5 C H A P T E R Organized Data and Information. Data – A necessity for almost any enterprise to...

Post on 25-Dec-2015

217 views 0 download

Tags:

transcript

55

C H A P T E R

OrganizedOrganized Data Data and Informationand Information

Data

• Data–A necessity for almost any enterprise to carry out

its business. Consists of raw facts, and when organized may be transformed into information.

• Database• A collection of data organized to meet users’

needs

Data Management

• In order to manage data it must be organized.• It is organized in a hierarchy.

The Hierarchy of Data

Database

Files (TABLES)

Records

Fields

Characters

Checking Account FilesSavings Account FilesLoan Account Files

27439, Smith, Joe, 453.21, 1-3-9834278, Watt, Carol, 212.54, 2-6-9943872, Yos, Tom, 3224.87, 3-8-97

27439, Smith, Joe, 453.21, 1-3-98

Smith (Last Name)

(S = 01010011 in ASCII)

The Hierarchy of Data

CharacterBasic building block of information, represented by a byte.

FieldA group of characters.

RecordA collection of related fields.

FileA collection of related records.

DatabaseA collection of integrated and related files.

How Characters are Stored

Codes for Storing DataASCII• American Standard Code for Information Interchange.• 8 bit code. (256 characters can be represented).• In the early years of computers, it was the most popular code but it was limited to how many characters it could represent. ASCII is still very much used today but it has be extended from 8 bits

to 16 bits. With 16 bits, over 65,536characters can be represented.

How Characters are Stored

Codes for Storing DataCharacter ASCII

A 01000001B 01000010...Z 01011010

0 001100001 00110001...9 00111001

How Characters are Stored

Codes for Storing DataUNICODE• UNICODE: Universal Code.• Today, it is the most popular code.• Used by most computer manufactures.• 16 bit code. (65,536 characters can be represented)

• A 16 bit code will allow for other languages to be represented in the code, not just English.

How Characters are Stored

Codes for Storing DataCharacter UNICODE

A 0000000001000001B 0000000001000010...Z 0000000001011010

0 00000000001100001 0000000000110001...9 0000000000111001

Note that the right-m

ost

bits are ASCII w

ithin

UNICODE. Note the

red bits.

The Traditional Approach to Data Management

• The Traditional Approach–Separate files are created and stored for

each application program.–Very common from the 50’s through the

80’s.

Data FilesApplication

ProgramReports

The Traditional (File Oriented) ApproachBanking Example

Smalltown National Bank1965

The Traditional (File Oriented) ApproachBanking Example

CheckingFiles

CheckingPrograms

CheckingReports

SavingsFiles

SavingsPrograms

SavingsReports

LoanFiles

LoanPrograms

LoanReports

CheckingFiles

CheckingPrograms

CheckingReports

SavingsFiles

SavingsPrograms

SavingsReports

LoanFiles

LoanPrograms

LoanReports

The Traditional (File Oriented) Approach

PROBLEMS

(1) DATA REDUNDANCY•Same data stored on different files.

•Name is on checking, savings, and loan files.•Address is on checking, savings, and loan files.•Telephone number is on checking, savings, and loan files.

CheckingFiles

CheckingPrograms

CheckingReports

SavingsFiles

SavingsPrograms

SavingsReports

LoanFiles

LoanPrograms

LoanReports

The Traditional (File Oriented) Approach

PROBLEMS

DATA REDUNDANCY CAUSES:•Unnecessary data entry.•Duplicated data on one file may not get changed on another file

during an update or deletion.•Leads to a lack in DATA INTEGRITY.

CheckingFiles

CheckingPrograms

CheckingReports

SavingsFiles

SavingsPrograms

SavingsReports

LoanFiles

LoanPrograms

LoanReports

The Traditional (File Oriented) Approach

PROBLEMS

(2) DATA INTEGRITY•Data redundancy leads to a lack of data integrity.•Lack of data integrity = errors in database

CheckingFiles

CheckingPrograms

CheckingReports

SavingsFiles

SavingsPrograms

SavingsReports

LoanFiles

LoanPrograms

LoanReports

The Traditional (File Oriented) Approach

PROBLEMS

(3) LACK OF DATA INTEGRATION•With separate file systems, it is difficult to produce reports which require data from separate file systems.

•EXAMPLE: The bank manager might want a report showing the names of customers who use all the bank's services: checking, savings and loans.

•In order to collect this information for a report, a separate computer program would need to be written and this take time.

CheckingFiles

CheckingPrograms

CheckingReports

SavingsFiles

SavingsPrograms

SavingsReports

LoanFiles

LoanPrograms

LoanReports

The Traditional (File Oriented) Approach

PROBLEMS

(4) PROGRAM-DATA DEPENDENCE•If the size of a field in a record changes, all the programs which access that record must be modified.

•EXAMPLE: When ZIP codes changed from 5 digits to 9 digits, all programs which accessed ZIP codes had to be modified.

Note: When the ZIP code changed, millions of programs needed to be changed in corporations, governments, etc.

CheckingFiles

CheckingPrograms

CheckingReports

SavingsFiles

SavingsPrograms

SavingsReports

LoanFiles

LoanPrograms

LoanReports

The Traditional (File Oriented) Approach

SUMMARY

(1) CAUSES DATA REDUNDANCY.(2) LACKS DATA INTEGRITY.(3) LACKS DATA INTEGRATION.(4) CAUSES PROGRAM-DATA DEPENDENCY.

The Database Approach

• The Database Management System Approach– A pool of related data is shared by multiple application

programs. Rather than having separate data files, each application uses a collection of data that is either joined or related in the database.

– A DBMS “knows” everything about the data on thehard storage drive/s, and has complete control over it.

LoanProgramsReports

Reports

ReportsAll Data

CheckingPrograms

SavingsPrograms

DatabaseManagement

System

DBMS Hard drive/s

Advantages to the Database Approach

• Improved strategic use of corporate data• Reduced data redundancy• Improved data integrity• Easier modification and updating• Data and program independence• Better access to data and information• Standardization of data access• A framework for program development• Better overall protection of the data• Shared data and information resources

Disadvantages to the Database Approach

• Increased vulnerability. Unauthorized people hack into databases on a regular bases.

• Foolishly, employees place databases on their laptops which are stolen when left in cars or unattended at coffee shops. LoJack Tracking Software

LoJack Video 2min cc (Good)LoJack Video 4min cc (Very Good)

Kensington Lock

• Great for coffee shops

• The cable is retractable. Just

wrap the cable around a table

post and into the Kensington port on your

computer; then lock the cable into the port.

$39 to $21

Ken

sing

ton

port

Database Terms

TABLES (Also called ENTITIES)– A generalized class of people, places, things, or

events (objects) about which data are collected, stored, and maintained.

AttributesCustomer name, Employee name

Employees Checking Stocks Executives Students

Customers Patients Books Inventory

CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011

Database TermsFIELDS (Also called ATTRIBUTES)

• An Field is a property of an Table.

Checking Table

Fields

CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011

Database TermsRECORDS Consist of one or more related Fields in a Table

Checking TableThree records in a Table

CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011

Database Terms

.

PRIMARY KEY• A field or set of fields that UNIQUELY identifies the record.

• Account Number is the only UNIQUE field in this record.

Primary Key

CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011

Database Terms

.

SECONDARY KEY• A Key which is NOT a primary key.

How much money do I have inmy checking account?I can’t remember my checkingaccount number, but my lastname is Yos.

CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011

Database Terms

.

KEY• A field or set of fields that is used to identify a record or records.• It is possible to search for any record using any of these five fields.

Keys

CHECKING TABLEAcct # Last First Balance Start Date27439 Smith Joe 453.21 1-3-200034278 Watt Carol 212.54 2-6-200143872 Yos Tom 224.87 3-8-2011

Database Terms

.

DATA ITEM• A specific value of an Field.

Data Item(Examples)

Database Terms

.

DATA MODELING• This is map or diagram of entities and their relationships.• These maps or diagrams show the how the database is organized.• A popular diagramming technique is called “entity-relationship diagram.”• A MODEL of the database is constructed before the actual database is designed. One popular modeling method is calledan entity-relationship diagram.

Entity-relationship diagram

Database Terms

Entity-relationship diagram

Student CourseTakesClass

Major

Name

ID

Name

Dept

Section

1 N

Relation-shipEntity Attribute

Entity Relationship (ER) Diagram for a Customer Ordering Database

31

Attributes

Entities

Relationship: Each Customermay order many of the Product

(Tables)

(Properties)

A Relational Data Model• Relational Data Model– All data elements are placed in two-

dimensional tables, called relations, that are the logical equivalent of files.

32

313-46-2007

412-48-1778

543-56-8876

Relational Database Terms• Joining

– Data manipulation that combines two or more tables.– These three tables can be joined using a common field such as Dept.

number.– Example: Using Project number (155) we can find out

the description of the project and for what department theproject was conducted.This can be done easily even though the data is within twoseparate files.

– See the next slide to see how easy joining can be done usinga query language called SQL. (Pronounce S-Q-L or “sequel”)SQL is in all database management systems, including Access.

33

313-46-2007

412-48-1778

543-56-8876

Database Terms

.

SELECT DESCRIPTION, DEPT NAME

FROM PROJECT, DEPARTMENT

WHERE PROJECT NUMBER = 155 AND PROJECT.DEPT NUMBER =

DEPARTMENT.DEPT NUMBER

PAYROLL

ACCOUNTING

313-46-2007

412-48-1778

543-56-8876

Dept NumberDept Number

SQL EXAMPLE:

•This example shows how to join two

tables using SQL in order to find the Project name and the

Department in which the Project was conducted.

• Note that the Description of the project (Payroll) was in the Project table and the Dept Name

(Accounting) was in the Department table.

• The tables were joined using

the Dept Number field.

Result

Database Terms

.

Database Terms

.

Database Terms

.

Distributed Database• A database in which the actual data may be spread across several smaller databases connected via telecommunications devices.

Database Terms

Data Warehouse

• A relational database management system.

• Designed SPECIFICALLY to support management decision making.

• Does NOT meet the needs of a TPS.

• Contains massive amounts of current and historical data.

Database Terms

Looks as if we should relocate our

manufacturing facility to China.

Data Mining• AUTOMATED discovery of patterns and relationships

in a data warehouse.• Uses advanced statistical techniques and machine learning.• Used to predict as well as discover.• Data Mining the Internet is now being used by some

companies to predict the future.

Database Terms

Look. I think we are experiencing a large increase in credit card fraud.

Data Modeling and Database Models

• Data Model– A map or diagram of entities and their

relationships.• Enterprise Data Modeling– Data modeling done at the level of the

entire organization.• Entity-Relationship (ER) diagrams– A data model that uses basic graphical

symbols to show the organization of and relationships between data.

Sample Test Questions DBMS

42

Database1.In the SQL statement below, which item is an

entity? SELECT EMPLOYEE-NUMBERFROM EMPLOYEEWHERE SALARY > 20,000a. SALARYb. EMPLOYEEc. EMPLOYEE-NUMBERd. a and be. a, b, and c

Sample Test Questions DBMS

43

2. Which item below is most closely associated

with changing the zip code from 5 to 9 digits

in a file-oriented database? a.Program-data dependenceb.Data integrityc. Data redundancyd.Data integratione. None of the above

Sample Test Questions DBMS

44

3. When designing a database, which item below would most likely be used to show the logical relationships among data?

a. Access 2003

b. Entity-relationship diagrams

c. Data Manipulation Language (DML)

d. System Flowcharts

e. Data Definition Language (DDL)

Sample Test Questions DBMS

45

4. What is the main use for data warehouses?

a. To meet the needs of day-to-day transaction processing.

b. To support the needs of management decision making.

c. To store all of a company’s transactions.

d. None of the above

Sample Test Questions DBMS

46

5. Which system below would be best for detecting credit card transactions which are likely to be fraudulent?

a. Data mining

b. Pattern analysis

c. Pattern mining

d. Data Marting

e. Transaction processing system

Sample Test Questions DBMS

47

6. What database model places data in two-dimensional tables?

a. relational

b. network

c. hierarchical

Sample Test Questions DBMS

48

7. In order to do a "join" in a relational database, it is necessary to have:

a. some data redundancy.

b. some program-data dependency.

c. some errors in the database

d. None of the above

Sample Test Questions DBMS

49

8. This type of database key must be unique:a. Primary Keyb. Secondary Keyc. Tertiary Keyd. a and ce. a, b, and c

Sample Test Questions DBMS

50

9. With this database configuration, the files are placed in multiple locations within the organization.a. Centralized configurationb. Distributed configurationc. Hierarchical configurationd. a and ce. b and c

