D075-OA Study Guide

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

IT Managerial

"Know the business." IT managers require a deep understanding of the inner workings of a business before they can even start applying information technology solutions. IT managers are business professionals first and can be found throughout all core business functions, where they improve business processes through value-added activities.

Cellular Network

the network over which phone calls are made. This connection is between the cell phone and the towers that support the antennas for the chosen cellular network.

Showrooming

the practice of examining merchandise in a physical retail location without purchasing it, and then shopping online for a better deal on the same item

data mining

the process of analyzing data to extract information not offered by the raw data alone

Social Networking

the process of making connections to people with whom digital content is shared.

The output from project management software shows what?

the steps in the system development life cycle (SDLC).

Social Media

the technology or tool that facilitates digital sharing

Cloud-based timesheet tracking software apps

transformed arcane paper time sheets and enabled newer, more efficient, and much more accurate systems that allow time entry, handle many tasks, and create a variety of reports and invoices rapidly and easily.

True or False On-demand cloud computing (ODC) platforms can be used to reduce data storage costs.

true

Peer-to-peer

two computers that are networked together share files between themselves.(no outside or centralized server connection is made between the computers)This allows money to be transferred without any records kept outside the two networked computers. Bitcoins are often transferred this way.

Data warehouses

used to consolidate disparate data in a central location, hold yottabytes of data! Yottabytes are one trillion terabytes of data, and a terabyte is one thousand gigabytes

Text analytics

uses statistical, AI, and linguistic technologies to convert textual information into structured information

Transmission Control Protocol/Internet Protocol (TCP/IP)

was designed to meet this need and to allow devices of different manufacturers and software to communicate seamlessly.

Hardware Technician

who install and repair computers

Trademarks

words, symbols, names or devices used to specify goods and to differentiate them from others

Data Management

(DM) consists of the practices, architectural techniques, and tools for achieving consistent access to and delivery of data across the spectrum of data subject areas and data structure types in the enterprise.

Baggage tags that record data about each piece of luggage

(Questions 1-5 are based on the following scenario.) Charlotte is the operations manager at one of the nation's busiest airports. More than 600 flights depart or arrive at her airport every single day. Safety is not only critical but is defined and monitored by government agencies. Food supply and baggage conveyor systems, maintenance and service vehicles, and, of course, airplanes must all move around the airport's runways and roads without creating hazards or delays for workers or passengers. Airport services including restaurants, shops, medical response, screening and security, and more must all work together seamlessly to ensure the airport runs smoothly and efficiently in order to get passengers to their destinations. Charlotte's job is to make sure that happens. The following questions are about how the Internet of Things (IoT) could affect the various businesses and organizations working together at the airport. What is an example of IoT technology being used to aid airport functions?

Decision support system (DSS)

(Questions 1-5 are based on the following scenario.) Eva is a realtor and owns her own real estate business. She has six employees: an administrative assistant at her small office and five real estate agents. She is successful and has 28 current listings of houses for sale. Eva does not believe that real estate agents should be in an office but should be meeting with prospective buyers and sellers since mobility and being visible to her customers is key to their success. To accomplish this, Eva has investigated mobile technology to assist her in her business. Which system should Eva use to leverage business intelligence and analytics to gain insights into her real estate data?

Applied research

(Questions 1-6 are based on the following scenario.) William and Jack are motorcyclists. They ride to work each day and own a motorcycle repair shop. They started their business fixing friends' motorcycles, and before long they found they had more work than they could handle. Customers began to ask for services such as a website to buy parts and accessories and information on safety and maintenance. William and Jack believe they could expand their business and increase their revenue by adding these services and selling used motorcycles. To make this possible, they need to install and gain expertise in the use of IT. In addition, they have ideas about converting gas-powered motorcycles to electric motorcycles to differentiate their shop from other shops. This would necessitate the collection of new data and connection with additional suppliers and systems. IT will be key to the growth of their company. Which type of research should William and Jack do to understand the electric motorcycles needed to meet customer and industry requirements and needs?

Network Interface Card

- Card installed in a computer - Allows you to connect to a network - Ethernet, telephone, or wireless

Search Engine Marketing

- Purchasing paid advertisements that appear at top of results page - Paying for certain keywords to show up high in rankings in a search engine

Metamorphic Virus

-- A Virus that alters how it appears to avoid detection -- Reproduces within memory or storage

Transform

-- Data is normalized and structured -- Uses rules or lookup tables -- Combines with other data

Topology

-- Mapping of the physical network and logical interconnections between nodes. --- A design in which the network is arranged and laid out.

