Technology Management Flashcards

1
Q

data is saved to remote servers that are connected through the Internet—has become a popular way to manage increasing amounts of data.

A

cloud computing services

the appeal of cloud computing. The service subscriber pays only for the amount of memory, processing time, or bandwidth that it uses. The service manages and maintains the hardware and guarantees its security. The cloud offers flexibility and cost savings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three features of “big data”

A

Volume, velocity and variety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Basic components of information systems

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

systems are designed to allow the different parts of an organization to access the same data and perform more efficiently

A

Enterprise resource planning (ERP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

provide employees with access to their personal HR data and the ability to handle many questions and job-related transactions that otherwise would fall to management or administrative staff.

A

Employee self-service (ESS) technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

provide managers with access to current data on their employees and budgets and allow them to perform for themselves transactions that previously required HR’s implementation. This eliminates rounds of e-mails and allows the manager to make a change and move on.

A

Manager self-service (MSS) websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 3 risks associated w/technology

A

Data and system security. Data collection fuels workplace transactions and improves productivity, service, and decision-making. Because of this, data is among an organization’s most important assets. And, as such, it must be protected from unauthorized access and use.

Data privacy. Data collection, storage, and use must be transparent and compliant with government guidelines.

Social and ethical implications. The collection of data leads to the question of how the data will be used. The incorporation of data technology into the workplace introduces the issue of equity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ways to protect access to data and systems & common threats

A

Firewalls, encryption

Hacking, phishing, fake e-cards click link scams, phony security alerts, cyber threats/ransoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly