IT Deck Flashcards

1
Q

analysis of production process to ensure that resources stay within target cost

A

Kaizen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

absolute conformance is

A

perfect compliance with pre-established levels of quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

does lean focus on quality

A

no it focus on waste reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which of the following business process management is all about maximizing throughput

A

theory of constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which of the following business process management is all about identifying cost drivers and add value

A

Activity based costing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which of the following business process management emphasizes cost reduction above production constraint

A

six sigma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 main areas of IT governance are

A
strategic alignment
value delivery
resource management
risk performance 
performance measurement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is best suited to solve problems where there is great uncertainty and ill-defined reporting requirements

A

AIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is included in business transformation systems / IT

A

hardware, software, networks, data, and people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

both parties use the same key to encrypt and decrypt the message so therefore the key must be shared

A

symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in ___ encryption a public key is used to encrypt the message then a private key (which is never transmitted) is used to decrypt the message on the other end

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ are often the first target of a hacker who has gianed access to a network

A

user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the purpose of physical access controls

A

to prevent unauthorized users from computer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly