IS101 Flashcards

1
Q

launched a “moon shot” in 2013 and put on hold in 2017 due to high costs

A

MD Anderson Cancer Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

project made using IBM’s Watson cognitive system to diagnose and recommend
treatment plans for cancer.

A

moon shot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • focusing on the automation of digital and physical tasks
  • analyzed 152 projects
  • The task involves replacing lost credit or ATM cards, updating records across multiple systems
  • The process involves interpreting legal and contractual documents to extract specific provisions
A

PROCESS AUTOMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • 38% of projects utilized algorithms to detect patterns in vast data volumes
  • predict what a particular customer is likely to buy
  • identify credit fraud in real time
A

COGNITIVE INSIGHT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

offers cognitive insights that are more data intensive

A

Machine learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • found that projects involving natural language processing chatbots
  • Intelligent agents provide 24/7 customer service, addressing various issues
  • The company has implemented internal sites to address employee inquiries on IT
A

COGNITIVE ENGAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

understanding the technologies (enumerate)

A
  • creating a portfolio of projects
  • launching pilots
  • business - process redesign
  • scaling up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

companies should systematically evaluate
needs and capabilities

A

Creating a Portfolio of Projects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Companies should conduct pilot projects for cognitive applications

A

Launching Pilots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cognitive technology projects require a systematic redesign of workflows

A

Business-process redesign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

requiring collaboration between technology experts and business process owners

A

Scaling Up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Creating a Portfolio of Projects (three broad areas)

A
  • Identifying the opportunities
  • Determining the use cases
  • Selecting the technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The initial assessment identifies business areas that could benefit most from cognitive applications

A

Identifying the opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cognitive applications can significantly contribute to business success

A

Determining the use cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The third area to assess is whether AI tools are capable of handling specific use cases.

A

Selecting the technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

may be frustrating for companies as they can’t match human problem-solving abilities.

A

Chatbots and intelligent agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

may slow down complex production systems.

A

Robotic process automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • offers a proven reporting framework
  • easy access to detailed data by multiple roles
  • flexibility they have to build their own reports
A

runtime intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

comprehend various intelligence manifestations, analyze their presence and usage

A

Intelligence management professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • Analyze intelligence issues or challenges
  • Identify, describe and critically evaluate information sources
  • Appraise contemporary and emergent threats
A

Intelligence Management Skills and Qualifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intelligence Management Career Options

A

intelligence analysis
intelligence collection
cybersecurity
investigation and compliance
security and law enforcement
data analysis
government affairs
education and training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is the process of developing raw information into finished intelligence for policymakers to use in decision-making and action.

A

Intelligence Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the five steps that constitute the Intelligence Cycle.

A

planning and direction
collection
processing
all source analysis and production
dissemination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The management of the entire process, from data
identification to intelligence product delivery

A

Planning and Direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The CIA gathers raw intelligence from various sources,
including open sources like foreign broadcasts

A

Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The process involves transforming a large amount of data
into a usable format for analysts

A

Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

is crucial in modern intelligence

A

Technical collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Intelligence conversion involves integrating, evaluating,
and analyzing data to create finished intelligence products

A

All Source Analysis and Production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The final step involves distributing finished intelligence
to policymakers

A

Dissemination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

are adopting a SOAR platform and consulting services to improve their security operations centers

A

Mature organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

SOAR stands for?

A

single security orchestration, automation, and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

GPS capabilities in smartphones and vehicles enable marketers to engage consumers in contextual ways.

A

Considerations for Positioning Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Considerations for Positioning Intelligence (enumerate)

A

 Latency in Updating
 Latency in Execution
 Cost of Operation
 Offline Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Places to Put Intelligence

A

 Static Intelligence in the Product
 Client-Side Intelligence
 Server-Centric Intelligence
 Back-End (Cached) Intelligence
 Hybrid Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

refers to the time between a user action and the resulting
response

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

is a major cause of network latency, with servers responding to requests from client devices within 10-15 milliseconds

A

Distance

37
Q

process and route data packets through Internet
Exchange Points (IXPs), sometimes breaking them into smaller packets

A

Routers

38
Q

significantly reduces latency by cacheing static content and distributing servers in multiple locations

A

Content Delivery Network (CDN)

39
Q

can also optimize images, reduce file sizes, and use code minification to minimize render-blocking resources.

A

Web developers

40
Q

can be caused by user issues, and consumers can increase bandwidth if persistent.

A

Network latency

41
Q

improves internet speed and consistency.

A

Switching to Ethernet

42
Q

Intelligence has been categorized into various types, what are those?

A
  • logical
  • linguistic
  • emotional
43
Q

handling math tasks

A

logical intelligence

44
Q

language semantics

A

linguistic intelligence

45
Q

emotional aspects

A

emotional intelligence

46
Q

The paradigm of intelligence identifies three main types:

A
  • static
  • dynamic
  • versatile
47
Q

a type of mental structure resembling the hedgehog is highly valued in educational institutions and is developed through reading books and educational videos.

A

Static intelligence

48
Q

is a broad discipline in IT security, encompassing virus
understanding and machine learning algorithms for detecting malicious behavior

A

Threat intelligence

49
Q

focuses on attacks targeting clients while
interacting with services like websites

A

Client-side threat intelligence

50
Q

Threat intelligence discipline
focuses on service origins, including servers

A

Origin-based threat intelligence

51
Q

Threat intelligence discipline focuses on endpoint devices like PCs

A

Client/endpoint threat intelligence

52
Q

Threat intelligence discipline combines two disciplines to understand attacks

A

Client-side threat intelligence

53
Q

aim to discover new and emerging
threats, crucial for a well-rounded security strategy.