Star Topology

-- One central node that has each computer or network device attached to the central node -- All data first goes into the central node and is then sent out to its destination Example: Like a bicycle wheel with spokes Most common topology

Network Administrator

-- Responsible for setup and operation of network -- Includes hardware and software

Transaction Processing System

-- Type of information system that collects, stores, modifies and retrieves data transactions -- Supervisors receive the most detailed reports -- Primary source of Decision Support System

Chief technology officers (CTO)

--CTO runs the organization's IT engineering group and serves as the company's top technology architect. --Unlike CIOs, CTOs have to be very inventive and imaginative to be successful. CTOs also collaborate and manage vendors to enhance the company's product or service. --CTOs use IT to enhance the company's products and develop strategies to increase the business's revenue. --CIO mainly deals with internal customers, while a CTO mainly focuses on external customers.

A CRM is three things to a business (customer relationship management)

-A technology that captures all the information listed above and puts it into a structure where reports can be run, analyses can be done, and information can be gleaned to support the business. -A strategy whereby a company uses the CRM to increase business by having the customers know the CRM is there and use it to their advantage. For example, how many clicks does it take to buy something from Amazon once you are a customer? CRM reduces the clicks, thereby reducing the time and increasing the convenience to purchase from them. -A process that a company uses to its advantage to manage relationships with customers.

Chief Information Security Officer

-Sets policies for passwords - Creates rules for backup and recovery - Facilitates protection of data center and computers

What are the steps in the decision making process?

1) Identify the decision that needs to be made. 2) Gather the relevant information. In a DSS, ensure that the system is using the correct information and run the DSS process to see what the outcomes are. 3) Identify the alternatives. Run the DSS using different parameters that match the qualifications for making the decision. 4) Weigh all the components and assign probabilities of success, using the DSS output as the baseline. The DSS can assign probabilities based on input data and the selection of criteria. 5) Choose the best alternative that meets the requirements of the decision. 6) Implement the decision. 7) Review and monitor the results of the decision.

What is the process for launching a mobile app?

1) Sketch out the app idea to understand the flow. 2) Do market research to determine whether the app is unique and has a market. 3) Create a mockup of the app to nail down the flow, decisions, and displays. 4) Create the graphic design of the app. Look at areas of human interaction, color, flow, and ease of use. 5) Build the app landing page or a home page, which is a dedicated page of the mobile app to describe the functions of the app. 6) Code the app with the programming language of choice. 7) Launch the app in the app store, for both iPhone and Android. 8) Market the app to reach the targeted demographic, and use the marketing principles defined in an earlier section. 9) Improve your app with user feedback. Responding to users in a timely fashion is key to the success of the app because in an online environment, everyone "hears" the complaints and the praises.6.03 GB of 15 GB used Terms · Privacy · Program Policies Last account activity: 2 days ago Details

Five Business Departments

1. Accounting 2. Human Resource 3. Marketing 4.Research & Development 5. Production

Name 5 Core Business Function Behaviors

1. Accounting 2. Marketing 3. Human Resources 4. Research and Development 5. Production

What are 5 Core Business Function Behaviors?

1. Accounting 2. Marketing 3. Human Resources 4. Research and Development 5. Production

Five Business Departments

1. Accounting; 2. Human Resource; 3. Marketing 4.Research & Development 5. Production

Name 3 Main levels of security to protect database information:

1. Data level security 2. System level security 3. User level security

What are the 3 main levels of security to protect database information?

1. Data level security 2. System-level security 3. User-level security

The Six components of IT Infrastructure

1. Hardware 2. Software 3. Networks 4. Data 5. People 6. Processes

The Six components of IT Infrastructure

1. Hardware; 2. Software; 3. Networks; 4. Data; 5. People; 6. Processes

The steps in making the decision are the same

1. Identify the decision that needs to be made. 2. Gather the relevant information. In a DSS, ensure that the system is using the correct information and run the DSS process to see what the outcomes are. 3. Identify the alternatives. Run the DSS using different parameters that match the qualifications for making the decision. 4. Weigh all the components and assign probabilities of success, using the DSS output as the baseline. The DSS can assign probabilities based on input data and selection of criteria. 5. Choose the best alternative that meets the requirements of the decision. 6. Implement the decision. 7.Review and monitor the results of the decision.

Decision Support System

1. Is a set of related computer programs 2. Includes data required to assist with analysis and decision making

Which three benefits does a customer relationship management system (CRM) provide to a business?

1. It is a process to capture information about the business's customers. 2. It provides communication tools and channels. A CRM provides an automated system for customer interaction. 3. It facilitates marketing strategies to increase business. A CRM uses captured sales data for marketing analysis.

Name 2 Reasons to store data in orderly fashion

1. Knowing what information is in the database. 2. Using the data

Name 4 basic components to All networks

1. Network Interface Controller 2. Network Protocol 3. Physical cable system 4. Network Hub

What are the 4 basic components of All networks?

1. Network Interface Controller 2. Network Protocol 3. Physical cable system 4. Network Hub

All networks require these four basic components:

1. Network interface controller (NIC) card, or wireless network (Wi-Fi) capability. 2. Standard language (protocol) 3. Physical cable system 4. Network hub

Network security Considerations

1. Password, 2. Web browsing, 3. Email and Instant Messaging, 4. Permissions, 5. Firewalls

Digital File Sharing Systems

1. Peer-to-peer is when two computers that are networked together share files between themselves; this is also known as P2PFile 2. Synchronization services offer a cloud-based service where automated file transfers are made to update files from a sharing directory on each user's networked device. Examples of this service are Dropbox and Google Drive.

Name and define the 4 P's of Marketing

1. Pricing- Correct price for goods compared to industry standards. 2. Promotion- Initiative to sell 3. Products - The actual goods that relate to customer requirements. 4. Placement - Delivery to Customers

What are the 4 P's of Marketing?

1. Pricing- Correct price for goods compared to industry standards. 2. Promotion- Initiative to sell 3. Products - The actual goods that relate to customer requirements. 4. Placement - Delivery to Customers

Which 3 advantages do computer-aided design and computer-aided manufacturing (CAD and CAM) provide the manufacturing process?

1. Product changes can be easily made. 2. CAD software can test the product design. The CAD software can test the functionality and design up to the limitations of the software and hardware running CAD. 3. Designs are easily transferred to automated/robotic manufacturing tools.

9 step process to ensure App success

1. Sketch out the app idea to understand the flow. 2. Do market research to determine whether the app is unique and has a market. 3. Create a mockup of the app to nail down the flow, decisions, and displays. 4. Create the graphic design of the app. Look at areas of human interaction, color, flow, and ease of use. 5. Build the app landing page or a home page, which is a dedicated page of the mobile app to describe the functions of the app. 6. Code the app with the programming language of choice. 7. Launch the app in the app store, for both iPhone and Android. 8. Market the app to reach the targeted demographic, and use the marketing principles defined in an earlier section. 9. Improve your app with user feedback . Responding to users in a timely fashion is key to the success of the app because in an online environment, everyone "hears" the complaints and the praises.

What are 9 step processes to ensure App success?

1. Sketch out the app idea to understand the flow. 2. Do market research to determine whether the app is unique and has a market. 3. Create a mockup of the app to nail down the flow, decisions, and displays. 4. Create the graphic design of the app. Look at areas of human interaction, color, flow, and ease of use. 5. Build the app landing page or a home page, which is a dedicated page of the mobile app to describe the functions of the app. 6. Code the app with the programming language of choice. 7. Launch the app in the app store, for both iPhone and Android. 8. Market the app to reach the targeted demographic, and use the marketing principles defined in an earlier section. 9. Improve your app with user feedback. Responding to users in a timely fashion is key to the success of the app because in an online environment, everyone "hears" the complaints and the praises.

Name 2 types of Information Technology careers

1. Technical 2. Managerial

What are 2 types of Information Technology careers?

1. Technical 2. Managerial

Name 3 important areas of CRM is to a business

1. Technology 2. Strategy 3. Process

What are 3 things CRM is to a business?

1. Technology 2. Strategy 3. Process

8 Challenges of Data Analytics and Business Intelligence

1. The vast amount of data that are collected. 2. Determining what is meaningful and what is not. 3. Data come from multiple sources 4. Accessibility 5. Budgets 6. Lack of skills 7. Presentation of information 8. Security and privacy

What are the 8 Challenges of Data Analytics and Business Intelligence?

