Exam 1 study guide Flashcards
The title of the position that heads the IT
department in most organizations.
Chief Information Officer
•A supervisor who frequently gives feedback to
the employees who report to her—both to
praise them and to let them know areas
where they can improve—notices that
employee productivity rises. This is known as
what?
The Hawthorne Effect
The ITIL term that describes the front‐door,
single point of contact for reporting and
triaging IT related questions and issues.
Service Desk
Who is quoted as saying “Do what you do best
and outsource the rest”?
Peter Drucker
Four components of Information Technology
People
• Process
• Technology
• Data
This product made by Google in 2012/2013
initially failed due to both cost and privacy
issues.
Google Glass
Per our lecture, this computer brand had the
largest market share in North America in 2019,
with 30.81% of the market.
Dell
The hypothesis that states that roughly every
two years the number of transistors on an
integrated circuit doubles is known as what?
Moore’s Law
• This satellite based service offered by Elon
Musk’s SpaceX provides high speed, low
latency broadband internet to individuals in
locations that do not have a fiber
infrastructure.
Starlink
UNM’s powerful supercomputing facility that is
used to facilitate high speed processing related
to Research is called what?
UNM Center for Advanced Research
Computing (CARC)
This is an example of what programming language: SELECT LastName, FirstName, EmployeeID FROM Employees WHERE LastName = “Park”
Structured Query Language (SQL)
The name of the position responsible for
managing, tuning, patching and updating a
database
Database Administrator (DBA)
This is the term that addresses the planning
for governance, data stewardship, and data
architecture.
Master data management
• A supplemental system that is prepared by an
individual or department and may contain a
separate version of the truth.
Shadow system
One employee record with multiple job
records is an example of this type of
relationship.
One‐to‐many
Modules such as general ledger, travel and
expense management, and asset management
are typically included in a ________
management system.
Financial
Which of the following is the central element
of the human capital management (HCM)
information system?
Employee record
The technology that enables task routing and
automation for things like authorizations,
hiring, etc.
Workflow
The total of termination costs, hiring costs,
training costs and other costs related to
replacing a worker.
Turnover costs
The XML based approach to tagging financial
statements for financial reporting that
involves elements, taxonomies and mapping.
eXtensible business reporting language (XBRL)
According to our class lecture, the ratio of unstructured data versus structured data in the world today.
95% to 5%
The author of the article “IT doesn’t Matter”
and “Does IT Matter”
Nicholas Carr
• In the analytics maturity model, the most
advanced level of analytics which answers the
question “What should happen”.
Prescriptive Analytics
The URL of UNM’s site where data sets are
shared in XML format.
Opendata.unm.edu
In our Tech Bytes, Mihaela shared that this
company was pairing crypto currency with
wireless networks.
• Helium
Per our lecture, the frequency that a business
is likely to fall victim to ransomware in 2021.
Every 11 seconds
Per our lecture, the most common method of
introducing ransomware is through this
approach.
Email Phishing
The security protocol that involves something
you have, such as a smart phone, and
something you know, such as a password.
Multifactor Authentication (MFA)
A voluntary guide that helps organizations
understand and protect themselves against
cybersecurity risks.
National Institute of Standards Technology
(NIST) Cybersecurity Framework
During this event, a system is flooded with
incoming messages. This creates a bandwidth
problem for the system, forcing it to shut
down, making the data inaccessible to those
who legitimately have access to it.
Denial‐of‐service attack (DoS attack)
• The fast network connection that utilizes light
wavelengths to transfer data.
Optical Fiber
The type of storage that retains data and
information when the power is turned off.
Read Only Memory (ROM)
• The type of software that authenticates users
who attempt to access the network before
establishing a secure connection with the
network.
Virtual Private Network (VPN)
The Cloud Service model that provides end to end vendor managed services, from infrastructure to application. We likened it to ‘dining out’ in our class discussion about ‘Pizza as a service’.
Software as a Service (SaaS)
This aggregation site in Albuquerque New Mexico, run by UNM, provides high speed network connectivity for many government and education entities in the State of New Mexico.
Albuquerque Gigapop (ABQG)
Data that can be organized into hierarchies.
Structured data
• Pieces of data that cannot be linked together
Unstructured data
Data about data is known as ______________.
Metadata
This type of modern database architecture is
most effective in organizing complex data
types such as graphics and multimedia.
Object‐oriented
• This format is useful for managing web
content and web‐based resources, and is
particularly useful for structuring data for
building mobile applications
Extensible Markup Language (XML)
The term for individual facts or pieces of
information.
Data
A major characteristic of this service is that it
enables better accessibility to data in terms of
place and time.
Cloud computing
Three core characteristics of valuable
information.
- Timeliness
- Accuracy
- Completeness
Facts that are assembled and analyzed to add
meaningfulness and usefulness.
information
• ERP stands for this
Enterprise Resource Planning
According to our lecture, the Charleston Police
Department is using Big Data to do this.
Predict Crime
The phone number for the UNM IT Support
Desk?
277‐5757
We learned that this unusual form of crypto
currency leverages art, photos and the like.
Non‐Fungible Tokens (NFT)
In Tech Bytes we learned that this car
manufacturer is making color changing cars.
BMW
In Tech Bytes we learned that this telescope
will soon render clearer views of space than
the Hubble telescope
James Webb
We originally learned that the quality of
information could be characterized by
timeliness, accuracy and completeness. We
later learned that there were 4 additional
components to consider in information
quality.
- Precision
- Consistency
- Bias
- Duplication
In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for
Distributed Denial of Service.
As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or
Tiny Banker Trojan.
A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a(n)
keystroke logger.
Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system’s security measures?
white-hat hackers
How do breach and attack simulation technologies help white-hat hackers test security?
They execute thousands of attack techniques continuously to reveal weaknesses.
One version of this type of malware encrypts a victim’s data until a payment is made. Another version threatens to make public a ’victim’s personal data unless a payment is made. This type of malware is called
ransomware.
According to our lecture, the average ransom demand in a ransomware situation is what % of a company’s global revenue?
1 to 1.5%
A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.
cybercrime
What security control is referred to as something you have and something you know?
Multifactor authentication
Specialized hardware or software that capture packets transmitted over a network are called packet
Sniffers
Sharing infected files and opening an infected email attachment are ways digital device users
spread computer viruses.
what is an example of spear phishing?
An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.
What is the purpose of social engineering in conjunction with ransomware?
tricks victims into allowing access to data
What is the only way to guarantee that computers and networks are safe from cyberattacks?
Take them offline.
A program that appears to be legitimate but executes an unwanted activity when activated is called a
Trojan
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.
DOS
According to our lecture, the number 1 cause of malware infections, accounting for an alarming 45% of infections, is what?
Email Phishing
How does a firewall work?
It determines what Internet traffic can leave or enter a network or computer.
What is the term that involves a Ransomer releasing private information collected during a ransom attack?
Doxing