DAT-325 Module 3 Quiz - Attempt 1

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

325

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

3

Uploaded by SuperHumanOyster2735

Question 1 6.2 / 6.2 points Which of the following is an example of a stakeholder? Select one. Data owner Data engineer Marketing analyst ® ) VP of sales ¥ Hide question 1 feedback A stakeholder is generally defined as someone who uses information and data to inform decisions, and this person is usually outside of the day-to-day work. Question 2 6.2/ 6.2 points What is a top data security challenge? Select one. Access management o Data leak protection Email protection Physical security ¥ Hide question 2 feedback While there are many data security challenges for organizations to consider, data leaks are considered one of the top security challenge due to so much big data and emerging technology. Question 3 6.2 / 6.2 points Which two functions often work together for requirements, collection, and maintenance? Select one. IT and engineering © IT and business Business and engineering Business, engineering, and IT W Hide question 3 feedback In a data analyst’s day-to-day work, collaboration between departments is often necessary. Business functions require data to measure progress, and information technology departments often collect and maintain this data. Question 4 6.2 / 6.2 points Which job role works to allow others to consume the data? Select one. Business manager o Data broker Data producer Data owner ¥ Hide question 4 feedback While many parties have a role in the management of data, data brokers ensure that data is consumable for use by defining and maintaining data rules.
Question 5 6.2 / 6.2 points What is a popular data security method? Select one. Password protection Single person with access Single access point ® Encryption ¥ Hide question 5 feedback Encryption is typically used for maintaining data security. Other methods help to protect information and are important considerations. Question 6 6.2 / 6.2 points Whose job is it to ensure data security? Select one. Data management Data security Security engineer o Everyone ¥ Hide question 6 feedback While a security engineer and data management professionals can put measures in place that help to maintain data security, many people at any given organization typically have access to personal data. It is everyone’s responsibility to ensure that data is secure. Question 7 6.2 / 6.2 points What is a popular reference for data management? Select one. The internet The data lifecycle The supply chain life cycle o The Data Management Body of Knowledge (DMBOK) ‘¥ Hide question 7 feedback The DMBOK is a comprehensive guide to data management best practices. Question 8 6.2 / 6.2 points Why is data security important? Select one. It isn't a top priority. It protects the company. o It ensures data is only seen and used by those who are allowed. It protects people's jobs. W Hide question 8 feedback Data security is important to ensure that people’s personal data is used by only those who have been allowed to use the information for a specific purpose.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: For two events A and B, P(A) = 0.55, P(B) = 0.40, and P(A & B) = 0.22. Are A and B independent?
Q: For the given functions f and g, find the following. For parts (a-d), also find the domain.…
Q: Submit through Canvas as indicated. T u = (2,-5) and v= −3i+7j
Q: When the current through a circular loop is 14 A, the magnetic field at its center is 4 x 10-4 T.…
Q: Use mathematical induction to prove the statement is true for every positive integer n. 4+8+12+ + 4n…
Q: d. e. -90++72) af At time = 2 is the particle moving to the right or to the left? Justify your…
Q: Binary number to Hexadecimal number? (1101 1001 1011 0011)2
Q: The equation of the horizontal asymptote is -12-10 4-6 .
Q: A stone with mass m = 2 g at the end of a massless string is swinging in a circle of radius R = 1.8…
Q: What is the present value of a property now if its future value is predicted to be $7,500,000 at the…
Q: How would you suggest he begin to make a decision about where he would like to work and what setting…
Q: c class Assignment7 { /** * You do NOT need to make any changes to the main method. You need to…
Q: Rogers Inc. is considering expanding into the sports drink business with a new product.  Assume that…
Q: 2. If A = {1, 2,) and B = {2, 3, 5}, then the union of A and B is none of these O (1, 3, 5) O [2] O…
Q: 19. Find the radius of convergence and the interval of convergence of the power series ∞0 n=1 (x-4)"…
Q: Part II While HeapSort (as we saw in Studio 6) is more amenable than MergeSort to an in-place…
Q: (e) Assume the price of y increases to 4. Find the total, income and substitution effects for x.…
Q: cell bodies of pre ganglionic parasympathetic neurons are found in cervical spinal cord lumbar…
Q: There are different types of power that you have as a manager, or as a leader. Where you derive your…
Q: Hi. Can you please help? I'm stuck. Thanks! When you titrate 25.0mL of 0.100 M HCl with 0.100 M…
Q: (root5-i)^8
Q: (at distance R from the center of the earth; M denotes the mass of the earth). 6. The approximation…