Sample Test Questions DBMS

51

10. This term refers to linking two or more tables together using a common attribute (column).

a. Joining

b. Parsing

c. Gluing

d. Connecting

Sample Test Questions DBMS

52

11. Data in a database are organized in (best answer)

a. a hierarchy

b. a record

c. in ASCII

d. in a file

e. in UNICODE

Sample Test Questions DBMS

53

12. Modern databases like ACCESS 2007 use

this code to store characters (best answer):

a. Baudit

b. ACSII

c. UNICODE

d. Morris Code

Sample Test Questions DBMS

54

13. UNICODE allows for the storage of how

many different characters?

a. 128

b. 256

c. 512

d. 1024

e. 65, 536

Sample Test Questions DBMS

55

14. UNICODE eliminated ASCII completely in

its bit string?

a. True

b. False

Sample Test Questions DBMS

56

15. Modern DBMS eliminate all data

redundancy?

a. True

b. False

Sample Test Questions DBMS

57

16. To much data redundancy usually leads to

a. data integrity problems.

b. data integration problems.

c. errors in the database

d. a and c

e. None of the above

Sample Test Questions DBMS

58

17. In a traditional file-oriented approach

separate computer programs were required to do queries across two or more files?

a. True

b. False

Sample Test Questions DBMS

59

18. In a traditional file-oriented database

approach, changing a ZIP code from five digits to nine digits was a problem due to issues caused by:

a. data redundancy.

b. data integrity.

c. lack of data integration.

d. program-data dependency.

Sample Test Questions DBMS

60

19. In a traditional file-oriented database

approach, changing a ZIP code from five digits to nine digits was a problem due to issues caused by:

a. data redundancy.

b. data integrity.

c. lack of data integration.

d. none of the above

Sample Test Questions DBMS

61

20. Which item/s below is/are problem/s caused

by a file-oriented approach?

a. data redundancy

b. a lack of data integrity

c. a lack of data integration

d. program-data dependency

e. all of the above

Sample Test Questions DBMS

62

21. DBMS stands for

a. database management system

b. database movement system

c. database manager system

d. database major system

Sample Test Questions DBMS

63

22. A DBMS can be thought of as a software

system that “knows” everything about the data on the storage drive/s and has complete control over them?

a. True

b. False

Sample Test Questions DBMS

64

23. Which methods for security for a laptop

were mentioned in class?a. Kensington Lockb. LoJack Tracking softwarec. Norton Security Systemd. McAfee Security Systeme. a and b

Sample Test Questions DBMS

65

24. This is a generalized class of people, things,

or events (objects) about which data are collected, stored, and maintained.a. Entitiesb. Attributesc. Primary keyd. Secondary keye. Data Item

Sample Test Questions DBMS

66

25. This is a generalized class of people, things,

or events (objects) about which data are collected, stored, and maintained.a. Data Item b. Attributesc. Primary keyd. Secondary keye. None of the above

Sample Test Questions DBMS

67

26. Examples of Entities in a DBMS would be

a. Employeesb. Checkingc. Savingsd. Bookse. all of the above

Sample Test Questions DBMS

68

27. Last name in a DBMS would be an example

ofa. an entityb. an attributec. a fieldd. a recorde. b and c

69

Sample Test Questions DBMS

28. An example of a primary key in a DBMS

would bea. last nameb. first namec. middle named. account number

70

Sample Test Questions DBMS

29. The most popular way for modeling a

database involves usinga. a physical modelb. a narrative modelc. entity-relationship diagramsd. a mathematical model

71

Sample Test Questions DBMS

29. It is possible to search for a record in a

database using attributes such asa. keysb. recordsc. entitiesd. characters

72

Sample Test Questions DBMS

30. In an entity-relationship model the symbol

below is for a/an

a. keysb. relationshipsc. entitiesd. attributes

73

Sample Test Questions DBMS

31. In an entity-relationship model the symbol

below is for

a. keysb. relationshipsc. entitiesd. attributes

74

Sample Test Questions DBMS

32. In an entity-relationship model the symbol

below is for

a. keysb. relationshipsc. entitiesd. attributes

75

Sample Test Questions DBMS

33. In an entity-relationship model the symbol

below is used to indicate what type of relationship between database objects?

