Exam 1 study guide Flashcards

1
Q

The title of the position that heads the IT

department in most organizations.

A

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

•A supervisor who frequently gives feedback to
the employees who report to her—both to
praise them and to let them know areas
where they can improve—notices that
employee productivity rises. This is known as
what?

A

The Hawthorne Effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ITIL term that describes the front‐door,
single point of contact for reporting and
triaging IT related questions and issues.

A

Service Desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is quoted as saying “Do what you do best

and outsource the rest”?

A

Peter Drucker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Four components of Information Technology

A

People
• Process
• Technology
• Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This product made by Google in 2012/2013
initially failed due to both cost and privacy
issues.

A

Google Glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Per our lecture, this computer brand had the
largest market share in North America in 2019,
with 30.81% of the market.

A

Dell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The hypothesis that states that roughly every
two years the number of transistors on an
integrated circuit doubles is known as what?

A

Moore’s Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• This satellite based service offered by Elon
Musk’s SpaceX provides high speed, low
latency broadband internet to individuals in
locations that do not have a fiber
infrastructure.

A

Starlink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UNM’s powerful supercomputing facility that is
used to facilitate high speed processing related
to Research is called what?

A

UNM Center for Advanced Research

Computing (CARC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
This is an example of what programming
language:
SELECT LastName, FirstName, EmployeeID
FROM Employees
WHERE LastName = “Park”
A

Structured Query Language (SQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The name of the position responsible for
managing, tuning, patching and updating a
database

A

Database Administrator (DBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is the term that addresses the planning
for governance, data stewardship, and data
architecture.

A

Master data management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• A supplemental system that is prepared by an
individual or department and may contain a
separate version of the truth.

A

Shadow system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One employee record with multiple job
records is an example of this type of
relationship.

A

One‐to‐many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Modules such as general ledger, travel and
expense management, and asset management
are typically included in a ________
management system.

A

Financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the central element
of the human capital management (HCM)
information system?

A

Employee record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The technology that enables task routing and
automation for things like authorizations,
hiring, etc.

A

Workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The total of termination costs, hiring costs,
training costs and other costs related to
replacing a worker.

A

Turnover costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The XML based approach to tagging financial
statements for financial reporting that
involves elements, taxonomies and mapping.

A

eXtensible business reporting language (XBRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
According to our class lecture, the ratio of
unstructured data versus structured data in
the world today.
A

95% to 5%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The author of the article “IT doesn’t Matter”

and “Does IT Matter”

A

Nicholas Carr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

• In the analytics maturity model, the most
advanced level of analytics which answers the
question “What should happen”.

A

Prescriptive Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The URL of UNM’s site where data sets are

shared in XML format.

