5 c h a p t e r organized data and information. data – a necessity for almost any enterprise to...
TRANSCRIPT
55
C H A P T E R
OrganizedOrganized Data Data and Informationand Information
Data
• Data–A necessity for almost any enterprise to carry out
its business. Consists of raw facts, and when organized may be transformed into information.
• Database• A collection of data organized to meet users’
needs
Data Management
• In order to manage data it must be organized.• It is organized in a hierarchy.
The Hierarchy of Data
Database
Files (TABLES)
Records
Fields
Characters
Checking Account FilesSavings Account FilesLoan Account Files
27439, Smith, Joe, 453.21, 1-3-9834278, Watt, Carol, 212.54, 2-6-9943872, Yos, Tom, 3224.87, 3-8-97
27439, Smith, Joe, 453.21, 1-3-98
Smith (Last Name)
(S = 01010011 in ASCII)
The Hierarchy of Data
CharacterBasic building block of information, represented by a byte.
FieldA group of characters.
RecordA collection of related fields.
FileA collection of related records.
DatabaseA collection of integrated and related files.
How Characters are Stored
Codes for Storing DataASCII• American Standard Code for Information Interchange.• 8 bit code. (256 characters can be represented).• In the early years of computers, it was the most popular code but it was limited to how many characters it could represent. ASCII is still very much used today but it has be extended from 8 bits
to 16 bits. With 16 bits, over 65,536characters can be represented.
How Characters are Stored
Codes for Storing DataCharacter ASCII
A 01000001B 01000010...Z 01011010
0 001100001 00110001...9 00111001
How Characters are Stored
Codes for Storing DataUNICODE• UNICODE: Universal Code.• Today, it is the most popular code.• Used by most computer manufactures.• 16 bit code. (65,536 characters can be represented)
• A 16 bit code will allow for other languages to be represented in the code, not just English.
How Characters are Stored
Codes for Storing DataCharacter UNICODE
A 0000000001000001B 0000000001000010...Z 0000000001011010
0 00000000001100001 0000000000110001...9 0000000000111001
Note that the right-m
ost
bits are ASCII w
ithin
UNICODE. Note the
red bits.
The Traditional Approach to Data Management
• The Traditional Approach–Separate files are created and stored for
each application program.–Very common from the 50’s through the
80’s.
Data FilesApplication
ProgramReports
The Traditional (File Oriented) ApproachBanking Example
Smalltown National Bank1965
The Traditional (File Oriented) ApproachBanking Example
CheckingFiles
CheckingPrograms
CheckingReports
SavingsFiles
SavingsPrograms
SavingsReports
LoanFiles
LoanPrograms
LoanReports
CheckingFiles
CheckingPrograms
CheckingReports
SavingsFiles
SavingsPrograms
SavingsReports
LoanFiles
LoanPrograms
LoanReports
The Traditional (File Oriented) Approach
PROBLEMS
(1) DATA REDUNDANCY•Same data stored on different files.
•Name is on checking, savings, and loan files.•Address is on checking, savings, and loan files.•Telephone number is on checking, savings, and loan files.
CheckingFiles
CheckingPrograms
CheckingReports
SavingsFiles
SavingsPrograms
SavingsReports
LoanFiles
LoanPrograms
LoanReports
The Traditional (File Oriented) Approach
PROBLEMS
DATA REDUNDANCY CAUSES:•Unnecessary data entry.•Duplicated data on one file may not get changed on another file
during an update or deletion.•Leads to a lack in DATA INTEGRITY.
CheckingFiles
CheckingPrograms
CheckingReports
SavingsFiles
SavingsPrograms
SavingsReports
LoanFiles
LoanPrograms
LoanReports
The Traditional (File Oriented) Approach
PROBLEMS
(2) DATA INTEGRITY•Data redundancy leads to a lack of data integrity.•Lack of data integrity = errors in database
CheckingFiles
CheckingPrograms
CheckingReports
SavingsFiles
SavingsPrograms
SavingsReports
LoanFiles
LoanPrograms
LoanReports
The Traditional (File Oriented) Approach
PROBLEMS
(3) LACK OF DATA INTEGRATION•With separate file systems, it is difficult to produce reports which require data from separate file systems.
•EXAMPLE: The bank manager might want a report showing the names of customers who use all the bank's services: checking, savings and loans.