1. The vast amount of data that are collected. 2. Determining what is meaningful and what is not. 3. Data come from multiple sources 4. Accessibility 5. Budgets 6. Lack of skills 7. Presentation of information 8. Security and privacy

What are the 4 challenges of IT?

1. Too Much Data 2. Too Many Options 3. Unskilled Team members 4. Technical Support

IT Challenges

1. Too much data 2. Too many options 3. Unskilled team members 4. Technical support

Name 4 General attributes that define big data

1. Volume 2. Variety 3. Veracity 4. Velocity

What are 4 General attributes that define big data?

1. Volume 2. Variety 3. Veracity 4. Velocity

Name 3 elements DSS uses for accurate decision-making

1. business intelligence 2. data analytics 3. data management capabilities

5 Ways information systems and technology can innovate

1. data housing and management- Cloud Web Hosting 2. improved communications, 3. customer relationship management (CRM) 4. product development, 5. cost-effective processes-Completing the transaction faster and with more accuracy than if done manually-it replaces people who normally would be hired or maintained to do the work

What are 5 Ways information systems and technology can innovate?

1. data housing and management- Cloud Web Hosting 2. improved communications, 3. customer relationship management (CRM) 4. product development, 5. cost-effective processes-Completing the transaction faster and with more accuracy than if done manually-it replaces people who normally would be hired or maintained to do the work

What are 2 Reasons to store data in an orderly fashion

1? Knowing what information is in the database. 2. Using the data

Boolean Logic

=C1>F$3 = TRUE or FALSE

Example of IF function

=IF(G3>C$3,"Yes","No")

IF Function

=IF(logical_test,[value_if_true),[value_if_false])

What are 3 elements DSS uses for accurate decision-making

?1. business intelligence 2. data analytics 3. data management capabilities

[range_lookup]

A Boolean to indicate an exact match or approximate match. Default=TRUE-approximate match.

Chief Security Officer (CSO)

A CSO is in charge of such things as the physical security and safety of employees, facilities, and corporate assets and may have a law enforcement background. Originated within information technology as the person who was responsible for IT security, focused on the security of an organization's data and information

MAC (Media Access Control)

A MAC is responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel.

MAC (Media Access Control) Address

A MAC is responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel.

Object Linking and Embedding

A Microsoft technology that allows a user to share information and data from an entire area in one application in part of another application.

Bus Topology

A Network layout having one main trunk or backbone; Sometimes called a linear bus that has 2 endpoints; Connects to various computers and network devices

Bus Topology

A bus topology or linear bus is a network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints. Data are transmitted between the two endpoints and the nodes are connected to the backbone.

Tableau

A business analyst wants to use the social media data to create and present business intelligence. She will create visualizations that will be used by the executive team. Which tool is appropriate for creating and presenting this business intelligence?

IT portfolio manager

A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. In the scenario above, who is responsible for designing a detailed plan to address the incompatibility issue?

Campus Area Network (CAN)

A campus area network (CAN) is a computer network that connects two or more LANs that are located on campus, like a university, an organization's national headquarters, or even an industrial complex

Network Interface Controller

A card that is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers.

Network Hub

A central location of the computer network that serves as a traffic cop for network connection and communication.

Network Hub

A central location of the computer network that serves as a traffic cop for network connection and communication. Hubs ensure that computer traffic collisions are eliminated. Cables from network computers and other devices are plugged into a hub.

Software Suite

A collection of business computer application programs of associated functionality that share a common graphical user interace and have the capacity to smoothly exchange data across the programs.

Software

A collection of computer programs that accomplish a specific task.

Operating System

A collection of computer programs that work together to manage hardware and software to ensure that they are working properly.

Hubs

A common point of connection on a network

Targeted advertising

A company creates a new product in response to demand from a small but diverse group of customers with a specific shared interest. What is the most important reason to advertise this product on social media?

Rapid system scalability Cloud-based IT solutions adapt to the size requirements of a business. Physical (in-house) IT systems can be adapted but not as quickly or as easily as in the cloud.

A company has experienced significant growth in just a few months. The company expects to continue this rate of growth in the coming year. Which cloud computing feature would most benefit this business in the short term as it manages its growth?

Information security analyst

A company has recently discovered that unauthorized users have accessed data on the company intranet. Which IT professional should investigate this concern?

Information security analyst

A company has recently discovered that unauthorized users have accessed data on the company intranet. Which IT professional should investigate this concern?

