of the web page.
Home page files should be saved with what file extension?
.htm file extensions
What are three parts of the tables?
A row, a header to describe the data in the row or column and the data cell is a division of a row and contains table data.
When may you post personal information on publicly accessible DOD websites?
Unless clearly authorized by law and implementing regulation and policy
What must privacy and security notices clearly explain?
where the collection or sharing of certain information is voluntary, and notify users how to provide consent.
What is a Privacy Advisory?
it informs the individual why the information is solicited and how it will be used.
Describe knowledge management.
managing an organization's knowledge-level information in a way that allows easy, usable access by members for use in decision-making
What are the phases of knowledge management?
Knowledge creation; knowledge capture and transfer; and knowledge delivery
What are the two parts of Phase 1 Knowledge Creation?
data and information and knowledge
What is the result when information is organized and abstracted to produce something that is useful, predictive and expository to the decision maker?
knowledge
What are the two characterizations of Knowledge management capabilities?
Technical and organizational
What is a Technical Knowledge Management capability?
common collaborative capabilities and knowledge engines
Communities of Interest are a collaborative group of users that must exchange information in pursuit of what?
their shared goals, interests, missions, or business processes
what does KBO provide?
integrated process engineering and control and management disciplines
What are the goals of Knowledge Based Operations?
provide air, sea, and land forces, engaged in combat, immediate access to updated, tailored, and correlated data ensuring total battlespace awareness. Ensure the ability to discover, access, store, protect, share, and exploit mission level enterprise-level asset.
What does enterprise information management directly support?
Knowledge Based Operations
What is critical to building Air Force information superiority?
Accurate, timely, and relative information.
What principle describes business processes and logic to govern Air Force information?
Enterprise Information Management
What does a community of practice workspace provide?
A web based collaborative environment where members of a group use shared information and administrative and communications tools to conduct business, manage a project, keep abreast of important group issues, and solve group problems.
What area on the Air Force Portal does it describe the COP and its capabilities?
Help area.
What are the three community security practices?
open, restricted, and closed community
What should be created frist before creating any links?
link class
What is the role of the change agent?
educating COP users and recognizing COP contributors
What are the two techniques talked about to help maintain interest in a COP
to e-mail a link to a document that may interest a specific COP member or group, or encourage COP members to use the Altert feature
What can an implementation plan help with?
Assist the knowledge owner in the cultural change effort required to implement a COP
What is the first step if you do not have a graphic or image uploaded to a picture library?
On the site page, click the site actions menu, and then click the create link.
When copying the URL, what part of the URL do you need?
the relative URL
A library with a default document template of "none" can only store documents of what particular file type?
.jpg, .doc, .ppt, etc.
What are the four categories of lists and/or libraries?
libraries, tracking, communications, custom lists
After you create a new page what is your next step?
type a name and description for the list or library
In a library, what is the "default document template for the library" used for?
the template is used to create a new document when the user click s the new button in the library.
Who will set up all workflow settings?
central administrators
SharePoint helps establish a collaborative site to enable what?
manage content across their organizations
When a site is created, users can be added into what groups?
owners; members; approvers
What are the three templates used most often and the most useful?
team site; blank site, and wiki site
How do you modify a Web part?
go to the page that the web part is on and select site actions, edit page, click edit on the web part you wish to edit and then select modify shared Web part.
Who is responsible for managing the permission, rights, and access to the site?
central administration
What is the difference between "Everyone" and "Authenticated Users" group?
the authenticated users group contains only memebers who have actually logged on, using an ordinary user account.
What are some capabilities of the search functions?
search everywhere in SharePoint; search almost any content source outsdie SharePoint; search all MS Office file types by default; and the user profile properties will be indexed
What level is indexing and search features activated by default for all information stored in SharePoint?
central administration