A

Opendata.unm.edu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In our Tech Bytes, Mihaela shared that this company was pairing crypto currency with wireless networks.
• Helium
26
Per our lecture, the frequency that a business | is likely to fall victim to ransomware in 2021.
Every 11 seconds
27
Per our lecture, the most common method of introducing ransomware is through this approach.
Email Phishing
28
The security protocol that involves something you have, such as a smart phone, and something you know, such as a password.
Multifactor Authentication (MFA)
29
A voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.
National Institute of Standards Technology | (NIST) Cybersecurity Framework
30
During this event, a system is flooded with incoming messages. This creates a bandwidth problem for the system, forcing it to shut down, making the data inaccessible to those who legitimately have access to it.
Denial‐of‐service attack (DoS attack)
31
• The fast network connection that utilizes light | wavelengths to transfer data.
Optical Fiber
32
The type of storage that retains data and | information when the power is turned off.
Read Only Memory (ROM)
33
• The type of software that authenticates users who attempt to access the network before establishing a secure connection with the network.
Virtual Private Network (VPN)
34
``` The Cloud Service model that provides end to end vendor managed services, from infrastructure to application. We likened it to ‘dining out’ in our class discussion about ‘Pizza as a service’. ```
Software as a Service (SaaS)
35
``` This aggregation site in Albuquerque New Mexico, run by UNM, provides high speed network connectivity for many government and education entities in the State of New Mexico. ```
Albuquerque Gigapop (ABQG)
36
Data that can be organized into hierarchies.
Structured data
37
• Pieces of data that cannot be linked together
Unstructured data
38
Data about data is known as ______________.
Metadata
39
This type of modern database architecture is most effective in organizing complex data types such as graphics and multimedia.
Object‐oriented
40
• This format is useful for managing web content and web‐based resources, and is particularly useful for structuring data for building mobile applications
Extensible Markup Language (XML)
41
The term for individual facts or pieces of | information.
Data
42
A major characteristic of this service is that it enables better accessibility to data in terms of place and time.
Cloud computing
43
Three core characteristics of valuable | information.
* Timeliness * Accuracy * Completeness
44
Facts that are assembled and analyzed to add | meaningfulness and usefulness.
information
45
• ERP stands for this
Enterprise Resource Planning
46
According to our lecture, the Charleston Police | Department is using Big Data to do this.
Predict Crime
47
The phone number for the UNM IT Support | Desk?
277‐5757
48
We learned that this unusual form of crypto | currency leverages art, photos and the like.
Non‐Fungible Tokens (NFT)
49
In Tech Bytes we learned that this car | manufacturer is making color changing cars.
BMW
50
In Tech Bytes we learned that this telescope will soon render clearer views of space than the Hubble telescope
James Webb
51
We originally learned that the quality of information could be characterized by timeliness, accuracy and completeness. We later learned that there were 4 additional components to consider in information quality.
* Precision * Consistency * Bias * Duplication
52
In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for
Distributed Denial of Service.
53
As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or
Tiny Banker Trojan.
54
A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a(n)
keystroke logger.
55
Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system’s security measures?
white-hat hackers
56
How do breach and attack simulation technologies help white-hat hackers test security?
They execute thousands of attack techniques continuously to reveal weaknesses.
57
One version of this type of malware encrypts a victim’s data until a payment is made. Another version threatens to make public a ’victim’s personal data unless a payment is made. This type of malware is called
ransomware.
58
According to our lecture, the average ransom demand in a ransomware situation is what % of a company's global revenue?
1 to 1.5%
59
A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.
cybercrime
60
What security control is referred to as something you have and something you know?
Multifactor authentication
61
Specialized hardware or software that capture packets transmitted over a network are called packet
Sniffers
62
Sharing infected files and opening an infected email attachment are ways digital device users
spread computer viruses.
63
what is an example of spear phishing?
An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.
64
What is the purpose of social engineering in conjunction with ransomware?
tricks victims into allowing access to data
65
What is the only way to guarantee that computers and networks are safe from cyberattacks?
Take them offline.
66
A program that appears to be legitimate but executes an unwanted activity when activated is called a
Trojan
67
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.
DOS
68
According to our lecture, the number 1 cause of malware infections, accounting for an alarming 45% of infections, is what?
Email Phishing
69
How does a firewall work?
It determines what Internet traffic can leave or enter a network or computer.
70
What is the term that involves a Ransomer releasing private information collected during a ransom attack?
Doxing
71
According to our lecture, a business will fall victim to ransomware how often in 2021?
Every 11 seconds
72
To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to
keep user logins and passwords confidential.
73
What is a cybersecurity threat?
an event that can lead to IT asset loss and the negative consequences
74
“Cybersecurity threat mitigation” includes all of the policies, procedures, and tools that help organizations________
anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.
75
This involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities.
Exception reporting
76
In which situation should the origin of information be authenticated to protect data integrity?
when electronic votes are submitted during an election
77
Conrad was disturbed to find evidence of applications he did not download, system configurations unexpectedly altered, and files mysteriously that disappeared and moved. Which cybersecurity threat best explains the problems he was having?
