Types of hierarchical taxonomies-about IG Reference Model

Assignment Help Basic Computer Science
Reference no: EM132358702

1. According to recent surveys regarding Big Data and its impacts, approximately................... percent of information stored in organizations has real business value, while................ percent must be kept as business records and about............... percent is retained due to a litigation hold

A. 25, 5, 2

B. 25, 5, 1

C. 1, 5, 25

D. None of the above.

2. The ...............................is a visual planning tool created by EDRM.net to assist in identifying and clarifying the stages of the e-discovery process?

A. E-Discovery Reference Model

B. Information Management Protocol

C. Guidelines for E-Discovery Planning

D. A. None of the above

3. What is the ITIL?

A group of metrics that govern the program

A set of process-oriented best practices

Focuses on value delivery

All of the above

4. Which one of the following is TRUE about the IG Reference Model?

A. Linking duty + policy integration = efficient, effective management

B. Linking duty + value to information asset = Unified governance, effective management

C. Linking duty + value to information asset = efficient, effective management

D. All of the above

5. TRUE or FALSE: Managing e-records is primarily a legal issue, especially for public and heavily regulated companies

True

False

6. Two of the of the biggest threats of social media use for organizations come from the lack of a ..........................., and threats presented by...............................?

A. Social media commitment, employee use

B. Social media policy, employee use

C. No IG policy, employee use

D. None of the above

7. According to one of the chapter reading, e-mails can be looked as often shot out in the heat of the battle, most times the e-mail messages are evidence of a ..................... in lawsuits and investigations

A. Smoking gun

B. Steaming gun

C. Hot gun

D. Smoking topic

8. Which one of the following is TRUE about the IG Reference Model?

A. Linking duty + policy integration = efficient, effective management

B. Linking duty + value to information asset = Unified governance, effective management

C. Linking duty + value to information asset = efficient, effective management

D. All of the above

9. Microsoft's SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edited by Smallwood research indicated that, previous to SharePoint solutions were somewhat__________,_____________, and _____________ efforts for each business applications.

A. Cumbersome, managed large quantities of documents, and required less extensive implementation

B. Cumbersome, managed large quantities of documents, and required extensive implementation.

C. Easy to use, managed large quantities of documents, and required less extensive implementation

D. All of the above.

10. TRUE or FALSE: A folksonomy uses free-form words to classify documents. It's an approach useful for updating an individual's taxonomy structure and improves the user search experience.

True

False

11. TRUE or FALSE: From one of our chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.

True

False

12. TRUE or FALSE: According to Franks and Smallwood (2013), information has not become the lifeblood of every organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis

True

False

13. In one of our case studies regarding SharePoint, the authors indicated that for SharePoint deployments, "an ounce of prevention truly is worth a pound of cure." Why was that?

A. SharePoint was only a TOOL, and a panacea for poor IG, and simply deploying it will resolve business issues or compliance problems

B. Since every SharePoint environment includes corporate information, organizations could avoid a lot of headaches and possibly future IG risks if they DIDN'T invest time and deliberation in PLANNING how they will deploy SharePoint

C. Since every SharePoint environment includes corporate information, organizations could avoid a lot of headaches and possibly future IG risks if they invested time and deliberation in PLANNING how they will deploy SharePoint

D. Both A and C

14. Looking forward with SharePoint, the authors concluded that there was going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements. For this to be achievable, the chapter identified one most important consideration that must be met. What was that consideration?

A. Never worry about the level of LTDP maturity was appropriate, achievable, and affordable for the organization and to begin working methodically toward a goal for the good of the organization and its stakeholders over the long-term

B. Determination that the level of LTDP maturity was appropriate, achievable, and affordable for the organization and to begin working methodically toward a goal for the good of the organization and its stakeholders over the long term.