A

Threat-intelligence initiatives

54
Q

uses client signals, such as browser

A

benefits of client-side threat intelligence

55
Q

it relies on data obtained from the browser rather than server logs or request traffic.

A

Gathering client-side cyberthreat data

56
Q

a leading provider of client-side security solutions, uses
a lightweight JavaScript library

A

Ensighten client-side threat intelligence

57
Q

enable data display in various formats

A

VISUALIZATION PLATFORM – THE FRONT-END OF A BI
SOLUTION

58
Q

nearly 50% of data warehouse teams fail to
deliver, leading to misconceptions about visualization software

A

DATA PLATFORM – THE BACK-END OF A COMPLETE BI
SOLUTION

59
Q

is a combination of human and machine
intelligence, focusing on human expertise

A

Hybrid Intelligent (HI)

60
Q

HOW TELEMETRY WORKS?

A

Telemetry uses sensors to measure physical and electrical data,
convert it into electrical voltages and timing data

61
Q
  • is a tool used in software development to automatically
    collect raw data from real-world use, enabling valuable, actionable analytics.
  • Stackify’s Retrace tool, a core component of their Application Monitoring service, offers as a valuable feature
  • is the automatic recording and transmission of data from
    remote sources to an IT system for monitoring and analysis.
A

Telemetry

62
Q

Why Telemetry Is Needed

A

 Make Sure Things Are Working
 Understand Outcomes
 Gather Data to Grow Intelligence

63
Q

Properties of an Effective Telemetry System

A

 Sampling
 Summarizing
 Flexible Targeting

64
Q

Common Challenges in Telemetry

A

 Bias
 Rare Events
 Indirect Value
 Privacy

65
Q

Overview of Intelligence

A

o An Example Intelligence
o Contexts
o Implemented at Runtime
o Available for Intelligence Creation

66
Q

Things Intelligence Can Predict

A

o Classifications
o Probability Estimates
o Regressions
o Rankings
o Hybrids and Combinations

67
Q

BENEFITS OF TELEMETRY

A
  • allows end users to monitor an object or environment remotely, providing insights into what works and is easy for users.
  • offers valuable insights for continuous performance
    monitoring and management
  • allowing end users to feel as though they are being read by the company.
68
Q

Telemetry enables you to answer questions such as:

A
  • Are your customers using the features you expect?
  • How frequently are users engaging with your app, and for what duration?
  • What settings options to users select most?
  • What happens when crashes occur?
69
Q

CHALLENGES OF TELEMETRY

A
  • its main challenge lies with end users’ willingness to allow Big Brother-esque spying, leading to data collection and reporting issues.
  • Users who disallow telemetry technologies may fall into the tech savvy group
70
Q

face challenges in collecting accurate environmental data, especially in harsh conditions.

A

Environmental engineers

71
Q

allowing remote equipment to collect and transmit data wirelessly to devices.

A

Mobile telemetry

72
Q

When choosing telemetry systems, you should consider the following:

A
  • simple set up and installation
  • strong environmental rating
  • sensor compatibility
  • storage and streaming
  • power needs
  • radio transmission
  • industrial applications of telemetry
  • reducing logistics costs
  • easy to install
  • frequency or readings and data transmission
  • data security
73
Q

Web-enabled data security concerns arise due
to the need for unique passwords and identity information for accessing mobile telemetry data

A

DATA SECURITY

74
Q

Telemetry equipment is programmable, allowing for customization to industry needs.

A

FREQUENCY OF READINGS AND DATA TRANSMISSION

75
Q

Mobile telemetry equipment’s design
eliminates power connections and phone lines

A

EASY TO INSTALL

76
Q

The equipment monitors and transfers data to your device, simplifying decision-making and reducing waste on the work site

A

REDUCING LOGISTICS COSTS

77
Q

Telemetry has an incredible variety of applications.

A

INDUSTRIAL APPLICATIONS OF TELEMETRY

78
Q

Mobile telemetry applies in areas such as:

A

 Storage tanks for chemicals, fuel and gases pumps
 Air compressors
 Air conditioning
 Vehicles
 Environmental conditions such as temperatures and
humidity

79
Q

uses various communication modes, including mobile phone networks and satellites, to monitor data.

A

Telemetry equipment

80
Q

Various types of telemetry equipment are available.

A

 HUMIDITY
 TEMPERATURE
 POWER CONSUMPTION
 MOTION
 FLOW
 LIGHT LEVELS
 PRESSURE
 FLOOD
 VIBRATION
 G-FORCE IMPACT
 VOLTAGE

81
Q

provides accurate information at the right time

A

Mobile telemetry

82
Q

is a telemetry engineer specializing in wireless monitoring systems,

A

Robert McKenzie

83
Q

determine if a license is necessary or if it’s
license-free.

A

RADIO TRANSMISSION

84
Q

The equipment’s suitability for your environment depends on its power needs.

A

POWER NEEDS

85
Q

depends on data collection frequency, with real-time
streaming or memory storage.

A

STORAGE AND STREAMING

86
Q

To collect multiple data types with the same equipment, choose telemetry systems with different sensor output compatibility

A

SENSOR COMPATIBILITY

87
Q

Telemetry equipment should be chosen with a robust environmental rating for harsh environments

A

STRONG ENVIRONMENTAL RATING

88
Q

is crucial for tracking animal movement
in an environment

A

SIMPLE SET UP AND INSTALLATION