Exam 11: Electronic Media and Image Records

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Match each item with the correct statement listed next.
Premises:
A method of describing the relationship between the size of an image and the original record when viewed on a microfilm reader screen
Responses:
media stability
encryption
firewall
Correct Answer:
Verified
Premises:
Responses:
A method of describing the relationship between the size of an image and the original record when viewed on a microfilm reader screen
media stability
(Matching)
4.7/5
(47)

The miniaturized image of a document is called a macroform. ​

(True/False)
4.9/5
(37)
Match each item with the correct statement listed next.
Premises:
The length of time the media will maintain its original quality so that it can continue to be used
Responses:
magnetic media
density
scanner
Correct Answer:
Verified
Premises:
Responses:
The length of time the media will maintain its original quality so that it can continue to be used
magnetic media
(Matching)
4.9/5
(41)

An organization can save money on equipment when employees "Bring Your Own Device" (BYOD)to complete work for the organization. ​

(True/False)
4.9/5
(34)
Match each item with the correct statement listed next.
Premises:
The technology by which recorded information can be quickly reduced to a microform, stored conveniently, and then easily retrieved for reference and use .
Responses:
magnetic media
electronic record
virus
Correct Answer:
Verified
Premises:
Responses:
The technology by which recorded information can be quickly reduced to a microform, stored conveniently, and then easily retrieved for reference and use .
magnetic media
(Matching)
4.8/5
(40)

Which of the following statements about flash drives are correct? ​

(Multiple Choice)
4.8/5
(29)

A _______ is a combination hardware and software buffer that many organizations place between their internal networks and the Internet. ​

(Multiple Choice)
4.8/5
(33)

Three stages of an image record system are

(Multiple Choice)
4.8/5
(41)

Source documents are scanned to produce images. ​

(True/False)
4.8/5
(34)

Moving data from one electronic system to another is called migration. ​

(True/False)
4.9/5
(37)
Match each item with the correct statement listed next.
Premises:
A business policy that allows employees to use their own smartphones, tablets, and laptops, to access corporate information.
Responses:
scanner
magnetic media
virus
Correct Answer:
Verified
Premises:
Responses:
A business policy that allows employees to use their own smartphones, tablets, and laptops, to access corporate information.
scanner
(Matching)
4.9/5
(37)

Electronic records created today may not always be compatible with new computers or software. ​

(True/False)
4.7/5
(34)
Match each item with the correct statement listed next.
Premises:
The process of converting meaningful information into a numeric code that is only understand by the intended recipient of the information
Responses:
density
magnetic media
micrographics
Correct Answer:
Verified
Premises:
Responses:
The process of converting meaningful information into a numeric code that is only understand by the intended recipient of the information
density
(Matching)
4.7/5
(37)

Which of the following could be an appropriate security step for businesses implementing a BYOD policy for employees? ​

(Multiple Choice)
4.8/5
(41)

Solid state drives (SSDs)are more reliable than hard disk drives (HDDs)because SSDs have no moving parts. ​

(True/False)
4.8/5
(37)

______ _____ refers to how well the media and equipment work together in accessing information.

(Multiple Choice)
4.9/5
(30)

Magnification is another word for reduction. ​

(True/False)
5.0/5
(41)
Match each item with the correct statement listed next.
Premises:
A combination hardware and software buffer that many organizations place between their internal network and the Internet to protect the internal network from outside intrusion
Responses:
Bring Your Own Device
density
data warehouse
Correct Answer:
Verified
Premises:
Responses:
A combination hardware and software buffer that many organizations place between their internal network and the Internet to protect the internal network from outside intrusion
Bring Your Own Device
(Matching)
5.0/5
(48)

Organizations need to establish security policies and procedures when BYOD is implemented to protect confidential information. ​

(True/False)
4.9/5
(40)
Match each item with the correct statement listed next.
Premises:
variety of magnetically coated materials used by computers for data storage.
Responses:
scanner
Bring Your Own Device
media stability
Correct Answer:
Verified
Premises:
Responses:
variety of magnetically coated materials used by computers for data storage.
scanner
(Matching)
4.7/5
(47)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)