IT Manager

A company is planning several IT projects including a major software development project. The software development project will be organized using the software development life cycle (SDLC) methodology. Which IT professional should be called upon to create a detailed project plan for this effort?

IT Manager

A company is planning several IT projects including a major software development project. The software development project will be organized using the software development life cycle (SDLC) methodology. Which IT professional should be called upon to create a detailed project plan for this effort?

Transaction processing

A company makes personal computers and sells them directly to the public. At present, all business processes are completed manually by employees, lengthening the time from customer order to shipment. Which business process would deliver the most immediate customer satisfaction and reduced costs if automated?

Predictive reporting

A company uses data on its past call volumes to determine call center staffing. Which type of reporting should the company utilize?

Make the IT department independent.

A company's IT department is currently a subunit of the accounting department, reporting to the accounting manager. The reason for this is that accounting is the single largest consumer of the company's IT services. The company's president decides that due to widespread disorganization and poor communication, she wants to reorganize all business units. What is the best recommendation for placement of IT within the company?

Optical Disk

A computer disk that uses optical storage techniques and technology to read and write data.

What is A computer network?

A computer network is defined as two or more computers connected together to communicate and share resources. The shared resources may refer to computer files, folders, software, and peripheral hardware like printers, scanners, and webcams.

A metropolitan area network (MAN)

A computer network that connects two or more LANs or CANs together but within the boundaries of a town or city. An example of a MAN might be a bank with different branch locations throughout a metropolitan area that are all connected.

Metropolitan Area Network (MAN)

A computer network that connects two or more LANs or CANs together within the boundaries of a town or city.

A campus area network (CAN)

A computer network that connects two or more LANs that are located on a campus, like a university, an organization's national headquarters, or even an industrial complex. For example, a CAN may connect an English department's LAN to a math department's LAN, thereby allowing them to share resources. Additionally, a business campus would be able to connect the accounting department's LAN with the human resources LAN. A CAN is typically limited in size to the specific size of the campus it serves.

Campus Area Network (CAN)

A computer network that connects two or more LANs that are located on a campus.

Local Area Network (LAN)

A computer network that is relatively small, typically in a single building, but sometimes as small as a single room.

A local area network (LAN)

A computer network that is relatively small, typically in a single building, but sometimes as small as a single room. LANs can serve smaller businesses and often serve smaller parts of a large business, like an accounting department or sales division.

Network Operating Systems (NOS)

A computer operating system that connects computers together within a local area network.

Spyware

A computer program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent.

What is a worm?

A computer worm is a virus in that it is self-replicating and does not need to attach itself to an existing program to spread. Worms use networks to travel by sending copies of themselves to other parts of the network without a user's knowledge or intervention. A worm can slow a system's performance, erase files, and damage physical hardware.

Geographic Information Systems (GIS)

A conceptualized framework that provides the ability to capture and analyze spatial and geographic data.

The company Sparkit has developed a number of unique algorithms to support its specialized programming projects. What does Sparkit need to apply for in order to best protect its rights to its code?

A copyright on each algorithm

Sparkit has developed a number of unique algorithms to support its specialized programming projects. What does Sparkit need to apply for in order to best protect its rights to its code?

A copyright on each algorithm Correct! Computer program code is copyrightable.

Sparkit has developed a number of unique algorithms to support its specialized programming projects. What does Sparkit need to apply for in order to best protect its rights to its code? A copyright on each algorithm A trademark for each algorithm A patent for each algorithm (Patents are for inventions) A trade secret for each algorithm

A copyright on each algorithm. Computer program code is copyrightable.

Identity Theft

A crime concerning the unlawful practice of assuming another individual's identity.

Phishing

A criminal activity that involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords, and credit card details by masquerading as a legitimate business organization, typically in a legitimate-looking email.

Eva wants to implement a tracking system of everyone who logs in and searches her listings of homes for sale, capturing information on who logs in, when, and what information they accessed. Which piece of IT infrastructure should she implement to help automate this process?

A customer relationship management system

Eva wants to implement a tracking system of everyone who logs in and searches her listings of homes for sale, capturing information on who logs in, when, and what information they accessed. What does she need? A supply chain management system Browser-based web development A customer relationship management system Cloud web services

A customer relationship management system

Normalization

A data analyst is using the ETL process to enter data into the company's relational database. The data contain many redundancies. Which process will the data analyst need to use before loading the extracted data into the database?