C. Organizations should focus on what is doable over the next 10 to 20 years rather than the next 50 to 100 years

D. Both B and C

15. There are three (3) basic types of hierarchical taxonomies, and they are?

A. The subject, business, and functional

B. Controlled, uncontrolled, and functional

C. Subject, ISO, and ANSI

D. ECM, ERM, and Business

16. Why has the e-mail become a critical component of the IG implementation process?

A. e-mail can be the leading piece of evidence requested during discovery phases of civil trials

B. e-mail cannot be the leading piece of evidence requested during discovery phases of civil trials

C. It's a ubiquitous business communication tool and a leading piece of evidence that can be requested at civil trials

D. both A and C

17. IT governance seeks to align business objectives with IT strategy to deliver.....................?

A. Business value

B. Business agenda

C. Business metrics

D. None of the above

18. Information Governance (IG) consists of?

A. the overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives;

B. established frameworks and best practices to gain the most leverage and benefit out of IT investments and support accomplishment of business objectives;

C. the processes, methods, and techniques to ensure that data is of high quality, reliable, and unique (not duplicated), so that downstream uses in reports and databases are more trusted and accurate

D. All of the above

19. The principles of successful IG programs are emerging, and they include executive sponsorship, and.................., .................., .................., ..............., ..............., ............, ............, .................., and ...............?

A. Information classification, integrity, security, accessibility, control, monitoring, auditing, policy development, and continuous metrics

B. Information classification, integrity, security, personally identifiable information, control, monitoring, auditing, policy development, and continuous improvement

C. Information classification, integrity, security, accessibility, control, monitoring, auditing, policy development, and continuous improvement

D. Both A and B

20. Maintaining the IG program requires that a senior-level officer of the enterprise continues to push for __________, _______________, and ___________ of the program to secure and control information

A. Enforcement, improvement, expansion

B. Business plans, industry best practices, changing technology

C. Enforcement, business plans, expansion

D. None of the above

21. The following are reasons why many organizations are trying to reduce and right-size their information foot-print by using data governance techniques like data cleansing and de-duplication:

A. improve data quality and reduce redundancies, reduce increased and staggering storage management costs,

B. reduce the risk of systems failures due to overloading

C. Both A and B

D. None of the above

22. Creating a ........................ is a basic building block in an ..................... that assists business executives understand the risks associated with stated business objectives.

A. Risk profile, Enterprise Risk Management

B. ISO 9000, Heat map

C. Risk Profile, Framework

D. All of the above

23. A good data governance framework ensures that downstream negative effects of poor data are avoided and that subsequent reports, analyses, and conclusions are based on______________________?.

A. Reliable, and trusted data

B. Frequently Accessed data

C. Unreliable and trusted data

D. All of the above

24. According to a survey research of 2013, the results of that research indicated that........................of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact.

A. 3/5

B. 2/5

C. 1/3

D. 2/3

25. One of the ten IG principles is a Continuous improvement. What is the importance of this principle to the organization program?

A. Provide periodic program review and necessary adjustment against gaps and or shortcomings

B. Ensure guidelines and policies are being followed to measure employee compliance

C. Document management and report management software must be deployed for control

D. None of the above

Reference no: EM132358702

Questions Cloud

Net exception error by default : Network administrators and architects can be reliant on PowerShell to manage larger networks. Why does PowerShell return a .NET exception error by default?
What have you learned from value-based healthcare model : What have you learned from Value-Based Healthcare Model? How does your article ties to the value-based and evidence-based models of healthcare?
Their traditional lines of vehicles with all electric models : Suppose organization wants to replace one of their traditional lines of vehicles with all electric models. How could organization assess major risks to dicision
Describe two techniques criminals : Describe two techniques criminals can use to gather the information they need to steal an identity. Describe two ways a person can protect their identity.
Types of hierarchical taxonomies-about IG Reference Model : Which one of the following is TRUE about the IG Reference Model? There are three (3) basic types of hierarchical taxonomies, and they are?
Introduced the impact of the global digital divide : Introduced the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world's ICT capabilities encounter
Research on the internet about the most power mainframes : Research on the Internet about the most power mainframes. Pick one mainframe computer and list its spec and state what it is used for.
Increasing utilization of ICT in eGovernance : Explain how eParticipation is Increasing utilization of ICT in eGovernance. Information Technology Importance in Strategic Planning.
What is project management and elements of project : A project can be of three types-materials management, service management or both. What is Project Management? What are the Elements of a Project? What is Scope?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd