Organization: Technology Management Flashcards

1
Q

Information technology framework and tools for gathering, storing, maintaining, retrieving, revising, and reporting HR data.

A

Human resource information system (HRIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software that is owned, delivered, and managed remotely and delivered over the Internet to contracted customers on a pay-for-use basis or as a subscription based on use metrics.

A

Software as a service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Conversion of data into a format that protects or hides its natural presentation or intended meaning.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ability of a computer to imitate human thought and behavior.

A

Artificial intelligence (AI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Style of computing in which scalable IT-enabled capabilities are delivered as a service using Internet technologies.

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software and/or hardware that filters incoming and outgoing communication according to preset rules.

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software application that automates organizations’ management of the recruiting process (such as accepting application materials, screening applicants, etc.).

A

Applicant tracking system (ATS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Act of deliberately accessing computer data without permission.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Online clustering of individuals in groups with common or shared interests.

A

Social networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Way to collect, organize, store, analyze, and share data.

A

Information system (IS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a computer context, tricking a user into sharing information that can then be used to access systems.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly