Exam 1 study guide Flashcards
The title of the position that heads the IT
department in most organizations.
Chief Information Officer
•A supervisor who frequently gives feedback to
the employees who report to her—both to
praise them and to let them know areas
where they can improve—notices that
employee productivity rises. This is known as
what?
The Hawthorne Effect
The ITIL term that describes the front‐door,
single point of contact for reporting and
triaging IT related questions and issues.
Service Desk
Who is quoted as saying “Do what you do best
and outsource the rest”?
Peter Drucker
Four components of Information Technology
People
• Process
• Technology
• Data
This product made by Google in 2012/2013
initially failed due to both cost and privacy
issues.
Google Glass
Per our lecture, this computer brand had the
largest market share in North America in 2019,
with 30.81% of the market.
Dell
The hypothesis that states that roughly every
two years the number of transistors on an
integrated circuit doubles is known as what?
Moore’s Law
• This satellite based service offered by Elon
Musk’s SpaceX provides high speed, low
latency broadband internet to individuals in
locations that do not have a fiber
infrastructure.
Starlink
UNM’s powerful supercomputing facility that is
used to facilitate high speed processing related
to Research is called what?
UNM Center for Advanced Research
Computing (CARC)
This is an example of what programming language: SELECT LastName, FirstName, EmployeeID FROM Employees WHERE LastName = “Park”
Structured Query Language (SQL)
The name of the position responsible for
managing, tuning, patching and updating a
database
Database Administrator (DBA)
This is the term that addresses the planning
for governance, data stewardship, and data
architecture.
Master data management
• A supplemental system that is prepared by an
individual or department and may contain a
separate version of the truth.
Shadow system
One employee record with multiple job
records is an example of this type of
relationship.
One‐to‐many
Modules such as general ledger, travel and
expense management, and asset management
are typically included in a ________
management system.
Financial
Which of the following is the central element
of the human capital management (HCM)
information system?
Employee record
The technology that enables task routing and
automation for things like authorizations,
hiring, etc.
Workflow
The total of termination costs, hiring costs,
training costs and other costs related to
replacing a worker.
Turnover costs
The XML based approach to tagging financial
statements for financial reporting that
involves elements, taxonomies and mapping.
eXtensible business reporting language (XBRL)
According to our class lecture, the ratio of unstructured data versus structured data in the world today.
95% to 5%
The author of the article “IT doesn’t Matter”
and “Does IT Matter”
Nicholas Carr
• In the analytics maturity model, the most
advanced level of analytics which answers the
question “What should happen”.
Prescriptive Analytics
The URL of UNM’s site where data sets are
shared in XML format.
Opendata.unm.edu
In our Tech Bytes, Mihaela shared that this
company was pairing crypto currency with
wireless networks.
• Helium
Per our lecture, the frequency that a business
is likely to fall victim to ransomware in 2021.
Every 11 seconds
Per our lecture, the most common method of
introducing ransomware is through this
approach.
Email Phishing
The security protocol that involves something
you have, such as a smart phone, and
something you know, such as a password.
Multifactor Authentication (MFA)
A voluntary guide that helps organizations
understand and protect themselves against
cybersecurity risks.
National Institute of Standards Technology
(NIST) Cybersecurity Framework
During this event, a system is flooded with
incoming messages. This creates a bandwidth
problem for the system, forcing it to shut
down, making the data inaccessible to those
who legitimately have access to it.
Denial‐of‐service attack (DoS attack)
• The fast network connection that utilizes light
wavelengths to transfer data.
Optical Fiber
The type of storage that retains data and
information when the power is turned off.
Read Only Memory (ROM)
• The type of software that authenticates users
who attempt to access the network before
establishing a secure connection with the
network.
Virtual Private Network (VPN)
The Cloud Service model that provides end to end vendor managed services, from infrastructure to application. We likened it to ‘dining out’ in our class discussion about ‘Pizza as a service’.
Software as a Service (SaaS)
This aggregation site in Albuquerque New Mexico, run by UNM, provides high speed network connectivity for many government and education entities in the State of New Mexico.
Albuquerque Gigapop (ABQG)
Data that can be organized into hierarchies.
Structured data
• Pieces of data that cannot be linked together
Unstructured data
Data about data is known as ______________.
Metadata
This type of modern database architecture is
most effective in organizing complex data
types such as graphics and multimedia.
Object‐oriented
• This format is useful for managing web
content and web‐based resources, and is
particularly useful for structuring data for
building mobile applications
Extensible Markup Language (XML)
The term for individual facts or pieces of
information.
Data
A major characteristic of this service is that it
enables better accessibility to data in terms of
place and time.
Cloud computing
Three core characteristics of valuable
information.
- Timeliness
- Accuracy
- Completeness
Facts that are assembled and analyzed to add
meaningfulness and usefulness.
information
• ERP stands for this
Enterprise Resource Planning
According to our lecture, the Charleston Police
Department is using Big Data to do this.
Predict Crime
The phone number for the UNM IT Support
Desk?
277‐5757
We learned that this unusual form of crypto
currency leverages art, photos and the like.
Non‐Fungible Tokens (NFT)
In Tech Bytes we learned that this car
manufacturer is making color changing cars.
BMW
In Tech Bytes we learned that this telescope
will soon render clearer views of space than
the Hubble telescope
James Webb
We originally learned that the quality of
information could be characterized by
timeliness, accuracy and completeness. We
later learned that there were 4 additional
components to consider in information
quality.
- Precision
- Consistency
- Bias
- Duplication
In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for
Distributed Denial of Service.
As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or
Tiny Banker Trojan.
A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a(n)
keystroke logger.
Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system’s security measures?
white-hat hackers
How do breach and attack simulation technologies help white-hat hackers test security?
They execute thousands of attack techniques continuously to reveal weaknesses.
One version of this type of malware encrypts a victim’s data until a payment is made. Another version threatens to make public a ’victim’s personal data unless a payment is made. This type of malware is called
ransomware.
According to our lecture, the average ransom demand in a ransomware situation is what % of a company’s global revenue?
1 to 1.5%
A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.
cybercrime
What security control is referred to as something you have and something you know?
Multifactor authentication
Specialized hardware or software that capture packets transmitted over a network are called packet
Sniffers
Sharing infected files and opening an infected email attachment are ways digital device users
spread computer viruses.
what is an example of spear phishing?
An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.
What is the purpose of social engineering in conjunction with ransomware?
tricks victims into allowing access to data
What is the only way to guarantee that computers and networks are safe from cyberattacks?
Take them offline.
A program that appears to be legitimate but executes an unwanted activity when activated is called a
Trojan
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.
DOS
According to our lecture, the number 1 cause of malware infections, accounting for an alarming 45% of infections, is what?
Email Phishing
How does a firewall work?
It determines what Internet traffic can leave or enter a network or computer.
What is the term that involves a Ransomer releasing private information collected during a ransom attack?
Doxing
According to our lecture, a business will fall victim to ransomware how often in 2021?
Every 11 seconds
To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to
keep user logins and passwords confidential.
What is a cybersecurity threat?
an event that can lead to IT asset loss and the negative consequences
“Cybersecurity threat mitigation” includes all of the policies, procedures, and tools that help organizations________
anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.
This involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities.
Exception reporting
In which situation should the origin of information be authenticated to protect data integrity?
when electronic votes are submitted during an election
Conrad was disturbed to find evidence of applications he did not download, system configurations unexpectedly altered, and files mysteriously that disappeared and moved. Which cybersecurity threat best explains the problems he was having?
a rootkit
The name of Google’s project to apply analytics to characteristics of effective management.
Oxygen
What does the General Data Protection Regulation (GDPR) strive to achieve?
to ensure EU companies protect the privacy and personal data of EU citizens
What is the definition of a cybersecurity exploit?
It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.
Spyware’s basic function is to
capture the user’s account data, passwords, keystrokes, and more.
Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?
man-in-the-middle (MitM)
What is a keylogger?
It is surveillance malware that captures confidential information through keyboard input.
What is the meaning of the term “social engineering” in the area of cybersecurity?
the act of manipulating or tricking people into sharing confidential, personal information
Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?
DDOS attacks
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
outline specific recovery times for information technology to resume after an issue occurs
Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.
The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.
The goal of using eXtensible Business Reporting Language (XBLR) in compliance reporting is to ________.
develop a common language for all accounting and business reports
Why is a denial-of-service attack (DoS attack) a threat to data availability?
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.
Ransomware basically holds a target hostage because it
makes the target’s own data inaccessible
A cybersecurity exploit allows a hacker or intruder to
remotely access a network, gain privileges, and make unauthorized changes.
Calculating reordering points and order quantity levels are key advantages of modern
inventory management systems.
Of the following statements, choose one that provides the underlying reason a company invests in a customer relationship management system (CRM).
It is far less expensive to retain an existing customer than to acquire a new one.
Human resource management systems are invaluable to HR managers who lack legal expertise because the systems
ensure that HR actions comply with governmental regulations.
In a relational database, information is organized into tables in which each row represents a(n) ________.
Record
Recognizing that inappropriate and inconsistent pay can demotivate the strongest workforce, many firms use
compensation management software.
Which stage of the project management process involves documenting the lessons learned during the project’s execution?
Closure Stage
Of these business management systems, which one is focused on how managers can develop a lasting relationship with individual customers that promotes long-term buying?
customer relationship management system
In our lecture, we learned about this Artificial Intelligence effort by Google through examples of it making appointments and reservations.
Duplex
In a university database, the student table, with student ID as a primary key, is linked to the university department table through its primary key-department ID. In the student table, department ID is a ________.
Foreign Key
Recruiting and hiring management software can help HR managers evaluate how their organization’s future staffing needs are influenced by
internal factors such as employee turnover and external factors such as public demand for the organization’s products.
The holistic, balanced set of measures which reflect the different drivers that contribute to superior performance and the achievement of the enterprise’s strategic goals.
Balanced Score Card
In the analytics maturity model, the most advanced level of analytics which answers the question “What should happen”, is ______________________.
Prescriptive Analytics
Payscale.com, Payfactors.com, and Salary.com are sites that offer
employee compensation management solutions.
A key component, and major advantage, of an ERP is its
centralized database.
What occurs during the process optimization step of business process management?
Managers adapt (modify) the process to enhance process performance.
How is metadata related to information?
It helps clarify the nature of the information.
Which of the following is a tool commonly used by project managers and accessed using project management software?
Gantt charts
What business management system seeks to streamline an organization’s activities to prevent backlogs and inefficiencies?
Business Process Management (BPM)
What must be integrated into an organization’s enterprise resource management solution to allow it to create and maintain regulatory and compliance information from a centralized location?
financial management systems software
The amount of time that passes between when a device is asked to perform and when it completes the task is known as
latency.
___________ is a federal law mandating all electronic and information technology developed, procured, maintained or used by the federal government be accessible to people with disabilities.
Section 508
Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.
analyzing
While using her phone’s GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone’s GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?
proximity location
Which type of collaboration software could best help an organization increase engagement between remote employees and those who are “in-house” or organization-based?
cloud-based forums, messaging, and meeting apps
In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with
disaster recovery.
What is the key reason to implement cloud computing into one’s personal and/or business data and information processing?
Cloud computing diminishes the need to store files and software on a local drive.
The main advantage of the IPv6 format for IP addresses is that
it can accommodate many more addresses than the IPv4 format.
The purpose of the application protocol layer of TCP/IP is to
define how email programs and other software communicate within and across networks.
When creating a database field, we set ________ for each field to decrease data input mistakes.
data types
UNM manages this aggregation site for high speed, low cost network services that takes advantage of peering services in the state, and with consortiums such as WRN and Internet 2.
Albuquerque Gigapop
The organization that makes best practice recommendations to make the web “available to all people, whatever their hardware, software, network infrastructure, native language, culture, geographical location, or physical or mental ability” is
World Wide Web Consortium (W3C)
A ________ is also known as a question. A request for information from a database.
query
Amazon, Kamatera, Salesforce, and Google are all examples of
cloud service providers.
Data redundancy is the ________ of data.
duplication
A cloud database infrastructure integrates computer hardware and operating system in an internet-based ________.
datacenter
Kokopelli University, a public institute of higher education, decides to create a web site to provide prospective students information about their college. While selecting a domain name, which of the following top-level domains would best suit their goals?
