Exam 5 - Technology Flashcards Preview

CRM Exam > Exam 5 - Technology > Flashcards

Flashcards in Exam 5 - Technology Deck (75)
Loading flashcards...
31

The main purpose of _____ is to enable an application to work better by preserving a history of Web pages a user had visited previously.
a) cookies
b) portals
c) attributes
d) categorization
e) taxonomies

a. cookies

32

A widely used coding scheme that specifies bit patterns for computer-processible information is:
a) HTML
b) ASCII
c) XML
d) JPEG
e) PDF

b. ASCII

33

File _____ software enables the user to visually organize file names and directories.
a) builder
b) optimization
c) manager
d) directory
e) audit

c. manager

34

A management information system designed to handle large volumes of routine, recurring actions is a(an) _____ system.
a) applications-processing
b) transaction-processing
c) operations-processing
d) executive support
e) routine support

b. transaction-processing

35

A(An) _____ specifies the location of publicly available information on the Internet.
a. search engines
b. uplink
c. URL
d. HTML
e. PDF

c. URL

36

_____ can cause internal computer power problems in an office.
a) A modem dysfunction
b) A circuit overload
c) Encryption
d) Pitted Disk Syndrome (PDS)
e) Dual core processors

b. a circuit overload

37

In addition to conformity with records retention schedules, a RIM audit may consider:
a) staffing numbers
b) security of records
c) RIM budget
d) disciplinary procedures
e) job descriptions

b. security of records

38

When evaluating a new ECM, the most important element to consider is the:
a) color of the source documents
b) location of existing records
c) effectiveness of the new system
d) intrinsic value of the records
e) amount of space saved

c. effectiveness of the new system

39

When using ____, physical storage spans multiple servers and the physical environment is typically owned and managed by a hosting company.
a) cloud storage
b) file share
c) ECM
d) record center
e) LAN

a. cloud storage

40

Some organizations make the decision not to map all ESI but only data they deem:
a) a risk to the organization
b) inactive
c) active
d) recoverable
e) professional in nature

a. a risk to the organization

41

Changes in _____ can render previously recorded information unusable.
a) migration
b) servers
c) software
d) retention
e) users

c. software

42

Categorization software products employ synonym lists, pattern matching algorithms, word clustering, and word _____ to analyze a document’s content and identify key words for indexing purposes.
a) dictionaries
b) proximities
c) images
d) counts
e) rules

b. proximites

43

ISO ______ is a framework of policies and procedures that includes all legal, physical, and technical controls involved in an organization's information risk management processes.
a) 15489
b) 74009
c) 89541
d) 27001
e) 26773

d. 27001

44

What type of photographic negative should never be frozen while attempting to stabilize water damage?
a) gelatin dry plates
b) collodion wet plates
c) acetate
d) nitrate
e) silver halide

a. gelatin dry plates

[plates have a photo on them so freezing it will separate the photo from the plate]

45

____ software typically has no licensing fee, is not proprietary, and permits users access to sources code.
a) Office suite
b) Wiki
c) Enterprise content management
d) Web 2.0
e) Open source

e) open source

46

A ______ is a digital audio file made available on the internet for downloading to a computer or mobile device.
a) voicemail
b) podcast
c) wiki
d) blog
e) firewall

b) podcast

47

Systems designed to create, manage, store, preserve, and deliver information in electronic form are:
a) ISO
b) ECM
c) SQL
d) RMA
e) ERP

b) ECM

48

In conducting a requirements analysis for ECM systems, the key departments involved should include: a) legal, marketing and sales
b) legal, compliance, RIM, and IT
c) library services, compliance, and marketing
d) human resources, compliance, and accounting
e) human resources, accounting and marketing

b) legal, compliance, RIM and IT

49

A(An) ____ microform scanner supports high-volume digitization of micro images.
a) production-level
b) reader-printer
c) microfilm reader
d) offline COM
e) enlarger printer

a) production-level

50

A web portal is an example of a(an):
a) method of content management
b) web page
c) integrated database
d) portable document format
e) convenience copy

b) web page

51

____ is used when there is no backward compatibility or an export/import gateway to move records from a legacy application to a new system.
a) Deletion
b) Copying
c) Migration
d) Reformatting
e) Transfer

c) Migration

52

For document security purposes, a thin label with a programmable integrated circuit and antenna is a ____ device.
a) radio frequency identification
b) barcode
c) magnetic tracking strip
d) range searching
e) remote diagnostic

a) radio frequency identification

53

A faint pattern added to a digital image for identification purposes is a:
a) document map
b) tag
c) watermark
d) markup
e) highlight

c) watermark

54

Virtual private networks are used by many businesses and government agencies because they provide:
a) free access to the internet
b) intranet technology
c) the ability to create virtual documents
d) website security
e) safe business to business transactions

e) safe business to business transactions

55

______ is the function of document imaging that requires the most planning, customization, and quality control.
a) Scanning
b) Indexing
c) Sorting
d) Filing
e) Batches

b) Indexing

56

Tasks associated with operating a document imaging system would not include:
a) indexing
b) document preparation
c) refiling
d) silver recovery
e) quality assurance

d) silver recovery

57

Converting hard copy records to an electronic format:
a) requires minimal technical expertise
b) ensures 100% retrieval ratio
c) eliminates the need for a retention schedule
d) will not be effective if there are non-standard sized documents
e) increases the speed of retrieval while decreasing storage space

e) increases the speed of retrieval while decreasing storage space

58

The investigative phase of litigation when the opposing party can obtain access to recorded information believed to be relevant to its case is:
a) spoliation
b) reference activity
c) court investigation
d) pre-trial discovery
e) continuity

d) pre-trial discovery

59

One of the most significant differences between Web 2.0 and traditional Web 1.0 is greater____ among internet users.
a) stability
b) collaboration
c) confidentiality
d) intelligence
e) privacy

b) collaboration

60

Transfer of record ownership takes place during the __________process.
a) Legal Review
b) Business Review
c) Disposition Review
d) Audit Review
e) Archive Review

e) archive review