Intro To Info. Mgmt Final Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Customer Relationship Management (CRM)

An approach to manage a company's interaction with current and potential customers. It uses data analysis about customers history to improve relationships. (Customer Retention)

Structured Data Unstructured DATA Machine Generated Data Human-Generated Data

A) Stored in a traditional system such as a relational database or spreadsheet B)Data that is not stored in a logical, organized way C)Created by a machine without human intervention D)Data that humans, in interaction with computers, generate

Which step in the Systems Development concerns itself with creating a blueprint of what the information system should look like A) Planning b) anaylsis c) design d) development

C) Design

The actual work that takes place to create the software such as software programming and database configuration is called what in the SDLC

Development phase

What is a domain Name Server (DNS)?

Essentially a giant phone book for the internet

What makes a computer a computer?

Input Processor Memory Output

Verifying that separate systems can work together is called

Integration testing

Enterprise Resource Planning (ERP)

NOT A SOFTWARE SOLUTION... it describes the integration of many different systems. Usually referred to as a category of business management software that an organization can use to collect, store, manage and interpret data from the Many different business actions

Using both legacy system and new system until all users verify that the new systems functions correctly is called

Parallel Implementation

Three primary areas of information security are

People, data, and systems

Which was not discussed as a driving factor in the trend of outsourcing systems development

The internet and globalization

Link Layer Internet Layer Transport Layer Application layer

A) Physical Layer, ethernet cable or wifi card B) Deals with addressing C) Deals with actual transportation of data D) Deals with interpreting the data

DATA INFORMATION BUISNESS INTELLEGENCE KNOWLEDGE

A) Raw facts that describe the characteristics of an event or object B) Data converted into a meaningful and useful context C) Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making D) Gain knowledge from info given

Firmware (example) Operating System (example) Application Software (example)

A) Software that is embedded in your hardware in some type of non-volatile memory (BIOS) B) An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. (Windows) C) Microsoft Word

Worms Trojan horse Ransomware

A) Standalone app. Unlike a virus, it does not need a host application. B) a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. (Usually from email) C) a type of malicious software designed to block access to a computer system until a sum of money is paid.

Virus Adware Spyware

A) a contagious piece of code that infects the other software on the host system and spreads itself once it is run. It is mostly known to spread when software is shared between computers. B) also known as advertisement-supported software. Creators of adware include advertisements or help distribute other software to earn money. C) unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.

What are some examples of Cloud Solutions

Any Social media platform Any streaming platform Cloud Software (Office 365 and Salesforce) Microsoft Azure

In project management, a logical relationship between the project tasks is called

Dependency

What was not discussed as a form of intellectual property when it comes to technology

Fair use Doctrine

T or F: when an email is sent it only exists in one place at a time

False

What is the internet of things (IOT)?

Objects that are not a laptop or desktop but still connected to the internet (Amazon Alexa, Smart TV, Nest Thermostat, etc...)

What is the first line of defense against Malware?

People. The biggest issue surrounding information security is not a technical issue, but a people issue

What items are considered sources of unplanned downtime for a business

Power Outage Network Failure Corrupted Data

What is virtualization?

Refers to the creation of a virtual resource such as a server, desktop, operating system, storage, or network (Running Windows on a Mac)

Which of the following is listed as a constraint when managing projects

SDLC (Systems development life cycle)

What are the 3 main components of Management Information Systems (MIS) ?

Software Hardware Network

T or F: Most large scale IT projects fail due to people

True

T or F: PERT is a graphical network model that depict a projects task and the relationships between those tasks

True

T or F: in project management the critical path informs a project manager of the timeframe the project could possibly be completed

True

What type of hacker usually does not have malicious intent

White-hat hacker

Enterprise Software

computer software used to satisfy the needs of an organization rather than individual users


Conjuntos de estudio relacionados

symptoms of the gastrointestinal system

View Set

Chemistry Semester 2 Chapter 15 Test

View Set

II Lecture Chapter 20 Fill in the Blank: Diagnostic Examinations pp 433

View Set

MARK 300 Chapter Four DSM and Warm Up

View Set

Macro Test 30 Money growth and inflation

View Set

Exam 3 - Art History - Questions

View Set

Chapter 28: Child, Older Adult, and Intimate Partner Violence

View Set