Term
| What are the Four classes of information in the cognitive hierarchy? |
|
Definition
| Data, Information, Knowledge, Understanding. |
|
|
Term
| What must you do to data for it to become meaningful to the end user? |
|
Definition
| It must be processed & organized |
|
|
Term
|
Definition
| Used to describe how the data is structured using a prescribed Syntax & to describe the data with Semantics. |
|
|
Term
|
Definition
| The act of learning of Intergrating from various pieces of information. |
|
|
Term
| What is the objective of Transparency? |
|
Definition
| To Ensure that the process or Transforming data into information used for decision making is traceable, auditable & demonstably Proven & making it authorative. |
|
|
Term
| Content delivery Services Deliver Inromation assest to END users. These Services can be of Two types, what are they? |
|
Definition
(1) Core data Services
(2)Aggregation Services |
|
|
Term
| What does Service Oriented Enterprise Provide? |
|
Definition
| It Provides a means of achieving IT agility & flexibility to support rapidly evolving mission processes & changing goals & objectives. |
|
|
Term
| How are data elements obtained? |
|
Definition
| From data models & represent DoD data requirements. |
|
|
Term
|
Definition
| Something that is measurable & repeatable. |
|
|
Term
| What is a data structure? |
|
Definition
| A Specialized format for Organizing & Storing data. |
|
|
Term
| How are data structures organized? |
|
Definition
| They are Organized with the capability to request or query only the information necessary to fulfill a requiremnet. |
|
|
Term
|
Definition
| The Structure description of the records is known as a Schema. |
|
|
Term
| What are Physical data strucures concerned with? |
|
Definition
| How data resides in a database. |
|
|
Term
| Explain the difference between using Linked and Sequential lists. |
|
Definition
(1) Linked Lists use Pointers to identify the Order of Items.
(2) Sequential lists use the Natural Order of Items. |
|
|
Term
| What do Logical Data Structures allow users to do? |
|
Definition
| View Stored Data in the database. |
|
|
Term
| How do Tables and View Differ? |
|
Definition
(1) Database Table- a Set of data Elements that is Organized using a model of Horizontal Rows & Vertical Columns.
(2) Views- Are also relational tables, but their data is calculated at query time. |
|
|
Term
Define the Following Parts of a Hierarchial Data Structure:
Parent Node:
Child Node:
Root Node: |
|
Definition
Parent Node: The Node on the TOP END of the branch.
Child Node: The Node on the BOTTOM of the Branch.
Root Node: A Special type of Parent node, the TOP of the hierarchial Tree. |
|
|
Term
| What is Special about having a network data structure? |
|
Definition
The relationship from Child-to-Parent
The Relationship from Parent-to-child
Can be 1 too many.. |
|
|
Term
| What must you ensure before installing any software product on an operational Air Force Computer? |
|
Definition
| That local Security Officials have Certified that appropriate actions have been taken to ensure the security of the system will not be degrated by adding new software programs. |
|
|
Term
| what Security Features should Security Software Implement? |
|
Definition
| To detect & Respond to Unauthorized attempts to change, circumvent, or otherwise violate security features. The system should also abort/Suspend the unathorized activity & record the incdent in the audit log. |
|
|
Term
| What Restriction applies to maintenance activities? |
|
Definition
| Restrict Software maintenance Personnel with the appropriate Security clearance. |
|
|
Term
| Why Should You perform Security audit Trail? |
|
Definition
| To determine if the security features on your system are working. |
|
|
Term
| What Events are Auditable? |
|
Definition
(1)Use of identification & autherntication,
(2)user actions to create, modify, or delete programs/files,
(3)Actions taken by computer opertors,
System security administrators,
(4)any event that attempts to change the security profile of the system,
(5)any events that attempt to violate the security policy of the systems. |
|
|
Term
| What information should be recorded during the audit? |
|
Definition
| Type of event, date & time of the event, the unique identifier of the user or device generating the event success or failure of the event. |
|
|
Term
| How can you protect critical data against tampering? |
|
Definition
| Provides proection by installing keyboard locks or other files & security mechanisms on the computer, or establishes procedures requiring removal & secure storage or critical data from an unattended AIS. |
|
|
Term
| List one Important guideline for enhancing data security. |
|
Definition
| Backup critical files and software & store apart from the immediate work area, establish contingency & recovery procedures,establish procedures for obtaining equipment maintenance when necessary and for confirming the clearance & identity of maintenance personnel, train all computer users in COMPUSEC awareness & local instructions,establish software configuration control porcedures for critical systems. |
|
|
Term
| What access controls can you apply to a database? |
|
Definition
| files, segments, need-to-know, can use the system & data resources. |
|
|
Term
| What is the main purpose of a database? |
|
Definition