Velocity

A data analyst is working with a very large set of data and trying to calculate the amount of data processing that needs to be completed each week. Which attribute of big data is this analyst addressing?

Text analytics

A data analyst wants to search though unstructured data from social media posts to look for useful customer behavior patterns and sentiments. Which type of analytics are appropriate for this task?

Data mining is the process of looking for meaningful patterns in data.

A data analyst wants to use software to look for useful patterns and hidden relationships in this large set of social media data. Which process can be used to look for these patterns and relationships?

Ahmed works for an online retailer, and one of his responsibilities is to make sure every item in each distribution center can be located quickly. What is the appropriate tool to use for this purpose? -> A database -> A spreadsheet -> A customer relationship management (CRM) system -> A knowledge management system (KMS)

A database

Ahmed works for an online retailer, and one of his responsibilities is to make sure every item in each distribution center can be located quickly. What is the appropriate tool to use for this purpose?

A database

Foreign key

A database manager is setting up a relational database. The manager creates a field in a table that links to the primary key in a different table in the database. What is this field called?

Denial of Service Attack

A denial-of-service (DoS for short) is an attempt to make a computer or any of its resources unavailable to its intended users. A DoS attack can come in the form of a malicious program downloaded as an email attachment that runs constantly without the user's knowledge and requires an enormous amount of processing power of the computer. The computer slows down because of the extra computing cycles being used, causing the computer to simply stop running altogether. DoS attacks often target something as large as an entire network or simply deny use of a website or software.

Project management software

A design business has employees based in different parts of the country, with all employees working remotely from home. This allows the business to attract the best expertise, which is a great benefit to the business. One problem, however, is that employees are often waiting for other employees to complete certain tasks before they can complete their own. This lack of coordination causes significant delays in projects. Which type of software is designed specifically to address the coordination problem in the scenario?

What is a peripheral device in a network?

A device shared by multiple end users in a network

Charlotte considers installing automated external defibrillator (AED) machines at strategic locations in the airport for enhanced healthcare for patrons. What is an example of an IoT device that can be used to improve the effective use of AED devices?

A device to notify paramedics when an AED is being used

Boolean Logic

A fancy name for a simple condition that's either true or false. It is one way to sift specific data or results from a large spreadsheet. ... Boolean operators, which Excel calls logical functions, include AND, OR, NOT, and a new function called XOR.

Wi-Fi

A farmer has placed IoT rain sensors in all owned fields to provide rain density information by field location. Which transmission methodology should the farmer use to gather this information?

HIPAA—Health Insurance Portability and Accountability Act

A federal law that provides data privacy and implements security provisions to safeguard an individual's medical information. A HIPAA form is signed each time you visit a new doctor so they can understand who they can share that information with.

Foreign Key

A field in a database table that provides a link between two tables in a relational database.

Primary Key

A field in a database table that uniquely identifies a record in the table.

What is a firewall?

A firewall is a combination of specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet.

The data analyst at Freedom Rock Bicycles wants to link two tables in the database. What is the name of the field in a database table that is used to connect or link two tables together? Connection key Foreign key Linking key Common key

A foreign key is the field in a database that links two tables together.

Geographic information system (GIS)

A framework for gathering, managing, and analyzing data. Having its base in using geography, GIS integrates many types of data. It analyzes locations and organizes layers of information into visuals using computer generated maps.

File Allocation Table (FAT)

A general way to do this is to create a table of contents for the disk

A geographic information system (GIS)

A geographic information system (GIS) is a framework for gathering, managing, and analyzing data. Having its base in using geography, GIS integrates many types of data. It analyzes locations and organizes layers of information into visuals using computer-generated maps. By combining these levels of information, GIS reveals deeper insights into data, such as patterns, relationships, and situations—helping users make smarter decisions.

Cache

A hardware or software component that stores data so that future requests for that data can be served faster.

RFID

A hospital has installed a system that constantly provides the inventory status of emergency supplies. Tags added to each product contain the product information needed for inventory control and identification, and these tags can be read with a scanner. Which technology did the hospital implement to perform this service?

IoT

A hospital issues new patients a wristband that is not just a barcode but has monitoring and communications properties. Which technology is the hospital using for these wristbands?

Chief Information Officer (CIO)

A job title for the board-level head of an information technology department within a business organization. The CIO's job is to make sure IT assets are in place to ensure a smooth transition.

