Term
| What are the four classes of information in cognitive heirarchy? |
|
Definition
| Data, information, knowledge, understanding |
|
|
Term
| What must you do to data for it to become meaningful to the end user? |
|
Definition
| It must be processed and organized |
|
|
Term
|
Definition
| Used to describe how the data is structured using a prescribed syntax and to associate the data with semantics |
|
|
Term
|
Definition
| The act of learning of integrating from various pieces of information |
|
|
Term
| What is the objective of transparency? |
|
Definition
| To ensure the process of transforming data into information used for decision making is traceable, auditable and making it authoritative (trustable) |
|
|
Term
| Content delivery services deliver information assets to end users. These services can be of two types, what are they? |
|
Definition
| Core data services and aggregation services |
|
|
Term
| What does Services Oriented Enterprise provide? |
|
Definition
| It provides a means of achieving IT agility and flexibility to support rapidly evolving mission processes and changing goals and objectives |
|
|
Term
| How are data elements obtained? |
|
Definition
| From data models and represent DOD data requirements |
|
|
Term
|
Definition
| A standard is defined as something that is measureable and repeatable |
|
|
Term
| What is a data structure? |
|
Definition
| A specialized format for organizing and storing data |
|
|
Term
| How are data structures organized? |
|
Definition
| They are organized with the capability to request or query only the information necessary to fulfill a requirement |
|
|
Term
|
Definition
| The structured description of the records is known as a schema |
|
|
Term
| What are physical data structures concerned with? |
|
Definition
| How data resides in a database |
|
|
Term
| Explain the difference between using linked and sequential lists: |
|
Definition
| Linked lists use pointers to identify the order of the items; Sequential lists use the natural order of items |
|
|
Term
| What do logical data structures allows users to do? |
|
Definition
| What do logical data structures allows users to do? |
|
|
Term
| How do tables and views differ? |
|
Definition
| A database table is a set of data elements (values) that is organized using a model of horizontal rows and vertical columns. Views are also relational tables, but their data is calculated at query time |
|
|
Term
| Define the "Parent Node" part of the heirarchical data structure: |
|
Definition
| The node on the top end of a branch |
|
|
Term
| Define the "Child Node" part of the heirarchical data structure: |
|
Definition
| The node on the bottom of the branch |
|
|
Term
| Define the "Root Node" part of the heirarchical data structure: |
|
Definition
| A special type of parent node; the top of a hierarchical tree |
|
|
Term
| What is special about having a network data structure? |
|
Definition
| The relationship from child-to-parent and the relationship from parent-to-child can be one too many |
|
|
Term
| What must you ensure before installing any software product on an operational AF computer? |
|
Definition
| That local security officials have certified that apporopriate actions have been taken to ensure the security of the system will not be degraded by the addition of the new software programs |
|
|
Term
| What security features should security software implement? |
|
Definition
| To detect and respond to unauthorized attempts to change, circumvent, or otherwise violate security features. The system should also abort/suspend the unauthorized activity and record the incident in the audit log |
|
|
Term
| What restriction applies to maintenance activities? |
|
Definition
| Restrict software maintenance personnel with the appropriate security clearance |
|
|
Term
| Why should you perform a security audit trail? |
|
Definition
| To determine if the security features on your system are working |
|
|
Term
| When events are auditable? |
|
Definition
| Use of identification and authentication, user actions to create, modify or delete programs/ files, actions taken by computer operations, system administrators, and system security administrators, any events that attempts to change the security profile of the system, any events that attempt to violate the security policy of the systems |
|
|
Term
| What information should be recorded during the audit? |
|
Definition
| Type of events, date and time of the event, the unique identifier of the user of device generating the event, success or failure of the event, origin of the request for identification and authentification events, name of the program/file introduced, accessed or deleted |
|
|
Term
| How can you protect critical data against tampering? |
|
Definition
| Provide this protection by controlling physical access to AIS itself, by installing keyboard locks or other security mechanisms on the computer, or by establishing procedures requiring removal and secure storage or critical data from an AIS |
|
|
Term
| List one important guideline for enhancing data secuirty: |
|
Definition
| Backup critical files and software and store apart from the immediate work area, establish contingency and recovery procedures, establish procedures for obtaining equiptment maintenance when necessary and for confirming the clearance and identity of maintenance personnel, train all computer users in COMPUSEC awareness and local instructions, establish software configuration control procedures for critical systems |