a. 1 to 1b. 1 to 3c. 1 to Nd. 1 to Manye. c and d are both correct

76

Sample Test Questions DBMS

34. It is impossible to setup a relational data

model without adding some

a. data redundancyb. errors into the databasec. redundant attributes across tablesd. a and c

77

Sample Test Questions DBMS

35. In order to do a “join” in a DBMS we must

have some

a. data redundancy.b. errors in the database.c. redundant attributes across two or more tables.d. a, b, and c

78

Sample Test Questions DBMS

36. In the SQL statement below, what are

PROJECT and DEPARTMENT?SELECT DESCRIPTION, DEPT NAME

FROM PROJECT, DEPARTMENT

WHERE PROJECT NUMBER = 155 AND PROJECT.DEPT NUMBER = DEPARTMENT.DEPT NUMBER

a. Entitiesb. Attributesc. Relationshipsd. a and b

79

Sample Test Questions DBMS

37. In the SQL statement below, what are

DESCRIPTION and DEPT NAME?SELECT DESCRIPTION, DEPT NAME

FROM PROJECT, DEPARTMENT

WHERE PROJECT NUMBER = 155 AND PROJECT.DEPT NUMBER = DEPARTMENT.DEPT NUMBER

a. Entitiesb. Attributesc. Relationshipsd. a and b

80

Sample Test Questions DBMS

38. A database which has tables spread across

several locations is called a/an

a. distributed databaseb. a non-centralized databasec. a relational databased. a scattered databasee. a data warehouse

81

Sample Test Questions DBMS

39. This database system would be best for

answering questions such as “What affect will the Japan tsunami have on our Toyota business here in the USA?

a. SQL databaseb. data warehousec. distributed databased. Unify databasee. Oracle database

82

Sample Test Questions DBMS

40. This database system would be best for

answering questions such as “At what inflation rate will our company need to raise prices on its clothing prices?

a. SQL databaseb. data warehousec. distributed databased. Unify databasee. Oracle database

83

Sample Test Questions DBMS

41. This database process would be best for

predicting the future.

a. a crystal ballb. data warehousec. distributed databased. data mininge. Oracle

84

Sample Test Questions DBMS

42. This database process typically uses

advanced statistical techniques and machine learning.

a. a crystal ballb. data warehousec. distributed databased. data mininge. Oracle

85

Sample Test Questions DBMS

43. This database process allows for automated

discovery of patterns and relationships in a data warehouse.

a. a crystal ballb. data warehousec. distributed databased. data mininge. Oracle

86

Sample Test Questions DBMS

44. When a credit card company calls you to see

if you made a charge that is unusual for your purchasing behavior, what type of system were they likely using?

a. crystal ballb. data warehousec. distributed databased. data mininge. Oracle

87

Sample Test Questions DBMS

45. Data modeling done at the level of the entire

organization is called

a. organization modelingb. enterprise data modelingc. distributed database modelingd. data mining modelinge. corporation data modeling

88

Sample Test Questions: COSTCO

46. Systems Development Life Cycle (SDLC) has

five stages, which stage did our MIS 101 class vicariously enter in the COSTCO case?

a. analysisb. designc. implementationd. maintenance and reviewe. none of the above

89

Sample Test Questions: COSTCO

47. This type of feasibility analysis involves the

following question: Can the necessary hardware, software, and other system components be acquired or developed to solve the problem?

a. technical feasibilityb. economic feasibilityc. net present value feasibilityd. legal feasibilitye. operational feasibility

90

Sample Test Questions: COSTCO

48. This type of feasibility analysis involves the

following question: Will the predicted benefits offset the cost and time needed to solve the problem?

a. technical feasibilityb. economic feasibilityc. net present value feasibilityd. legal feasibilitye. operational feasibility

91

Sample Test Questions: COSTCO

49. This type of feasibility analysis involves the

following question: Can the project be completed in a reasonable amount of time?

a. technical feasibilityb. economic feasibilityc. schedule feasibilityd. legal feasibilitye. operational feasibility

92

Sample Test Questions: COSTCO

50. What is the next step after systems

investigation”

a. systems designb. systems analysisc. implementationd. maintenance and reviewe. none of the above

Ready-2-Read Bookstore

Ready-2-Read Bookstore

• PURPOSE: to track orders, customers, and books.

• Wants to know:

•Which books sell the best?

•What category of books sell the best?

