Different storage volumes include:
A. Gigabyte
B. Petabyte
C. Perabyte
D. Exabyte
E. Tetrabyte
F. Terabyte
Please select the two classifications of database types:
A. Centralized
B. Generic
C. Distributed
D. MapReduce
Deliverables in the data quality context diagram include:
A. DQM Procedures
B. Data architecture
C. Data governance
D. DQ Policies and guidelines
E. Analyses from data profiling
F. Data quality Service Level Agreements
Data security issues, breaches and unwarranted restrictions on employee access to data cannot directly impact operational success.
A. TRUE
B. FALSE
Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.
A. TRUE
B. FALSE
The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.
A. TRUE
B. FALSE
Please select the correct General Accepted Information Principles:
A. Asset Principle
B. Audit Principle
C. Due Diligence Principle
D. Going Concern Principle
E. Ethical Principle
F. All of the above
Data integrity is the state of being partitioned – protected from being whole.
A. TRUE
B. FALSE
The Belmont principles that may be adapted for Information Management disciplines, include:
A. Respect for Persons
B. Respect for Machines
C. Beneficence
D. Criminality
E. Justice
A general principle for managing metadata includes Responsibility.
A. FALSE
B. TRUE
Deliverables in the data management maturity assessment context diagram include:
A. Maturity baseline
B. Roadmap
C. Executive briefings
D. Recommendations
E. Risk assessment
F. Ratings and ranks
The CAP theorem states that at most two of the three properties: consistency, availability and partition tolerance can exist in any shared data system.
A. TRUE
B. FALSE
Page 14 out of 40 Pages |
Previous |