.edu
_________________ relationship is a(n) e-commerce relationship in which organizations buy and sell products or services online from or to one another.
business to business (B2B)
The essential RDBMS functions; create, read, update, and delete data is collectively referred to as which acronym?
CRUD
The unique global address for a web page or other resource on the Internet is called the ________.
uniform resource locator
Data flows between different computer parts via ________.
buses
The smallest image element is a(n) ________.
pixel
Binary language consists of two digits, ________ and ________.
0; 1
Which of the following is NOT primarily associated with working from home?
Office Densification
The SSD cost is ________ than the traditional hard drive cost.
higher
A wireless short-range transmission protocol is called ________.
Bluetooth
The ________ speed of the processor dictates the number of instructions that CPU can process per second.
clock
The ________ is a separate processor (computer) on your computer that enhances your video.
Graphic processor (GPU)
Which chip and manufacturing company is the largest in the world?
Intel
According to the TED talk we viewed on Quantum computing, the basic building block of a Quantum Computer is
A qubit
SCCM and JAMF help in the enterprise management of computers connected to a business network in all of these ways ACCEPT
Replacing a broken harddrive
The type of storage that retains data and information when the power is turned off is called ________.
ROM (Read Only Memory)
The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.
not saved
This type of connector is the most common type of connection to a Windows computer for peripherals (printers, monitors, storage devices etc.).
USB
According to Gartner Research, which computer manufacturer had the largest market share in the US in 2019?
Dell
UNM’s Center for Advanced Research Computing is this type of a computer resource:
Super Computer
The type of storage that retains data and information when the power is turned off is called ________.
ROM (Read Only Memory)
What is the software solution that we discussed as an example of a comprehensive suite of tools that largely addresses two major role of information systems, to include collaborating on a team and improving individual productivity?
Microsoft M365
A multi-core processor has two or more ________; and is capable of ________.
cores, hyperthreading
The correct way to measure the screen size of a computer monitor is?
diagonally from one corner to the other
The ________ speed of the processor dictates the number of instructions that CPU can process per second.
clock
The ________ is a separate processor (computer) on your computer that enhances your video.
Graphic processor (GPU)
The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.
Not saved
The boot process consists of how many steps.
4
ITIL is a best practice service management framework for delivering information technology services. The ITIL term that describes the front-door, single point of contact for reporting and triaging IT related questions and issues is:
Service Desk
What type of system is used to assist with processes that rely on a large number of inputs that frequently change?
Decision support system
Which statement best describes the impact of management information systems (MIS) for communication?
They have vastly improved organizations’ ability to communicate effectively and efficiently.
The chief information security officer heads the IT department in most organizations.
False
How does supply chain visibility provided by a supply chain management system reduce the bullwhip effect?
Accurately predicting how many units of an item are expected to sell allows manufacturers to accurately source for the correct amount of raw materials and avoid overreacting to fluctuations in consumer demand.
The four components of Information Technology: are People, Process, Technology and Data.
true
A common, basic condition for most flextime policies is the requirement that employees must
be able to fulfill their work responsibilities, including attending certain meetings or events in-person.
What did Peter Drucker mean by “decentralization”?
Organizations work at what they do best and have a comparative advantage and outsource the work at which they have no advantage.
How are managers’ jobs expected to change as management information system (MIS) technology and tools improve?
Managers will be freed from tasks performed by online services or staff using collaboration tools.
Mary Parker Follett’s theory of management is based on the principle that
success depends on the flow of ideas from all levels of an organization.
What is the key role of a client-server network in business?
To provide personal computer users secured access to shared data.
A videoconference may be a better choice than a voice conference call because it allows
better communication through nonverbal cues.
What are piolits experiencing?
5g potientially interfereing with systems.
What is helium
pairing cyptro currency with hotspots
How has APD been using GIS?
Using cell towers to track criminals
What is sony working on?
satelite that takes pictures from sapce that oyu can rent
What are the oscars using for their trophies?
same gold used on NASA high powered satelites
What is apple working on?
Face id through mask
what is fitbit working on
magentic sensor for mask
a space x rocket may be hitting what?
the moon
What is nasa newest venture
telescope that can see into darkness