•In order to collect this information for a report, a separate computer program would need to be written and this take time.
CheckingFiles
CheckingPrograms
CheckingReports
SavingsFiles
SavingsPrograms
SavingsReports
LoanFiles
LoanPrograms
LoanReports
The Traditional (File Oriented) Approach
PROBLEMS
(4) PROGRAM-DATA DEPENDENCE•If the size of a field in a record changes, all the programs which access that record must be modified.
•EXAMPLE: When ZIP codes changed from 5 digits to 9 digits, all programs which accessed ZIP codes had to be modified.
Note: When the ZIP code changed, millions of programs needed to be changed in corporations, governments, etc.
CheckingFiles
CheckingPrograms
CheckingReports
SavingsFiles
SavingsPrograms
SavingsReports
LoanFiles
LoanPrograms
LoanReports
The Traditional (File Oriented) Approach
SUMMARY
(1) CAUSES DATA REDUNDANCY.(2) LACKS DATA INTEGRITY.(3) LACKS DATA INTEGRATION.(4) CAUSES PROGRAM-DATA DEPENDENCY.
The Database Approach
• The Database Management System Approach– A pool of related data is shared by multiple application
programs. Rather than having separate data files, each application uses a collection of data that is either joined or related in the database.
– A DBMS “knows” everything about the data on thehard storage drive/s, and has complete control over it.
LoanProgramsReports
Reports
ReportsAll Data
CheckingPrograms
SavingsPrograms
DatabaseManagement
System
DBMS Hard drive/s
Advantages to the Database Approach
• Improved strategic use of corporate data• Reduced data redundancy• Improved data integrity• Easier modification and updating• Data and program independence• Better access to data and information• Standardization of data access• A framework for program development• Better overall protection of the data• Shared data and information resources
Disadvantages to the Database Approach
• Increased vulnerability. Unauthorized people hack into databases on a regular bases.
• Foolishly, employees place databases on their laptops which are stolen when left in cars or unattended at coffee shops. LoJack Tracking Software
LoJack Video 2min cc (Good)LoJack Video 4min cc (Very Good)
Kensington Lock
• Great for coffee shops
• The cable is retractable. Just
wrap the cable around a table
post and into the Kensington port on your
computer; then lock the cable into the port.
$39 to $21
Ken
sing
ton
port
Database Terms
TABLES (Also called ENTITIES)– A generalized class of people, places, things, or
events (objects) about which data are collected, stored, and maintained.
AttributesCustomer name, Employee name
Employees Checking Stocks Executives Students
Customers Patients Books Inventory
CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011
Database TermsFIELDS (Also called ATTRIBUTES)
• An Field is a property of an Table.
Checking Table
Fields
CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011
Database TermsRECORDS Consist of one or more related Fields in a Table
Checking TableThree records in a Table
CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011
Database Terms
.
PRIMARY KEY• A field or set of fields that UNIQUELY identifies the record.
• Account Number is the only UNIQUE field in this record.
Primary Key
CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011
Database Terms
.
SECONDARY KEY• A Key which is NOT a primary key.
How much money do I have inmy checking account?I can’t remember my checkingaccount number, but my lastname is Yos.
CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011
Database Terms
.
KEY• A field or set of fields that is used to identify a record or records.• It is possible to search for any record using any of these five fields.
Keys
CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011
Database Terms
.
DATA ITEM• A specific value of an Field.
Data Item(Examples)
Database Terms
.
DATA MODELING• This is map or diagram of entities and their relationships.• These maps or diagrams show the how the database is organized.• A popular diagramming technique is called “entity-relationship diagram.”• A MODEL of the database is constructed before the actual database is designed. One popular modeling method is calledan entity-relationship diagram.
Entity-relationship diagram
Database Terms
Entity-relationship diagram
Student CourseTakesClass
Major
Name
ID
Name
Dept
Section
1 N
Relation-shipEntity Attribute
Entity Relationship (ER) Diagram for a Customer Ordering Database
31
Attributes
Entities
Relationship: Each Customermay order many of the Product
(Tables)
(Properties)
A Relational Data Model• Relational Data Model– All data elements are placed in two-
dimensional tables, called relations, that are the logical equivalent of files.
32
313-46-2007
412-48-1778
543-56-8876
Relational Database Terms• Joining
– Data manipulation that combines two or more tables.– These three tables can be joined using a common field such as Dept.
number.– Example: Using Project number (155) we can find out
the description of the project and for what department theproject was conducted.This can be done easily even though the data is within twoseparate files.
– See the next slide to see how easy joining can be done usinga query language called SQL. (Pronounce S-Q-L or “sequel”)SQL is in all database management systems, including Access.
33
313-46-2007
412-48-1778
543-56-8876
Database Terms
.
SELECT DESCRIPTION, DEPT NAME
FROM PROJECT, DEPARTMENT
WHERE PROJECT NUMBER = 155 AND PROJECT.DEPT NUMBER =
DEPARTMENT.DEPT NUMBER
PAYROLL
ACCOUNTING
313-46-2007
412-48-1778
543-56-8876
Dept NumberDept Number
SQL EXAMPLE:
•This example shows how to join two
tables using SQL in order to find the Project name and the
Department in which the Project was conducted.
• Note that the Description of the project (Payroll) was in the Project table and the Dept Name
(Accounting) was in the Department table.
• The tables were joined using
the Dept Number field.
Result
Database Terms
.
Database Terms
.
Database Terms
.
Distributed Database• A database in which the actual data may be spread across several smaller databases connected via telecommunications devices.
Database Terms
Data Warehouse
• A relational database management system.
• Designed SPECIFICALLY to support management decision making.
• Does NOT meet the needs of a TPS.
• Contains massive amounts of current and historical data.
Database Terms
Looks as if we should relocate our
manufacturing facility to China.
Data Mining• AUTOMATED discovery of patterns and relationships
in a data warehouse.• Uses advanced statistical techniques and machine learning.• Used to predict as well as discover.• Data Mining the Internet is now being used by some
companies to predict the future.
Database Terms
Look. I think we are experiencing a large increase in credit card fraud.
Data Modeling and Database Models
• Data Model– A map or diagram of entities and their
relationships.• Enterprise Data Modeling– Data modeling done at the level of the
entire organization.• Entity-Relationship (ER) diagrams– A data model that uses basic graphical
symbols to show the organization of and relationships between data.
Sample Test Questions DBMS
42
Database1.In the SQL statement below, which item is an
entity? SELECT EMPLOYEE-NUMBERFROM EMPLOYEEWHERE SALARY > 20,000a. SALARYb. EMPLOYEEc. EMPLOYEE-NUMBERd. a and be. a, b, and c
Sample Test Questions DBMS
43
2. Which item below is most closely associated
with changing the zip code from 5 to 9 digits
in a file-oriented database? a.Program-data dependenceb.Data integrityc. Data redundancyd.Data integratione. None of the above
Sample Test Questions DBMS
44
3. When designing a database, which item below would most likely be used to show the logical relationships among data?
a. Access 2003
b. Entity-relationship diagrams
c. Data Manipulation Language (DML)
d. System Flowcharts
e. Data Definition Language (DDL)
Sample Test Questions DBMS
45
4. What is the main use for data warehouses?
a. To meet the needs of day-to-day transaction processing.
b. To support the needs of management decision making.
c. To store all of a company’s transactions.
d. None of the above
Sample Test Questions DBMS
46
5. Which system below would be best for detecting credit card transactions which are likely to be fraudulent?
a. Data mining
b. Pattern analysis
c. Pattern mining
d. Data Marting
e. Transaction processing system
Sample Test Questions DBMS
47
6. What database model places data in two-dimensional tables?
a. relational
b. network
c. hierarchical
Sample Test Questions DBMS
48
7. In order to do a "join" in a relational database, it is necessary to have:
a. some data redundancy.
b. some program-data dependency.
c. some errors in the database
d. None of the above
Sample Test Questions DBMS
49
8. This type of database key must be unique:a. Primary Keyb. Secondary Keyc. Tertiary Keyd. a and ce. a, b, and c
Sample Test Questions DBMS
50
9. With this database configuration, the files are placed in multiple locations within the organization.a. Centralized configurationb. Distributed configurationc. Hierarchical configurationd. a and ce. b and c
Sample Test Questions DBMS
51
10. This term refers to linking two or more tables together using a common attribute (column).
a. Joining
b. Parsing
c. Gluing
d. Connecting
Sample Test Questions DBMS
52
11. Data in a database are organized in (best answer)
a. a hierarchy
b. a record
c. in ASCII
d. in a file
e. in UNICODE
Sample Test Questions DBMS
53
12. Modern databases like ACCESS 2007 use
this code to store characters (best answer):
a. Baudit
b. ACSII
c. UNICODE
d. Morris Code
Sample Test Questions DBMS
54
13. UNICODE allows for the storage of how
many different characters?
a. 128
b. 256
c. 512
d. 1024
e. 65, 536
Sample Test Questions DBMS
55
14. UNICODE eliminated ASCII completely in
its bit string?
a. True
b. False
Sample Test Questions DBMS
56
15. Modern DBMS eliminate all data
redundancy?
a. True
b. False
Sample Test Questions DBMS
57
16. To much data redundancy usually leads to
a. data integrity problems.
b. data integration problems.
c. errors in the database
d. a and c
e. None of the above
Sample Test Questions DBMS
58
17. In a traditional file-oriented approach
separate computer programs were required to do queries across two or more files?
a. True
b. False
Sample Test Questions DBMS
59
18. In a traditional file-oriented database
approach, changing a ZIP code from five digits to nine digits was a problem due to issues caused by:
a. data redundancy.
b. data integrity.
c. lack of data integration.
d. program-data dependency.
Sample Test Questions DBMS
60
19. In a traditional file-oriented database
approach, changing a ZIP code from five digits to nine digits was a problem due to issues caused by:
a. data redundancy.
b. data integrity.
c. lack of data integration.
d. none of the above
Sample Test Questions DBMS
61
20. Which item/s below is/are problem/s caused
by a file-oriented approach?
a. data redundancy
b. a lack of data integrity
c. a lack of data integration
d. program-data dependency
e. all of the above
Sample Test Questions DBMS
62
21. DBMS stands for
a. database management system
b. database movement system
c. database manager system
d. database major system
Sample Test Questions DBMS
63
22. A DBMS can be thought of as a software
system that “knows” everything about the data on the storage drive/s and has complete control over them?
a. True
b. False
Sample Test Questions DBMS
64
23. Which methods for security for a laptop
were mentioned in class?a. Kensington Lockb. LoJack Tracking softwarec. Norton Security Systemd. McAfee Security Systeme. a and b
Sample Test Questions DBMS
65
24. This is a generalized class of people, things,
or events (objects) about which data are collected, stored, and maintained.a. Entitiesb. Attributesc. Primary keyd. Secondary keye. Data Item
Sample Test Questions DBMS
66
25. This is a generalized class of people, things,
or events (objects) about which data are collected, stored, and maintained.a. Data Item b. Attributesc. Primary keyd. Secondary keye. None of the above
Sample Test Questions DBMS
67
26. Examples of Entities in a DBMS would be
a. Employeesb. Checkingc. Savingsd. Bookse. all of the above
Sample Test Questions DBMS
68
27. Last name in a DBMS would be an example
ofa. an entityb. an attributec. a fieldd. a recorde. b and c
69
Sample Test Questions DBMS
28. An example of a primary key in a DBMS
would bea. last nameb. first namec. middle named. account number
70
Sample Test Questions DBMS
29. The most popular way for modeling a
database involves usinga. a physical modelb. a narrative modelc. entity-relationship diagramsd. a mathematical model
71
Sample Test Questions DBMS
29. It is possible to search for a record in a
database using attributes such asa. keysb. recordsc. entitiesd. characters
72
Sample Test Questions DBMS
30. In an entity-relationship model the symbol
below is for a/an
a. keysb. relationshipsc. entitiesd. attributes
73
Sample Test Questions DBMS
31. In an entity-relationship model the symbol
below is for
a. keysb. relationshipsc. entitiesd. attributes
74
Sample Test Questions DBMS
32. In an entity-relationship model the symbol
below is for
a. keysb. relationshipsc. entitiesd. attributes
75
Sample Test Questions DBMS
33. In an entity-relationship model the symbol
below is used to indicate what type of relationship between database objects?
a. 1 to 1b. 1 to 3c. 1 to Nd. 1 to Manye. c and d are both correct
76
Sample Test Questions DBMS
34. It is impossible to setup a relational data
model without adding some
a. data redundancyb. errors into the databasec. redundant attributes across tablesd. a and c
77
Sample Test Questions DBMS
35. In order to do a “join” in a DBMS we must
have some
a. data redundancy.b. errors in the database.c. redundant attributes across two or more tables.d. a, b, and c
78
Sample Test Questions DBMS
36. In the SQL statement below, what are
PROJECT and DEPARTMENT?SELECT DESCRIPTION, DEPT NAME
FROM PROJECT, DEPARTMENT
WHERE PROJECT NUMBER = 155 AND PROJECT.DEPT NUMBER = DEPARTMENT.DEPT NUMBER
a. Entitiesb. Attributesc. Relationshipsd. a and b
79
Sample Test Questions DBMS
37. In the SQL statement below, what are
DESCRIPTION and DEPT NAME?SELECT DESCRIPTION, DEPT NAME
FROM PROJECT, DEPARTMENT
WHERE PROJECT NUMBER = 155 AND PROJECT.DEPT NUMBER = DEPARTMENT.DEPT NUMBER
a. Entitiesb. Attributesc. Relationshipsd. a and b
80
Sample Test Questions DBMS
38. A database which has tables spread across
several locations is called a/an
a. distributed databaseb. a non-centralized databasec. a relational databased. a scattered databasee. a data warehouse
81
Sample Test Questions DBMS
39. This database system would be best for
answering questions such as “What affect will the Japan tsunami have on our Toyota business here in the USA?
a. SQL databaseb. data warehousec. distributed databased. Unify databasee. Oracle database
82
Sample Test Questions DBMS
40. This database system would be best for
answering questions such as “At what inflation rate will our company need to raise prices on its clothing prices?
a. SQL databaseb. data warehousec. distributed databased. Unify databasee. Oracle database
83
Sample Test Questions DBMS
41. This database process would be best for
predicting the future.
a. a crystal ballb. data warehousec. distributed databased. data mininge. Oracle
84
Sample Test Questions DBMS
42. This database process typically uses
advanced statistical techniques and machine learning.
a. a crystal ballb. data warehousec. distributed databased. data mininge. Oracle
85
Sample Test Questions DBMS
43. This database process allows for automated
discovery of patterns and relationships in a data warehouse.
a. a crystal ballb. data warehousec. distributed databased. data mininge. Oracle
86
Sample Test Questions DBMS
44. When a credit card company calls you to see
if you made a charge that is unusual for your purchasing behavior, what type of system were they likely using?
a. crystal ballb. data warehousec. distributed databased. data mininge. Oracle
87
Sample Test Questions DBMS
45. Data modeling done at the level of the entire
organization is called
a. organization modelingb. enterprise data modelingc. distributed database modelingd. data mining modelinge. corporation data modeling
88
Sample Test Questions: COSTCO
46. Systems Development Life Cycle (SDLC) has
five stages, which stage did our MIS 101 class vicariously enter in the COSTCO case?
a. analysisb. designc. implementationd. maintenance and reviewe. none of the above
89
Sample Test Questions: COSTCO
47. This type of feasibility analysis involves the
following question: Can the necessary hardware, software, and other system components be acquired or developed to solve the problem?
a. technical feasibilityb. economic feasibilityc. net present value feasibilityd. legal feasibilitye. operational feasibility
90
Sample Test Questions: COSTCO
48. This type of feasibility analysis involves the
following question: Will the predicted benefits offset the cost and time needed to solve the problem?
a. technical feasibilityb. economic feasibilityc. net present value feasibilityd. legal feasibilitye. operational feasibility
91
Sample Test Questions: COSTCO
49. This type of feasibility analysis involves the
following question: Can the project be completed in a reasonable amount of time?
a. technical feasibilityb. economic feasibilityc. schedule feasibilityd. legal feasibilitye. operational feasibility
92
Sample Test Questions: COSTCO
50. What is the next step after systems
investigation”
a. systems designb. systems analysisc. implementationd. maintenance and reviewe. none of the above
Ready-2-Read Bookstore
Ready-2-Read Bookstore
• PURPOSE: to track orders, customers, and books.
• Wants to know:
•Which books sell the best?
•What category of books sell the best?
•Which customers purchase the most books and in which categories?
•From what state are the most books purchased?
•Etc, etc.
• What data do you need to have in your database to accomplish your goals?
Ready-2-Read Bookstore
Tables in Database• These three tables will be created to track the displayed information above, such
as the customer’s First Name, Last Name, Street, City, State, ZIP code and Email
address.
• Using the information in the Tables above we can track such things as who purchased
what book and when.
Customers Table Orders Table Books Table
8 F
ield
s
4 F
ield
s
6 F
ield
s
Customer ID ID ID Order ID Book IDID
ID
Ready-2-Read Bookstore
DATABASE TERMS• PRIMARY KEYS: Each table has a UNIQUE identifier called a primary key.
•Customer ID
•Order ID
•Book ID
•Primary Keys are used to identify a record in a database, much like a SSN is
used in many databases to access a particular record, such as a credit score.
A drivers license number is another example because it is used to access records
by the DMV, etc.
Customers Table Orders Table Books Table
Primary Keys
Ready-2-Read Bookstore
DATABASE TERMS•FOREIGN KEYS: The Orders Table has two foreign keys.
•Foreign Keys are fields with the same (but could be different) names as the PRIMARY KEY in other tables. For example, Customer ID in the Orders Table is the name of the PRIMARY KEY in the Customers Table. And, Book ID in the Orders Table is the name of the PRIMARY KEY in the Books Table.
Every order that a customer places will cause a new record to be placed in the Orders Table. That record will contain the Customers ID number, the Book ID
Number and the Order Date. The function of the Orders Table is to track orders.
Customers Table Orders Table Books Table
Foreign Keys
ETHICAL ISSUESDatabases: Questionable Uses
Big Brother Big Business 79 min cc
ETHICAL ISSUESDatabases: Questionable Uses
Big Brother Big Business 79 min cc
Use these short video
clips for the questions
on the following slides
99
Sample Test Questions: Big Brother, Big Business
From: Surveillance Revolution in America 2:25 minutes
1. Which statement below is NOT true?
a. Chips are being implanted in employeesat some businesses.b. Records are being created of activities that used to be wholly private.c. Internet searches are being recorded.d. Sexual concerns are being recorded.e. none of the above
100
Sample Test Questions: Big Brother, Big Business
From: Surveillance Revolution in America 2:25 minutes
2. Which statement/s below is/are true?a. Shoppers are being watched and their behaviors are being recorded and
analyzed.b. George W. Bush stated that the
government is not mining personal information.c. It was stated that if “Big Brother is allowed to happen, it will happen”.d. a, b and c are true.
101
Sample Test Questions: Big Brother, Big Business
From: Black Box Recorders in Cars Valuable to law… 3:33 min
3. Airbag control devices in cars record
a. speed before and after a collision .b. breaking behavior before and after a collision.c. percent throttle before and after a
collision.d. a, b, and c are true
e. none of the above are true
102
Sample Test Questions: Big Brother, Big Business
From: Advantages and disadvantages of surveillance industries.
4. When citizens purchase a new car, they are usually informed about the collision monitoring device in their car.
a. Trueb. False
103
Sample Test Questions: Big Brother, Big Business
From: Advantages and disadvantages of surveillance industries.
5. Some rental car companies track every location the customer takes the car without the customer’s knowledge.
a. Trueb. False
104
Sample Test Questions: Big Brother, Business Big
From: Personal Information Encoded in Everyday Devices 3:20 min
6. Tracking information in color laser printers was requested by
a. Homeland Securityb. United States Secret Servicec. CIAd. FBI
105
Sample Test Questions: Big Brother, Big Business
From: Personal Information Encoded in Everyday Devices 3:20 min
7. Tracking information in color laser printers can seen, using a blue light and a microscope,
a. on the back of the page.b. within the colored picture.c. as yellow dots.
d. a and c
e. a, b, and c
106
Sample Test Questions: Big Brother, Big Business
From: Personal Information Encoded in Everyday Devices 3:20 min
8. Digital cameras contain only the serial number of the camera.
a. Trueb. False
107
Sample Test Questions: Big Brother, Big Business
From: Personal Information Encoded in Everyday Devices 3:20 min
9. CD recorders record on the CD the purchaser’s name.
a. Trueb. False
108
Sample Test Questions: Big Brother, Big Business
From: Personal Information Encoded in Everyday Devices 3:20 min
10. Most people don’t mind being tracked with devices such as digital pictures because they “have nothing to hide.”
a. Trueb. False
109
Sample Test Questions: Big Brother, Big Business
From: Cell Phones as Tracking Devices 3:27 min
11. There is a software program that businesses can use to track their employees location when employees are given a cell phone with GPS. What is the name of the software.