•Which customers purchase the most books and in which categories?

•From what state are the most books purchased?

•Etc, etc.

• What data do you need to have in your database to accomplish your goals?

Ready-2-Read Bookstore

Tables in Database• These three tables will be created to track the displayed information above, such

as the customer’s First Name, Last Name, Street, City, State, ZIP code and Email

address.

• Using the information in the Tables above we can track such things as who purchased

what book and when.

Customers Table Orders Table Books Table

8 F

ield

s

4 F

ield

s

6 F

ield

s

Customer ID ID ID Order ID Book IDID

ID

Ready-2-Read Bookstore

DATABASE TERMS• PRIMARY KEYS: Each table has a UNIQUE identifier called a primary key.

•Customer ID

•Order ID

•Book ID

•Primary Keys are used to identify a record in a database, much like a SSN is

used in many databases to access a particular record, such as a credit score.

A drivers license number is another example because it is used to access records

by the DMV, etc.

Customers Table Orders Table Books Table

Primary Keys

Ready-2-Read Bookstore

DATABASE TERMS•FOREIGN KEYS: The Orders Table has two foreign keys.

•Foreign Keys are fields with the same (but could be different) names as the PRIMARY KEY in other tables. For example, Customer ID in the Orders Table is the name of the PRIMARY KEY in the Customers Table. And, Book ID in the Orders Table is the name of the PRIMARY KEY in the Books Table.

Every order that a customer places will cause a new record to be placed in the Orders Table. That record will contain the Customers ID number, the Book ID

Number and the Order Date. The function of the Orders Table is to track orders.

Customers Table Orders Table Books Table

Foreign Keys

ETHICAL ISSUESDatabases: Questionable Uses

Big Brother Big Business 79 min cc

ETHICAL ISSUESDatabases: Questionable Uses

Big Brother Big Business 79 min cc

Use these short video

clips for the questions

on the following slides

99

Sample Test Questions: Big Brother, Big Business

From: Surveillance Revolution in America 2:25 minutes

1. Which statement below is NOT true?

a. Chips are being implanted in employeesat some businesses.b. Records are being created of activities that used to be wholly private.c. Internet searches are being recorded.d. Sexual concerns are being recorded.e. none of the above

100

Sample Test Questions: Big Brother, Big Business

From: Surveillance Revolution in America 2:25 minutes

2. Which statement/s below is/are true?a. Shoppers are being watched and their behaviors are being recorded and

analyzed.b. George W. Bush stated that the

government is not mining personal information.c. It was stated that if “Big Brother is allowed to happen, it will happen”.d. a, b and c are true.

101

Sample Test Questions: Big Brother, Big Business

From: Black Box Recorders in Cars Valuable to law… 3:33 min

3. Airbag control devices in cars record

a. speed before and after a collision .b. breaking behavior before and after a collision.c. percent throttle before and after a

collision.d. a, b, and c are true

e. none of the above are true

102

Sample Test Questions: Big Brother, Big Business

From: Advantages and disadvantages of surveillance industries.

4. When citizens purchase a new car, they are usually informed about the collision monitoring device in their car.

a. Trueb. False

103

Sample Test Questions: Big Brother, Big Business

From: Advantages and disadvantages of surveillance industries.

5. Some rental car companies track every location the customer takes the car without the customer’s knowledge.

a. Trueb. False

104

Sample Test Questions: Big Brother, Business Big

From: Personal Information Encoded in Everyday Devices 3:20 min

6. Tracking information in color laser printers was requested by

a. Homeland Securityb. United States Secret Servicec. CIAd. FBI

105

Sample Test Questions: Big Brother, Big Business

From: Personal Information Encoded in Everyday Devices 3:20 min

7. Tracking information in color laser printers can seen, using a blue light and a microscope,

a. on the back of the page.b. within the colored picture.c. as yellow dots.

d. a and c

e. a, b, and c

106

Sample Test Questions: Big Brother, Big Business

From: Personal Information Encoded in Everyday Devices 3:20 min

8. Digital cameras contain only the serial number of the camera.

a. Trueb. False

107

Sample Test Questions: Big Brother, Big Business

From: Personal Information Encoded in Everyday Devices 3:20 min

9. CD recorders record on the CD the purchaser’s name.

a. Trueb. False

108

Sample Test Questions: Big Brother, Big Business

From: Personal Information Encoded in Everyday Devices 3:20 min

10. Most people don’t mind being tracked with devices such as digital pictures because they “have nothing to hide.”

a. Trueb. False

109

Sample Test Questions: Big Brother, Big Business

From: Cell Phones as Tracking Devices 3:27 min

11. There is a software program that businesses can use to track their employees location when employees are given a cell phone with GPS. What is the name of the software.

