Shared Flashcard Set

Details

KOM 5 Level CDCs Vol. 2 Unit 1
3D051 CDCs
41
Communication
Professional
08/13/2011

Additional Communication Flashcards

 


 

Cards

Term
What are the four classes of information in cognitive hierarchy?
Definition
Data, Information, Knowledge, Understanding.
Term
What must you do to data for it to become meaningful to the end user?
Definition
It must be processed and organized.
Term
How is metadata used?
Definition
Used to describe how the data is structured using a prescribed syntax and to associate the data with semantics.
Term
What is cognition?
Definition
The act of learning of integrating from various pieces of information.
Term
What is the objective of transparency?
Definition
To ensure that the process of transforming data into information used for decision making is traceable, auditable and demonstrably proven, and making it authoritative (trustable).
Term
Content delivery services deliver information assets to end users. These services can be of two types, what are they?
Definition
Core data services and aggregation services.
Term
What does Services Oriented Enterprise provide?
Definition
It provides a means of achieving IT agility and flexibility to support rapidly evolving mission processes and changing goals and objectives.
Term
How are data elements obtained?
Definition
From data models and represent DOD data requirements.
Term
What is a standard?
Definition
A standard is defined as something that is measurable and repeatable.
Term
What is data structure?
Definition
A specialized format for organizing and storing data.
Term
How are data structures organized?
Definition
They are organized with the capability to request or query only the information necessary to fulfill a requirement.
Term
What is a schema?
Definition
The structured description of the records is known as a schema.
Term
What are physical data structures concerned with?
Definition
How data resides in a database.
Term
Explain the difference between using linked and sequential lists.
Definition
Linked lists use pointers to identify the order of items; sequential lists use the natural order of items.
Term
What do logical data structures allow users to do?
Definition
View stored data in the database
Term
How do tables and views differ?
Definition
A database table is a set of data elements (values) that is organized using a model of horizontal rows and vertical columns. Views are also relational tables, but their data is calculated at query time.
Term
Define the following parts of a hierarchical data structure: Parent node.
Definition
The node on the top end of a branch.
Term
Define the following parts of a hierarchical data structure: Child node
Definition
The node on the bottom of the branch.
Term
Define the following parts of a hierarchical data structure: Root node.
Definition
A special type of parent node; the top of a hierarchical tree.
Term
What is special about having a network data structure?
Definition
The relationship from child-to-parent and the relationship from parent-to-child can be one too many.
Term
What must you ensure before installing any software product on an operational Air Force computer?
Definition
That local security officials have certified that appropriate actions have been taken to ensure the security of the system will not be degraded by the addition of the new software programs.
Term
What security features should security software implement?
Definition
To detect and respond to unauthorized attempts to change, circumvent, or otherwise violate security features. The system should also abort/suspend the unauthorized activity and record the incident in the audit log.
Term
What restriction applies to maintenance activities?
Definition
Restrict software maintenance to authorized maintenance personnel with the appropriate security clearance.
Term
Why should you perform a security audit trail?
Definition
To determine if the security features on your system are working.
Term
What events are auditable?
Definition
Use of identification and authentication, user actions to create, modify, or delete programs/files, actions taken by computer operators, system administrators, and system security administrators, any event that attempts to change the security profile of the system, any events that attempt to violate the security policy of the systems.
Term
What information should be recorded during the audit?
Definition
Type of event, date and time of the event, the unique identifier of the user or device generating the event, success or failure of the event, origin of the request for identification and authentication events, name of program/file introduced, accessed, or deleted.
Term
How can you protect critical data against tampering?
Definition
Provide this protection by controlling physical access to the AIS itself, by installing keyboard locks or other security mechanisms on the computer, or by establishing procedures requiring removal and secure storage or critical data from an unattended AIS.
Term
List one important guideline for enhancing data security.
Definition

Backup critical files and software and store apart from the immediate work area, establish contingency and recovery procedures,

establish procedures for obtaining equipment maintenance when necessary and for confirming the clearance and identity of maintenance personnel,

train all computer users in COMPUSEC awareness and local instructions,

establish software configuration control procedures for critical systems.

Term
What access controls can you apply to a database?
Definition
Control access to files, segments, software, and devices so only authorized users, based on need to know, can use the system and data resources. Limit access to privileged programs, utilities, and data files to system management personnel. Limit the capability to conduct privileged actions to system management personnel.
Term
What is the main purpose of a database?
Definition
To make data independent of the programs that uses it.
Term
Define normalization.
Definition
Normalization is the process of organizing data into tables in such a way that the results of using the database are unambiguous.
Term
Describe the first three normal forms.
Definition

First normal form: Each attribute of the entity occurs only once and there are no repeating groups of data.

 

Second normal form: An entity is in first normal form and each attribute is dependent on its entire primary key.

 

Third normal form: An entity is in second normal form and no attribute of the entity is dependent on another non-key attribute.

Term
What is data denormalization?
Definition
The process of deliberately violating data normalization techniques.
Term
Who is responsible for the technical implementation and maintenance of the database?
Definition
Database Administrator.
Term
What permissions can the DBA grant?
Definition

Access, insert, delete, and modify existing data.

Term
Name four functions a DBA performs.
Definition
Managing the database structure and the DBMS; the data activity; and maintaining the data repository.
Term
What is the DBA’s final responsibility when managing the database structure?
Definition

Updating the system documentation is the DBA’s final responsibility when managing the database structure.

Term
What are the symptoms of database fragmentation?
Definition
Slow response to on-line inquiries, report extracts that take longer than normal and abnormally large database files.
Term
List the three steps of reorganization.
Definition

(1) Copy current records to another media.

(2) Initialize database.

(3) Reload database.

Term
In an effort to combat situations we have little control over (i.e. power failures, fires, or flood) what should a DBA consider using?
Definition
Uninterruptable power supply (UPS).
Term
To minimize database destruction how often should the database be backed up?
Definition
Daily, weekly, or monthly.
Supporting users have an ad free experience!