CIS exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

File management environment; information silos

From the mid-1950s until the early 1970s, organizations managed their data in a _________; this created _______

Which of the following data is NOT currently collected by usage-based car insurance companies?

GPS

Acceptance

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.

ISP (Internet Service Provider)

Network neutrality is an operating model under which _______ must allow customers equal access to content and applications, regardless of the source or nature of the content

Disseminating

Performance Bicycle uses employee knowledge to help customers find products and relevant multimedia content about them. This is an example of ______ knowledge in the KMS cycle

financial; Enron

The Sarbanes-Oxley Act requires publicly held companies to implement _______ controls; it was passed to address the ______ crisis.

Employee Purchasing and Employee Consumer Tax

The US Office of Personnel Management hack involved the loss of _________ information.

common good

The ___________ approach highlights the interlocking relationships that underlie all societies

two

The relational database model is based on the concept of ________-dimensional tables

Hadoop; structured and unstructured data

TrueCar adopted _______ because it had to handle _________

Cyberterrorism

US government considers the Sony attack an act of?

slack

________ is a cloud-based team communication and collaboration software program that helps company employees communicate in real time.

Difficult to work with

________ is a disadvantage of fiber-optic cable

NIC (Network Interface Card)

________ s allow devices to physically connect to the LAN's communication's medium

Fiber-optic

__________ is a cable medium

VPN (Virtual Private Network)

__________ is a private network that uses a public network to connect users.

Wells Fargo Bank

__________ is the most recent example of ethical misbehavior in organizations

Nationwide

___________ does NOT offer usage-based automobile insurance

Rights Approach

ethical action is the one that best protects and respects the moral rights of the affected parties.

deontology approach

morality of an action is based on whether that action itself is right or wrong under a series of rules

utilitarian approach

most good, least harm

Common Good Approach

respect and compassion for all others is the basis for ethical actions

fairness approach

treats everyone equally

Disturbing the roadside assistance Industry

-App based roadside assistance -Honk and Urgent.ly face competition with AAA because of membership perks

Raytheon

-CAVE allows for 3D models of technical blue prints

attack on internet

-Dyn ddos -better security

Lest connected country

-Eritrea -Telecommunications controlled by government -gov't ordered internet service to improve economy

Cuba Information Technology

-No internet access -Revolico the craigslist of Cuba. Gov't blocked site. -AlaMesa promotes cuban culinary culture -Cuban allows WIFI and Hotspots but can't afford them

Ukrane cyber attack

-attacked power distribution center -spear phishing -ddos -better security -back ups

Mariott

-blocks guests wifi -FCC fined hotel

Cancer

-can't give medical records online -Flatiron oncology cloud -match suitable patients with clinic trials

slack

-cloud based team communication

Target expands to Canada

-could not calculate shelf space because of imperial and metric system

Fit problem

-customers not happy with clothing fit -takes data from other brands -virtual fit

Office management breach

-data breaches -info stolen (employees, contractors applicants and family members) -2 fact auth

USPS

-developing services that could disrupt usps services -sensors to help the expansion of smart technology in four areas

online courses

-difficult to grasp the level of student understanding

Free data

-expensive wireless data -Jana mCent -free data at the cost of personal information

Credit card fraud

-fraudulent transactions -trustev erasing data after 90 days -analyzing shoppers behavior while they browse and buy online

Democratic nation comittee

-hackers compromised system -blamed russian hackers -no definite proof who was responsible

Stingray

-harvest information from texts, emails, calls -data must be deleted daily

Ebola

-heatmaps that link the spread of the virus -public mobile call with specific location

Chevron

-improving BPR to BPM to raise funds through improving the company

Cardian hacking

-information leaked online -corporate espionage

Bike

-knowledge transfer sessions

Volkswagon

-manipulated emissions test -stopped selling

Bank of America

-measures to to eliminate problems that led to near death after financial crisis -Simplified IT infrastructures and created apps

Ransomware

-medical center cyberattack -ransomware blocked access to system -decryption key ransom payment

tracking pot

-microchip each plant -entering in info twice -Franwell is looking into developing systems

Ashley Madison

-not completely deleting profiles -hacked site and extorted users

google fiber

-not knowing where to place fiber optic cables -3rd party telephone poles, underground

tracking automobile

-price policy for existing customers -collecting and storing data while monitoring driving habits

Football VR

-reduce physical wear and tear of drills -VR mental experiences

Network neutrality

-ruled unconstitutional -new limits on broadband

Fanfuel and Draft Kings

-simple and fast fantasy betting -only if gov't and state allowed -litigation -60% of players wagering 10,000 a year -seeking regular and legal clarity on gambling issues

Forgotten

-software to remove links

Facebook problem

-surveys -users not reading terms

Bit

A ________ represents the smallest unit of data a computer can process

Patent

A _____________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

Zappos

According to the Chapter 3 Opening Case, who did NOT get fined for blocking Wi-Fi access?

True

An intranet is a trusted network. True or False

Internet

An/The ______________ is a network of networks

a human error; unintentional

Careless Internet surfing is _________ and is an _________ mistake.

Non-volatile; cannot

Data marts and data warehouses are ________; this means they _____ be updated by users


Conjuntos de estudio relacionados

Natural, Human, and Capital Resources

View Set

LearningCurve: 15a. Introduction to Therapy and the Psychological Therapies

View Set

Chapter 1 canvas notes and HW problems

View Set

BSlauga. Tuštinimasis. Šlapinimasis

View Set

Gen Psych Quiz 9 Psychological Disorders

View Set

3G - gradable and extreme adjectives

View Set

physics 2 practice exams 2017, 2018, 2019 mcq

View Set