a. Big Brother is Watchingb. Employee Location

c. You Locate

d. Where is Waldo?

e. Know Your Employees

110

Sample Test Questions: Big Brother, Big Business

From: Cell Phones as Tracking Devices 3:27 min

12. In order for your cell phone company to know your general location, the cell phone must have GPS.

a. Trueb. False

111

Sample Test Questions: Big Brother, Big Business

From: Cell Phones as Tracking Devices 3:27 min

13. In order for your cell phone company to know your general location, the cell phone must turned on and you must be talking .

a. Trueb. False

112

Sample Test Questions: Big Brother, Big Business

From: Cell Phones as Tracking Devices 3:27 min

14. Cell phone companies store information about where you have been.

a. Trueb. False

113

Sample Test Questions: Big Brother, Big Business

From: Cell Phones as Tracking Devices 3:27 min

15. Cell phone companies store information about where you have been only when you are talking on the phone.

a. Trueb. False

114

Sample Test Questions: Big Brother, Big Business

From: Retail Surveillance 2:20 min

16. Some restaurants monitor and collect information about their employees’ behaviors and customers’ behaviors.

a. Trueb. False

115

Sample Test Questions: Big Brother, Big Business

From: Retail Surveillance 2:20 min

17. Some retailers have surveillance systems which can detect suspicious behaviors on the part of the customers.

a. Trueb. False

116

Sample Test Questions: Big Brother, Big Business

From: Retail Surveillance 2:20 min

18. Verint Systems believes that the “sky is the limit” when it comes to the types of information that can be collected on customers in retail stores.

a. Trueb. False

117

Sample Test Questions: Big Brother, Big Business

From: Retail Surveillance 2:20 min

19. Verint Systems is extremely concerned about the privacy of individuals shopping in retail stores.

a. Trueb. False

118

Sample Test Questions: Big Brother, Big Business

From: Retail Surveillance 2:20 min

20. What two companies mentioned in the video are using surveillance camera systems to monitor customers behaviors.

a. Walgreensb. Home Depotc. Target

d. b and c

e. a, b, and c

119

Sample Test Questions: Big Brother, Big Business

From: Law Enforcement: Key Beneficiary in Public Surveillance … 1:15 min

21. A murder was convicted due to surveillance cameras in which company below?

a. Walgreensb. Home Depotc. Target

d. ARCO

e. CVS Pharmacy

120

Sample Test Questions: Big Brother, Big Business

From: Data Breaches and Security Risks (3:44 min)

22. This company maintains a database with 17 billion records on almost every person in the USA and this company sells these records.

a. Internet Security Companyb. Soviet Information Systemsc. Information and Security Systems

d. ChoicePoint

e. None of the above

121

Sample Test Questions: Big Brother, Big Business

From: Google Internet Tracks All Searches (3:32 min)

23. Google keeps a record of every search made and these searches

a. can’t be tracked back to the person making the searchb. can be tracked back to the person

making the search.

122

Sample Test Questions: Big Brother, Big Business

From: Implantable ID chips (2:37 min)

24. What is the name and location of a company in Ohio that required some of its employees to get RFID chips implanted in their arms.

a. City Watchers in Cincinnati, Ohiob. Gold Inventories Inc. in Zanesville, Ohio.

c. City Alarm in Cincinnati, Ohio

d. City Securities in Columbus, Ohio.

123

Sample Test Questions: Big Brother, Big Business

From: Future of Surveillance (3:00 min)

26. This is a satellite navigation system that can pinpoint a target within 2 meters (~6feet).

a. IBM navigation systemb. Galileo satellite navigation system

c. Wal-Mart shopping cart location system

d. FBI navigation system

e. IRS taxpayer location system

124

Sample Test Questions: Big Brother, Big Business

From: Big Brother, Big Business

IF BIG BROTHER IS ALLOWED TO HAPPEN, IT WILL HAPPEN.