|
|
Term
| What access controls can you apply to a database? |
|
Definition
| Control access to files, segments, software, and devices so only authorized users, based on need-to-know, can use the system and data resources. Limit access to privleged programs, utilities, and data files to system management personnel. Limit the capability to conduct privleged actions to system management personnel |
|
|
Term
| What is the main purpose of a database? |
|
Definition
| To make data independent of the programs that uses it |
|
|
Term
|
Definition
| The process of organizing data into tables in such a way that the results of using the database are unambiguous. |
|
|
Term
| Describe the first three normal forms: |
|
Definition
a) FIRST: each attribute of the entity occurs only once and there are no repeating groups of data b) SECOND: an entity is in first normal form and each attribute is dependent on its entire primary key c) THIRD: an entity is in second normal form and no attribute of the entity is dependent on another non-key attribute |
|
|
Term
| What is data denormalization? |
|
Definition
| The process of deliberately violating data normalization techniques |
|
|
Term
| What is data denormalization? |
|
Definition
| The process of deliberately violating data normalization techniques |
|
|
Term
| Who is responsible for the technical implementation and maintenance of the database? |
|
Definition
|
|
Term
| What permissions can the DBA grant? |
|
Definition
| Access, insert, delete and modify existing data |
|
|
Term
| Name four functions a DBA performs: |
|
Definition
| Managing the database structure and the DBMs; the data activity, and maintaining the data repository |
|
|
Term
| What is the DBA's final responsibility when managing the database structure? |
|
Definition
| Updating the system documentation is the DBA's final responsibility when managing the database structure |
|
|
Term
| What are the symptoms of database fragmentation? |
|
Definition
| Slow response to on-line inquirements, report extracts that take longer that normal and abnormally large database files |
|
|
Term
| List the three steps of reorganization: |
|
Definition
(1) Copy current records to another media (2) Initialize database (3) Reload Database |
|
|
Term
| In an effort to combat situations we have little control over (i.e power failures, fires, or floods) what should a DBA consider using? |
|
Definition
| Uninterruptable Power Supply (UPS) |
|
|
Term
| To minimize database destruction how often should the database be backed up? |
|
Definition
|
|
Term
| In the context of cognitive hieracrchy, what information is analyzed to provide meaning and value, or evaluated as to implications for the operation? |
|
Definition
|
|
Term
| In the context of cognitive hieracrchy, what is knowledge that has been synthesized and judgement applied to it in a specific situation to comprehend the situation's inner relationships? |
|
Definition
|
|
Term
| Data analyzed describes what level of the cognitive heiracarchy? |
|
Definition
|
|
Term
| Knowledge combined with judgement and experience describes what level of the cognitive heirarchy? |
|
Definition
|
|
Term
| What objectives will the maturation of the services oriented architecture directly support? |
|
Definition
| Secretary of the Air Force |
|
|
Term
| What is the data element? |
|
Definition
| Physical representation of data entity attribute |
|
|
Term
| What term is a structured description of recods used to describe database objects representations, and the relationships among them? |
|
Definition
|
|
Term
| When storing data structures a group of ordered data items or elements defines what type of list? |
|
Definition
|
|
Term
| What term do you use to address the data item instead of addressing the entire size of the data item? |
|
Definition
|
|
Term
| What term describes a set of data elements or values organized by using a model of horizontal rows and vertical columns? |
|
Definition
|
|
Term
| A tree structure within a hierarchical data structure is best used to display database records that have what type of fields? |
|
Definition
|
|
Term
| Another data structure name for a network that is similar to a tree structure is called a: |
|
Definition
|
|
Term
| Who must test and certify user-developed software before installing it on an automated information system? |
|
Definition
|
|
Term
| One method to provide protection of critical data against tampering is to control the physical access to the automated information system itself by: |
|
Definition
| Installing keyboard locks |
|
|
Term
| One method a database administrator can maintain database access control is to limit a user access to: |
|
Definition
| Use the least privlege concept |
|
|
Term
| The main purpose of a database is to: |
|
Definition
| Make data independent of its programs |
|
|
Term
| What term best describes the process of organizing data into tables that result in the database being unambiguous as intended? |
|
Definition
|
|
Term
| What database normalization form has a type of entity dependency called transitive dependency? |
|
Definition
|
|
Term
| What term best describes the redundant storing of the customer name in the purchase order entity? |
|
Definition
|
|
Term
| What method is used by a database administrator to manage the updating of information on an enterprise's computer system? |
|
Definition
|
|
Term
| The database maintenance responsibility that addresses disk fragmentation is: |
|
Definition
|
|
Term
| What causes database fragmentation? |
|
Definition
| Database becoming logically unorganized |
|
|
Term
| The database maintenance responsibility that maintains a collection of metadata, DBMS, software, code libraries, and editing tools is managaing: |
|
Definition
|
|
Term
| What is the purpose of a portal? |
|
Definition
| Be a major starting point for users when they connect to the web |
|
|
Term
| What is a key enabler for the information technology task force? |
|
Definition
|
|
Term
| What does the Air Force portal provide as a key element in the AF enterprise architecture? |
|
Definition
| Common virtual platform for access sharing accurate information, a catalyst for reducing overlap and duplication among cross-funtional information systems, and a means for self service functions |
|
|
Term
| The AF Portal covers the spectrum of AF missions and processes to include what? |
|
Definition
| Business, combat support and command and control processes |
|
|
Term
| What is the most important part of the Air Portal initiative? |
|
Definition
|
|
Term
| What does single-sign-on enable with the Air Force Portal? |
|
Definition
| To enter their passwords once and gain access to all their applications with no further log-in |
|
|
Term
| Who works in collaboration with the content publishers to ensure information on the Air Force Portal is accurate and applicable with AFIs and Air Force Portal guidance? |
|
Definition
|
|
Term
| Who is considered the "owner" of some amount of content on the Air Force Portal? |
|
Definition
|
|
Term
| Which form provides the ability to upload an individual's biography with a picture or to manually type in all components to the form itself? |
|
Definition
|
|
Term
| Which form provides the ability to create contact lists? |
|
Definition
|
|
Term
| Which form is used for uploading photos, clipart, and videos? |
|
Definition
|
|
Term
| Which form is used for all types of content? |
|
Definition
|
|
Term
| Which form is used for compiling a list of links? |
|
Definition
|
|
Term
| What are the two main environments used to publish to the Air Force Portal? |
|
Definition
| Developement and Publishing |
|
|
Term
| What is the Publishing Center Portal environment used for? |
|
Definition
| To enter data into online publishing forms |
|
|
Term
| What is the primary purpose of the Air Force Portal production environment? |
|
Definition
| Production. It is the "live" production environment |
|
|
Term
| How many sections are on a landing page and what are the sections called? |
|
Definition
| There are 8 sections which consists of: (1)Page tools, (2)Header, (3)Feature portlet, (4)Search, (5)Block area, (6)Left navigational pane, (7)Contact the content manager, and (8)Right navigational pane |
|
|
Term
| What is the process of making content visible on the production environment on the Air Force Portal? |
|
Definition
|
|
Term
| Where must content be entered before it can be "deployed"? |
|
Definition
| Publishing Center Portal (PCP) |
|
|
Term
| What option do Content Publishers use to keep users from clicking on channels and programs that contains no content? |
|
Definition
|
|
Term
| What must you do to use images from the Air Force Portal directory? |
|
Definition
| The images must have been uploaded prior to creating the document |
|
|
Term
| What form is used to include links on the Air Force Portal? |
|
Definition
|
|
Term
| What is Hypertext Markup Language? |
|
Definition
| The set of symbols or codes inserted in a file intended for display on a web browser page |
|
|
Term
|
Definition
| Markups that define the structure of the web page |
|
|
Term
| Home page files should be saved with what file extension? |
|
Definition
|
|
Term
| What are the three parts of the tables? |
|
Definition
| (1) A row, (2) A header to describe the data in the row or column, and (3) the data cell is a division of a row and contains table data |
|
|
Term
| When may you post personal information on publicy accessible DOD websites? |
|
Definition
| Unless clearly authorized by law and implementing regulation and policy |
|
|
Term
| What must privacy and security notices clearly explain? |
|
Definition
| Where the collection or sharing of certain information is voluntary, and notify users how to provide consent |
|
|
Term
| What is a Privacy Advisory? |
|
Definition
| It informs the individual why the information is solicited and how it will be used |
|
|
Term
| Describe Knowledge Management: |
|
Definition
| Managing an organization's knowledge level informtion in a way that allows easy, usable access by memebers for use in decision making |
|
|
Term
| What are the phases of Knowledge Management: |
|
Definition
| (1)Knowledge creation; (2)Knowledge capture and transfer; and (3)Knowledge delivery |
|
|
Term
| What are the two parts of Phase 1 - Knowledge Creation? |
|
Definition
| Data Information and Knowledge |
|
|
Term
| What is the result when information is organized and abstracted to produce something that is useful, predictive and expository to the decision maker? |
|
Definition
|
|
Term
| What are the two characterizations of Knowledge management capabilities? |
|
Definition
| Technical and organizational |
|
|
Term
| What is a Technical Knowledge Management capability? |
|
Definition
| Common collaborative capabilities and knowledge engines |
|
|
Term
| Communities of Interest are a collaborative group of users that must exchange information in pursuit of what? |
|
Definition
| Their shared goals, interests, missions, or business processes |
|
|
Term
| What does KBO (Knowledge Based Operations) provide? |
|
Definition
| Integrated process engineering and control and management disciplines |
|
|
Term
| What are the goals of Knowledge Based Operations |
|
Definition
(1) Provide air, sea and land forces, engaged in combat, immediate access to updated, tailored, and correlated data ensuring total battlespace awareness. (2)Manage all data, information, and knowledge as an Air Force enterprise-level asset (3)Ensure the ability to discover access, store, protect, share and exploit mission-critical information regardless of its physical location, media, source owner, or other defining characteristics (4)Implement automated life-cycle management mechanisms for information (5)Minimize the effort required by personnel and applications to conduct KOM activities |
|
|
Term
| What option is not a key element in the Air Force enterprise architecture of the Air Force Portal? |
|
Definition
| Means for faster reliable service |
|
|
Term
| Who is the most important part of the Air Force Portal initiative? |
|
Definition
|
|
Term
| Who oversees organization's implementation of the Air Force Portal program? |
|
Definition
|
|
Term
| Who ensures the links in your web site are maintained and in working order? |
|
Definition
|
|
Term
| Which content publishing form is used to complete other forms as well as for its own uses? |
|
Definition
|
|
Term
| What environment do you use to enter or edit content into in-line publishing forms? |
|
Definition
|
|
Term
| What environment does all Air Force users see when they sign on to the Air Force Portal? |
|
Definition
| Air Force Portal production |
|
|
Term
| Content must be entered into what environment before it can be deployed? |
|
Definition
|
|
Term
| When you click the "Insert" button to import graphics the: |
|
Definition
| insert/edit image widget closes |
|
|
Term
| What must you do as a Content Publisher for a user to use images from the Air Force Portal directory? |
|
Definition
| The images must have been uploaded to the Air Force Portal directory prior to creating the document |
|
|
Term
| What is the highest -level element in a basic web document? |
|
Definition
|
|
Term
| What section is where all content to include text and more HTML code for formatting is placed in a basic web document? |
|
Definition
|
|
Term
| What does the Privacy Advisory on public web sites inform users about? |
|
Definition
| Why the information is solicited and how it will be used |
|
|
Term
| When may For Official Use Only material be placed on an Internet web site? |
|
Definition
| Only if access to the site is limited to a specific target audience and the information is encrypted or password protected |
|
|
Term
| Knowledge information implementation does not lead to: |
|
Definition
| Restricting that knowledge accross your organization |
|
|
Term
| "Knowledge results when information is organized and abstracted to produce something that is useful, predictive and expository to the decision-maker," describes which phase of knowledge management? |
|
Definition
|
|
Term
| "To use and exploit tacit information, the objective is not to explicitly capture knowledge for the purpose of managing it, but to provide capabilities which allow airmen to reach knowledge experts or centers of professional expertise," describes which phase of knowledge management? |
|
Definition
|
|
Term
| "Technologies and processes enable efficient and targeted workflows, dynamic subscription, proactive push, smart pull, and cross-mission collaboration," describes which phase of knowledge management? |
|
Definition
|
|
Term
| When Communities of Interest are formed, they will NOT initially focus on developing: |
|
Definition
| Locations for implementation |
|
|
Term
| Which information using assets do knowledge based operations manage in an integrated environment? |
|
Definition
| People, processes, and tools |
|
|
Term
| What goal is NOT one of Knowledge Based Operations? |
|
Definition
| Increase the creation of official Air Force information assets on paper |
|
|
Term
| What does enterprise information management directly support? |
|
Definition
| Knowledge Based Operations |
|
|
Term
| What is critical to building Air Force information superiority? |
|
Definition
| Accurate, timely and relevant information |
|
|
Term
| What principle describes business processes and logic to govern Air Force information? |
|
Definition
| Enterprise information management |
|
|
Term
| What does a community of practice workspace provide? |
|
Definition
| A web-based collaborative environment where members of a group use shared info and administrative and communications tools to conduct business, manage and project, keep abreast of important group issuse, and solve group problems |
|
|
Term
| What area on the Air Force Portal does it describe the COP and its capabilities? |
|
Definition
|
|
Term
| What are the three community security practices? |
|
Definition
| Open, Restricted and Closed community |
|
|
Term
| What should be created first before creating any links? |
|
Definition
|
|
Term
| What is the role of the change agent? |
|
Definition
| Educating COP users and recognizing COP contributes |
|
|
Term
| What are the two techniques talked about to help maintain interest in a COP? |
|
Definition
| To email a link to a document that may interest a specific COP member or group, or encourage COP members to use the Alert feature |
|
|
Term
| What can an implementation plan help with? |
|
Definition
| Assist the knowledge owner in the cultural change effort required to implement a COP |
|
|
Term
| What is the first step if you do not have a graphic or image uploaded to a picture library? |
|
Definition
| On the site page, click the site actions menu, and then click the create link |
|
|
Term
| When copying the URL, what part of the URL do you need? |
|
Definition
|
|
Term
| A library with a default document template of "non" can only store documents of what particular file type? |
|
Definition
|
|
Term
| What are the four categories of lists and/or libraries? |
|
Definition
| (1)Libraries, (2)tracking, (3)communications, (4)custom lists |
|
|
Term
| After you create a new page what is your next step? |
|
Definition
| Type a name and description for the list or library |
|
|
Term
| In a library, what is the "default document template for the library" used for? |
|
Definition
| The template is used to create a new document when the user clicks the new button in the library |
|
|
Term
| Who will set up all workflow settings? |
|
Definition
|
|
Term
| SharePoint helps establish a collaborative site to enable what? |
|
Definition
| Manage content accross their organizations |
|
|
Term
| When a site is created, users can be added into what group? |
|
Definition
| Owners, members, approvers |
|
|
Term
| What are the three templates used most often and the most useful? |
|
Definition
| (1)Team site; (2)Blank site; and (3)Wiki site |
|
|
Term
| How do you modify a web part? |
|
Definition
| Go to the page that the web part is on and select SITE ACTIONS, EDIT PAGE, click EDIT on the web part you wish to edit and then select modify shared web part |
|
|
Term
| Who is responsible for managing the permission, rights, and access to the site? |
|
Definition
|
|
Term
| What is the difference between "Everyone" and "Authenticated Users" group? |
|
Definition
| The Authenticated users group contains only memebers who have actually logged on, using an ordinary user account. Wheras "Everyone" also contains any type of connected session that does not require explicit log on |
|
|
Term
| What are some capabilities of the search functions? |
|
Definition
| Search everywhere in Sharepoint; Search almost any content source outside of Sharepoint; Search all MS office file types by default; and the user profile properties will be indexed. |
|
|
Term
| What level is indexing and search features activated by default for all information stored in Sharepoint? |
|
Definition
|
|
Term
| What is the vision of Enterprise Information Mangement? |
|
Definition
| Provide tools to empower users to exploit information in an enterprise-wide environment |
|
|
Term
| What type of COP workspace allows you to view its home page as well as ALL of its contents? |
|
Definition
|
|
Term
| What is the vision of Enterprise Information Management? |
|
Definition
| Provide tools to empower users to exploit information in an enterprise-wide environment |
|
|
Term
| What type of Community of Practice workspace allows you to view its home page as well as ALL of its contents? |
|
Definition
|
|
Term
| What type of COP workspace allows you to view the home page, but not its content; as well as allowing you to check out the membership and purpose statement before applying for membership? |
|
Definition
|
|
Term
|
Definition
| Logical grouping of similar or related links |
|
|
Term
| To keep a COP working smoothly you should NOT: |
|
Definition
| approve new members to keep certain topics or areas up to date |
|
|
Term
| Knowledge owners can maintain interest in a COP by doing all of the following except: |
|
Definition
| Make all content available and do not delete old content |
|
|
Term
| If you do not have a graphic image uploaded to a SharePoint picture library and you want to load one, what is the next step? |
|
Definition
| On the site page, click the site actions menu, and then click the create link |
|
|
Term
| Sharepoint Central administrators will set-up workflows, but are NOT capable of: |
|
Definition
|
|
Term
| Who has full control over the Sharepoint site when establishing a collaborative site? |
|
Definition
|
|
Term
| What information architecture goal provides a corporate portal interface with the necessary breadth of information sources required without overwhelming the user with an overly complicated environment? |
|
Definition
|
|
Term
| Which Windows server special group contains only members who have logged on using an ordinary user account? |
|
Definition
|
|
Term
| What SharePoint features are activated by default for all information stored in the central administration level of sharepoint? |
|
Definition
|
|