a. Big Brother is Watchingb. Employee Location
c. You Locate
d. Where is Waldo?
e. Know Your Employees
110
Sample Test Questions: Big Brother, Big Business
From: Cell Phones as Tracking Devices 3:27 min
12. In order for your cell phone company to know your general location, the cell phone must have GPS.
a. Trueb. False
111
Sample Test Questions: Big Brother, Big Business
From: Cell Phones as Tracking Devices 3:27 min
13. In order for your cell phone company to know your general location, the cell phone must turned on and you must be talking .
a. Trueb. False
112
Sample Test Questions: Big Brother, Big Business
From: Cell Phones as Tracking Devices 3:27 min
14. Cell phone companies store information about where you have been.
a. Trueb. False
113
Sample Test Questions: Big Brother, Big Business
From: Cell Phones as Tracking Devices 3:27 min
15. Cell phone companies store information about where you have been only when you are talking on the phone.
a. Trueb. False
114
Sample Test Questions: Big Brother, Big Business
From: Retail Surveillance 2:20 min
16. Some restaurants monitor and collect information about their employees’ behaviors and customers’ behaviors.
a. Trueb. False
115
Sample Test Questions: Big Brother, Big Business
From: Retail Surveillance 2:20 min
17. Some retailers have surveillance systems which can detect suspicious behaviors on the part of the customers.
a. Trueb. False
116
Sample Test Questions: Big Brother, Big Business
From: Retail Surveillance 2:20 min
18. Verint Systems believes that the “sky is the limit” when it comes to the types of information that can be collected on customers in retail stores.
a. Trueb. False
117
Sample Test Questions: Big Brother, Big Business
From: Retail Surveillance 2:20 min
19. Verint Systems is extremely concerned about the privacy of individuals shopping in retail stores.
a. Trueb. False
118
Sample Test Questions: Big Brother, Big Business
From: Retail Surveillance 2:20 min
20. What two companies mentioned in the video are using surveillance camera systems to monitor customers behaviors.
a. Walgreensb. Home Depotc. Target
d. b and c
e. a, b, and c
119
Sample Test Questions: Big Brother, Big Business
From: Law Enforcement: Key Beneficiary in Public Surveillance … 1:15 min
21. A murder was convicted due to surveillance cameras in which company below?
a. Walgreensb. Home Depotc. Target
d. ARCO
e. CVS Pharmacy
120
Sample Test Questions: Big Brother, Big Business
From: Data Breaches and Security Risks (3:44 min)
22. This company maintains a database with 17 billion records on almost every person in the USA and this company sells these records.
a. Internet Security Companyb. Soviet Information Systemsc. Information and Security Systems
d. ChoicePoint
e. None of the above
121
Sample Test Questions: Big Brother, Big Business
From: Google Internet Tracks All Searches (3:32 min)
23. Google keeps a record of every search made and these searches
a. can’t be tracked back to the person making the searchb. can be tracked back to the person
making the search.
122
Sample Test Questions: Big Brother, Big Business
From: Implantable ID chips (2:37 min)
24. What is the name and location of a company in Ohio that required some of its employees to get RFID chips implanted in their arms.
a. City Watchers in Cincinnati, Ohiob. Gold Inventories Inc. in Zanesville, Ohio.
c. City Alarm in Cincinnati, Ohio
d. City Securities in Columbus, Ohio.
123
Sample Test Questions: Big Brother, Big Business
From: Future of Surveillance (3:00 min)
26. This is a satellite navigation system that can pinpoint a target within 2 meters (~6feet).
a. IBM navigation systemb. Galileo satellite navigation system
c. Wal-Mart shopping cart location system
d. FBI navigation system
e. IRS taxpayer location system
124
Sample Test Questions: Big Brother, Big Business
From: Big Brother, Big Business
IF BIG BROTHER IS ALLOWED TO HAPPEN, IT WILL HAPPEN.