| To make data independent of the programs that uses it. |
|
|
Term
| Define data denormalization: |
|
Definition
| The process of deliberatly violating data normalization techniques. |
|
|
Term
| Who is responsible for the technical implementation & maintenance of the database? |
|
Definition
|
|
Term
| What Permissions can the DBA grant? |
|
Definition
| Access, insert, delete, and modify existing data. |
|
|
Term
|
Definition
| The process of organizing data into tables in shuch a way that the results of using the database are unambigous. |
|
|
Term
| Name four functions a DBA performs |
|
Definition
| Managing the datbase structure and the DBMs; the dara activity, and mainiting the data repository. |
|
|
Term
| What is the dBA's final responsibility when managing the database structure. |
|
Definition
| Updating the system documentation is the DBA's final responsibility when managing the database. |
|
|
Term
| List 3 Steps of Reorganization: |
|
Definition
Copy current records to another media,
initialize database,
reload database. |
|
|
Term
| In an effort to Combat sistuations we have little control over (i.e. Power failures,fires, or flood) what should a DBA consider using? |
|
Definition
| Uniterruptable Power Supply (UPS) |
|
|
Term
| To Minimize database destruction how often should the database be back up? |
|
Definition
|
|
Term
| What is the Purpose of a portal? |
|
Definition
| Be a major point for users when the connect to the web. |
|
|
Term
| What is a key enabler for the information technology task force? |
|
Definition
|
|
Term
| What does the Air Force Portal provide as a key element in the Air Force Enterprise Architecture? |
|
Definition
| Common virtual platform for access and sharing accurate information, a catalyst for reducing overlap and duplication among cross-function information systems, and a means for doing self-service functions. |
|
|
Term
| The Air Force Portal covers the spectrum of the Air Force Missions and Processes to include what? |
|
Definition
| Business, Combat support, and command and control processes. |
|
|
Term
| What is the most important part of the Air Force Portal intiative? |
|
Definition
|
|
Term
| What does single-sign-on enable with the Air Force Portal? |
|
Definition
| To enter their passwords once and gain access to all their applications with no further log-in. |
|
|
Term
| Who works in collaboration with the content publisher to ensure information on the Air Force Portal is accuration and applicable with AFIs and the Air Force Portal guidance? |
|
Definition
|
|
Term
| Who is considered the "owner" of some of the amount of content on the Air Force Portal? |
|
Definition
|
|
Term
| Which form provides the ability to upload an individual's biography with apicture or to manually type in all components to the form iself? |
|
Definition
|
|
Term
| Which form provides the ability to create contact lists? |
|
Definition
|
|
Term
| Which form is used for uploading photos, clipart, and videos? |
|
Definition
|
|
Term
| Which Form is used for all types of content? |
|
Definition
|
|
Term
| Which form is used for compiling a list or links? |
|
Definition
|
|
Term
| What are 2 main environments used to publish to the Air Force Portal? |
|
Definition
|
|
Term
| What is the Publishing Center Portal environment used for? |
|
Definition
| To enter data into inline publishing forms. |
|
|
Term
| What is the Primary purpose of the Aif Force Portal Production enviornment? |
|
Definition
| Production. It is the "Live" production environment. |
|
|
Term
How many sections are on a landing page and what are the sections called? |
|
Definition
8 page tools, header, feature portlet, search, block area, left navigational pane, contact the content manager, and right navigational pane |
|
|
Term
What is the process of making content visible on the production environment on the Air Force Portal? |
|
Definition
|
|
Term
Where must content be entered before it can be deployed? |
|
Definition
|
|
Term
What option do content publishers use to keep users from clicking on channels and programs that contains no content? |
|
Definition
|
|
Term
What must you do to use images from the Air Force Portal directory? |
|
Definition
Images must have been uploaded prior to creating the document |
|
|
Term
What form is used to include links on the Air Force Portal? |
|
Definition
|
|
Term
What is Hypertext Markup Language? |
|
Definition
The set of markup symbols or codes inserted in a file intended for display on a web browser page |
|
|
Term
|
Definition
Markups that define the structure of the Web page |
|
|
Term
Home page files should be saved with what file extension? |
|
Definition
|
|
Term
What are the three parts of the tables? |
|
Definition
A row, a header to describe the data in the row or column & the data cell is a division of a row & contains table |
|
|
Term
When may you pos personal information on publicly accessible DOD websites? |
|
Definition
Unless clearly authorized by law & implementing regulation & policy |
|
|
Term
What must privacy and security notices clearly explain? |
|
Definition
Where the collection or sharing of certain information is voluntary & notify users how to provide consent |
|
|
Term
What is a Privacy Advisory? |
|
Definition
It informs the individual why the information is solicited & how it will be used |
|
|
Term
Describe knowledge management? |
|
Definition
Managing an organization’s knowledge-level information in a way that allows easy, unable access by members for use in decision-making |
|
|
Term
What are the phases of knowledge management? |
|
Definition
Knowledge creation; knowledge capture and transfer; and knowledge delivery |
|
|
Term
What are the two parts of Phase 1 Knowledge Creation? |
|
Definition
Data & information & knowledge |
|
|
Term
What is the result when information is organized and abstracted to produce something that is useful, predictive and expository to the decision-maker? |
|
Definition
|
|
Term
What are the two characterizations of knowledge management capabilities? |
|
Definition
Technical and organizational |
|
|
Term
What is a Technical Knowledge capability? |
|
Definition
Common collaborative capabilities and knowledge engines |
|
|
Term
Communities of interest are a collaborative group of users that must exchange information in pursuit of what? |
|
Definition
Their shared goals, interests, missions or business process |
|
|
Term
|
Definition
Integrated process engineering & control & managing disciplines |
|
|
Term
What are the goals of Knowledge Based Operations? |
|
Definition
Provide, air, sea, and land forces, engaged in combat, immediate access to updated, tailored, and correlated data ensuring total battlespace awareness. Manage all data, information, and knowledge as an Air Force enterprise-level asset. Ensure the ability to discover, access, store, share, and exploit mission-critical information regardless of its physical location, media, source, owner, or other defining characteristics. Implement automated life cycle management mechanisms for information. Minimize the effort required by personnel and applications to conduct IM activities. Reduce or eliminate the creation of official Air Force information assets on paper; and reduce existing repositories of paper records |
|
|
Term
What does enterprise information management directly support? |
|
Definition
Knowledge Based Operations |
|
|
Term
What is a critical to building Air Force information superiority? |
|
Definition
Accurate, timely, & relevant information |
|
|
Term
What principle describes business processes and logic to govern Air Force information? |
|
Definition
Enterprise Information Management |
|
|
Term
What does a community of practice workspace provide? |
|
Definition
|
|
Term
What area on the Air Force Portal does it describe the COP and its capabilities? |
|
Definition
|
|
Term
What are the three community security practices? |
|
Definition
(1) Open (2) restricted (3) closed community |
|
|
Term
What should be created first before creating any links? |
|
Definition
|
|
Term
What is the role of the change agent? |
|
Definition
Educating COP users & recognizing COP contributors |
|
|
Term
What are the two techniques talked about to help maintain interest in a COP? |
|
Definition
To e-mail a link to a document that may interest a specific COP member or group or encourage COP |
|
|
Term
What can an implementation plan help with? |
|
Definition
Assist the knowledge owner in the cultural change effort required to implement a COP |
|
|
Term
What is the first step if do not have a graphic or image uploaded to a picture library? |
|
Definition
Click site actions menu & then click create link |
|
|
Term
When copying the URL, what part of the URL do you need? |
|
Definition
|
|
Term
A library with a default document template of “none” can only store documents of what particular file type? |
|
Definition
|
|
Term
What are the four categories of lists and/or libraries? |
|
Definition
(1) Libraries (2) tracking (3) communications (4) custom list |
|
|
Term
After you create a new page what is your next step? |
|
Definition
Type a name & description for the list or library |
|
|
Term
In a library, what is the “default document template for the library” used for? |
|
Definition
The template is used to create a new document when the user clicks the new button in the library |
|
|
Term
Who will set up all workflow settings? |
|
Definition
|
|
Term
SharePoint helps establish a collaborative site to enable what? |
|
Definition
Manage content across their organizations |
|
|
Term
When a site is created, users can be added into what groups? |
|
Definition
Owners; members; approvers |
|
|
Term
What are the three templates used most often and the most useful? |
|
Definition
(1) Team site (2) blank site (3) Wiki site |
|
|
Term
How do you modify a Web part? |
|
Definition
Go to the page that the Web part is on and select site actions, edit page, click edit on the Web part you wish to edit and then select modify shared Web part |
|
|
Term
Who is responsible for managing the permission, rights, and access to the site? |
|
Definition
|
|
Term
What is the difference between “Everyone” and “Authenticated Users” group? |
|
Definition
Authenticated Users group contains only members who have actually logged on, using an ordinary user account |
|
|
Term
What are some capabilities of the search functions? |
|
Definition
Search everywhere in SharePoint; search almost any content source outside SharePoint; search all MS office file types by default; and the user profile properties will be indexed |
|
|
Term
What level is indexing and search features activated by default for all information stored in SharePoint? |
|
Definition
|
|