a rootkit
78
The name of Google’s project to apply analytics to characteristics of effective management.
Oxygen
79
What does the General Data Protection Regulation (GDPR) strive to achieve?
to ensure EU companies protect the privacy and personal data of EU citizens
80
What is the definition of a cybersecurity exploit?
It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.
81
Spyware’s basic function is to
capture the user’s account data, passwords, keystrokes, and more.
82
Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?
man-in-the-middle (MitM)
83
What is a keylogger?
It is surveillance malware that captures confidential information through keyboard input.
84
What is the meaning of the term “social engineering” in the area of cybersecurity?
the act of manipulating or tricking people into sharing confidential, personal information
85
Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?
DDOS attacks
86
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
outline specific recovery times for information technology to resume after an issue occurs
87
Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.
The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.
88
The goal of using eXtensible Business Reporting Language (XBLR) in compliance reporting is to ________.
develop a common language for all accounting and business reports
89
Why is a denial-of-service attack (DoS attack) a threat to data availability?
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.
90
Ransomware basically holds a target hostage because it
makes the target’s own data inaccessible
91
A cybersecurity exploit allows a hacker or intruder to
remotely access a network, gain privileges, and make unauthorized changes.
92
Calculating reordering points and order quantity levels are key advantages of modern
inventory management systems.
93
Of the following statements, choose one that provides the underlying reason a company invests in a customer relationship management system (CRM).
It is far less expensive to retain an existing customer than to acquire a new one.
94
Human resource management systems are invaluable to HR managers who lack legal expertise because the systems
ensure that HR actions comply with governmental regulations.
95
In a relational database, information is organized into tables in which each row represents a(n) ________.
Record
96
Recognizing that inappropriate and inconsistent pay can demotivate the strongest workforce, many firms use
compensation management software.
97
Which stage of the project management process involves documenting the lessons learned during the project’s execution?
Closure Stage
98
Of these business management systems, which one is focused on how managers can develop a lasting relationship with individual customers that promotes long-term buying?
customer relationship management system
99
In our lecture, we learned about this Artificial Intelligence effort by Google through examples of it making appointments and reservations.
Duplex
100
In a university database, the student table, with student ID as a primary key, is linked to the university department table through its primary key-department ID. In the student table, department ID is a ________.
Foreign Key
101
Recruiting and hiring management software can help HR managers evaluate how their organization’s future staffing needs are influenced by
internal factors such as employee turnover and external factors such as public demand for the organization’s products.
102
The holistic, balanced set of measures which reflect the different drivers that contribute to superior performance and the achievement of the enterprise’s strategic goals.
Balanced Score Card
103
In the analytics maturity model, the most advanced level of analytics which answers the question “What should happen”, is ______________________.
Prescriptive Analytics
104
Payscale.com, Payfactors.com, and Salary.com are sites that offer
employee compensation management solutions.
105
A key component, and major advantage, of an ERP is its
centralized database.
106
What occurs during the process optimization step of business process management?
Managers adapt (modify) the process to enhance process performance.
107
How is metadata related to information?
It helps clarify the nature of the information.
108
Which of the following is a tool commonly used by project managers and accessed using project management software?
Gantt charts
109
What business management system seeks to streamline an organization’s activities to prevent backlogs and inefficiencies?
Business Process Management (BPM)
110
What must be integrated into an organization’s enterprise resource management solution to allow it to create and maintain regulatory and compliance information from a centralized location?
financial management systems software
111
The amount of time that passes between when a device is asked to perform and when it completes the task is known as
latency.
112
___________ is a federal law mandating all electronic and information technology developed, procured, maintained or used by the federal government be accessible to people with disabilities.
Section 508
113
Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.
analyzing
114
While using her phone’s GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone’s GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?
proximity location
115
Which type of collaboration software could best help an organization increase engagement between remote employees and those who are “in-house” or organization-based?
cloud-based forums, messaging, and meeting apps
116
In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with
disaster recovery.
117
What is the key reason to implement cloud computing into one’s personal and/or business data and information processing?
Cloud computing diminishes the need to store files and software on a local drive.
118
The main advantage of the IPv6 format for IP addresses is that
it can accommodate many more addresses than the IPv4 format.
119
The purpose of the application protocol layer of TCP/IP is to
define how email programs and other software communicate within and across networks.
120
When creating a database field, we set ________ for each field to decrease data input mistakes.
data types
121
UNM manages this aggregation site for high speed, low cost network services that takes advantage of peering services in the state, and with consortiums such as WRN and Internet 2.
Albuquerque Gigapop
122
The organization that makes best practice recommendations to make the web “available to all people, whatever their hardware, software, network infrastructure, native language, culture, geographical location, or physical or mental ability” is
World Wide Web Consortium (W3C)
123
A ________ is also known as a question. A request for information from a database.
query
124
Amazon, Kamatera, Salesforce, and Google are all examples of
cloud service providers.
125
Data redundancy is the ________ of data.
duplication
126
A cloud database infrastructure integrates computer hardware and operating system in an internet-based ________.
datacenter
127
Kokopelli University, a public institute of higher education, decides to create a web site to provide prospective students information about their college. While selecting a domain name, which of the following top-level domains would best suit their goals?
.edu
128
_________________ relationship is a(n) e-commerce relationship in which organizations buy and sell products or services online from or to one another.
business to business (B2B)
129
The essential RDBMS functions; create, read, update, and delete data is collectively referred to as which acronym?
CRUD
130
The unique global address for a web page or other resource on the Internet is called the ________.
uniform resource locator
131
Data flows between different computer parts via ________.
buses
132
The smallest image element is a(n) ________.
pixel
133
Binary language consists of two digits, ________ and ________.
0; 1
134
Which of the following is NOT primarily associated with working from home?
Office Densification
135
The SSD cost is ________ than the traditional hard drive cost.
higher
136
A wireless short-range transmission protocol is called ________.
Bluetooth
137
The ________ speed of the processor dictates the number of instructions that CPU can process per second.
clock
138
The ________ is a separate processor (computer) on your computer that enhances your video.
Graphic processor (GPU)
139
Which chip and manufacturing company is the largest in the world?
Intel
140
According to the TED talk we viewed on Quantum computing, the basic building block of a Quantum Computer is
A qubit
141
SCCM and JAMF help in the enterprise management of computers connected to a business network in all of these ways ACCEPT
Replacing a broken harddrive
142
The type of storage that retains data and information when the power is turned off is called ________.
ROM (Read Only Memory)
143
The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.
not saved
144
This type of connector is the most common type of connection to a Windows computer for peripherals (printers, monitors, storage devices etc.).
USB
145
According to Gartner Research, which computer manufacturer had the largest market share in the US in 2019?
Dell
146
UNM's Center for Advanced Research Computing is this type of a computer resource:
Super Computer
147
The type of storage that retains data and information when the power is turned off is called ________.
ROM (Read Only Memory)
148
What is the software solution that we discussed as an example of a comprehensive suite of tools that largely addresses two major role of information systems, to include collaborating on a team and improving individual productivity?
Microsoft M365
149
A multi-core processor has two or more ________; and is capable of ________.
cores, hyperthreading
150
The correct way to measure the screen size of a computer monitor is?
diagonally from one corner to the other
151
The ________ speed of the processor dictates the number of instructions that CPU can process per second.
clock
152
The ________ is a separate processor (computer) on your computer that enhances your video.
Graphic processor (GPU)
153
The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.
Not saved
154
The boot process consists of how many steps.
4
155
ITIL is a best practice service management framework for delivering information technology services. The ITIL term that describes the front-door, single point of contact for reporting and triaging IT related questions and issues is:
Service Desk
156
What type of system is used to assist with processes that rely on a large number of inputs that frequently change?
Decision support system
157
Which statement best describes the impact of management information systems (MIS) for communication?
They have vastly improved organizations’ ability to communicate effectively and efficiently.
158
The chief information security officer heads the IT department in most organizations.
False
159
How does supply chain visibility provided by a supply chain management system reduce the bullwhip effect?
Accurately predicting how many units of an item are expected to sell allows manufacturers to accurately source for the correct amount of raw materials and avoid overreacting to fluctuations in consumer demand.
160
The four components of Information Technology: are People, Process, Technology and Data.
true
161
A common, basic condition for most flextime policies is the requirement that employees must
be able to fulfill their work responsibilities, including attending certain meetings or events in-person.
162
What did Peter Drucker mean by “decentralization”?
Organizations work at what they do best and have a comparative advantage and outsource the work at which they have no advantage.
163
How are managers’ jobs expected to change as management information system (MIS) technology and tools improve?
Managers will be freed from tasks performed by online services or staff using collaboration tools.
164
Mary Parker Follett’s theory of management is based on the principle that
success depends on the flow of ideas from all levels of an organization.
165
What is the key role of a client-server network in business?
To provide personal computer users secured access to shared data.
166
A videoconference may be a better choice than a voice conference call because it allows
better communication through nonverbal cues.
167
What are piolits experiencing?
5g potientially interfereing with systems.
168
What is helium
pairing cyptro currency with hotspots
169
How has APD been using GIS?
Using cell towers to track criminals
170
What is sony working on?
satelite that takes pictures from sapce that oyu can rent
171
What are the oscars using for their trophies?
same gold used on NASA high powered satelites
172
What is apple working on?
Face id through mask
173
what is fitbit working on
magentic sensor for mask
174
a space x rocket may be hitting what?
the moon
175
What is nasa newest venture
telescope that can see into darkness