A business organization can increase collaboration if it has a database of its internal reports, articles, documents, policies, and decisions. Which tool helps manage this type of information?

A knowledge management system

A business organization can increase collaboration if it has a database of its internal reports, articles, documents, policies, and decisions. Which tool helps manage this type of information? --A data warehouse --A knowledge management system --A business information system --A collaborative database

A knowledge management system

The algorithms developed by Sparkit programmers need to be cataloged and shared among the programmers in all three locations and need to be easily accessible. Which type of software system can Sparkit use to enable this?

A knowledge management system (KMS) Correct! A KMS is designed to organize, create, and distribute a business's collective knowledge.

The algorithms developed by Sparkit programmers need to be cataloged and shared among the programmers in all three locations and need to be easily accessible. Which type of software system can Sparkit use to enable this? -- A relational database -- A knowledge management system (KMS) -- A productivity software suite -- A document management system (DMS)

A knowledge management system (KMS). A KMS is designed to organize, create, and distribute a business's collective knowledge.

Internet of Things

A large agriculture company uses a system that uses sensors to measure the soil moisture at various locations in its fields. These data are used to automatically adjust the irrigation system, which reduces water waste. Which type of technology is this company using to reduce water waste?

ETL

A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse?

Computer System Administrator

A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server?

An extranet

A large company uses a system that provides information to its suppliers to maintain the supply chain process. Which type of system is this company using?

The transaction processing system (TPS)

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS?

Local Area Network (LAN)

A local area network (LAN) is a computer network that is relatively small, typically in a single building, but sometimes as small as a single room. LANs can serve smaller businesses and often serve smaller parts of a large business, like an accounting department or sales division.

Registers

A location in a store of data used for a specific purpose and with quick access time.

Best Practice

A management process, technique, or method that is most effective at arriving at the desired outcome or a better outcome than any other process, technique, or method.

AVERAGEIF

A manager has a data set that contains the profits of 556 stores in the United States. In the data set, along with each store location, there is a column that specifies the regions of the United States that each location belongs to: East, South, Midwest, Mountain, and Pacific. Which function should the manager use to find the average profits of stores in each region?

Online Analytical Processing (OLAP)

A method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube.

Master Data Management (MDM)

A methodology or process used to define, organize, and manage all the data of an organization that provides a reference for decision-making.

Metropolitan Area Network (MAN)

A metropolitan area network (MAN) is a computer network that connects two or more LANs or CANs together but within the boundaries of a town or city. An example of a MAN might be a bank with different branch locations throughout a metropolitan area that are all connected.

Which category of computer is a business laptop? --Minicomputer --Handheld computer --Mainframe computer --Microcomputer

A microcomputer is a small computer that contains a microprocessor as its central processor and is unable to process large amounts of data or transactions.

Monetized the app

A mobile app developer has developed a game that users can download and play for free. However, once users reach the one hundredth level, they must pay to unlock additional levels. What has the developer done by requiring app users to unlock additional levels?

Which component must each client computer in the office have in order to install the new network?

A network interface controller

Which component must each client computer in the office have in order to install the new network? --A network interface controller --A network switch --An internal network --An internal network server

A network interface controller. The NIC is plugged into a slot on the motherboard inside of each computer in the network and allows a network cable to be plugged in so the computer can interface or communicate with other computers.

What is a standard language (network protocol)

A network protocol provides a common language and rules for communication. A network protocol is a convention or standard that controls or allows communication and data transfer between two computers. Simply stated, network protocols are the rules that govern network communication. Network protocols are governed by hardware, software, or an arrangement of both

Bus Topology

A network topology sometimes called a linear bus, where each of a network's nodes is connected to a common linear backbone that has two endpoints.

Point of Failure

A part of a system that, if it fails, will stop the entire system from working.

Point of Failure (POF)

A part of a system that, if it fails, will stop the entire system from working.

A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated?

A password

A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated? --An encryption key --A digital signature --A MAC address --A password

A password

A local drafting firm has a secured local area network that uses Ethernet cables to connect to client computers. After ensuring that the computer is connected to the network, what must a user provide to in order to be authenticated?

A password

Peripheral Devices

A peripheral device is generally defined as any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way. Other examples of peripherals are image scanners, tape drives, microphones, loudspeakers, webcams, and digital cameras.

A technology business is growing rapidly and needs new systems to support a growing workforce. An IT manager is asked to create an IT department to support the growing business. This manager's first task is to make an inventory of essential items needed and their associated costs. The list includes office supplies such as desks, chairs, laptops, and a printer. The list also includes a server, a network operating system, cables, a hub, a router, and everything else it takes to set up a network for the business. The IT manager's boss has some concerns about the cost of a network and its impact on the company and employees. The manager explains that a network will allow employees to use shared peripheral devices on the network. Which example of a peripheral device can the manager provide based on the supply list?

A printer

Which example of a peripheral device can the manager provide based on the supply list? --A hub --A printer --A laptop --A router

A printer is a peripheral device, which is a device that resides outside of the computer but is still considered hardware.

Intranet

A private network that works the same way as the internet but is confined within an organization.

Software

A program or instructions that give directions to the computer.

Trojan Horse

A program that often seems harmless and possibly interesting at first until it is executed. When the program is executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system.

Function

A relation or expression involving one or more variables. Built-in formulas that carry out set calculations and most of these functions require data to be entered.

Basic Research

A review of the subject and what has been completed in the world of business to determine whether any of it has a commercial application for the business. This involves IT by searching the internet for research completed in the specified area, both peer-reviewed (journals, university publications) and public information on people's habits, wants, needs, desires, etc. to build a case for additional development.

What is a ring topology?

A ring topology is shaped like a ring. Each computer (node) is connected to two other computers in the network with the first and last computers being connected to each other. Data are transmitted between computers in a circular manner. Least used topology with microcomputers. In a ring topology, if the traffic cannot flow in one direction, then it can try to flow in the other direction around the ring. This makes it more robust because there is no hub through which all the traffic flows.

Default-allow Firewall Rule

A rule that all traffic is allowed unless it has been specifically blocked.

Which type of computer runs a network operating system (NOS)? --A mainframe computer --A router --A client computer on a network --A server

A server runs a NOS.

Unified Modeling Language (UML)

A set of graphical notation techniques to create computer models and applications.

Unified Modeling Language (UML)

A set of graphical notation techniques to create computer models and applications. A standard format for communicating and documenting software design.

Transmission Control Protocol/Internet Protocol (TCP/IP)

A set of protocols used to connect a network to the internet.

Transmission Control Protocol/Internet Protocol (TCP/IP)

A set of protocols used to connect a network to the internet. Designed to meet this need and to allow devices of different manufacturers and software to communicate seamlessly.

Network Protocol

A set of rules a network must follow.

data mapping

A simple definition of data maps is that they are extra notes about the definition of a field, its data, and its use.

Local area network (LAN)

A small business has a single network that allows every employee to connect through a central server when they are in the company's main office. What type of network is the business using?

Social networking:

A social networking site allows individuals to connect with others who have similar interests and backgrounds, such as families, hobbies, educational studies, and even products and brands. Social networks allow users to share videos and photos, and participate in groups related to their interests. The main social media platforms are Facebook, Twitter, and Instagram.

Solid-state Drive (SSD)

A solid-state storage device that uses integrated circuit assemblies as memory to store data persistently, typically using flash memory.

Twisted Pair

A specialized wire that cancels out electromagnetic interference from other electronic devices and increases reliability

Protocol

A standard language that devices connected to a network use to communicate and transfer data.

In order to implement a client/server network, which type of network bus topology is most appropriate?

A star topology

Star Topology

A star topology is named for the star shape created by nodes that radiate around a central node in a spoke-like fashion. The center of the star is the hub that attaches to the nodes with spokes. Often, the hub is a server with networked computers and nodes as clients; thus, it is called a client/server model. Star topologies have similar disadvantages to the linear bus configuration; if the central hub fails, every node attached to the hub will also fail. Star topologies are the most common of all topologies.

Which topology implements a network where if the central hub fails, all nodes attached to the hub will also fail? --A mesh topology --A linear bus topology --A ring topology --A star topology

A star topology. These are the most common.

File Allocation Table (FAT)

A table of contents that directs the read/write arm of the hard drive to the location where data exist and accesses the data upon the user's request.

A printer

A technology business is growing rapidly and needs new systems to support a growing workforce. An IT manager is asked to create an IT department to support the growing business. This manager's first task is to make an inventory of essential items needed and their associated costs. The list includes office supplies such as desks, chairs, laptops, and a printer. The list also includes a server, a network operating system, cables, a hub, a router, and everything else it takes to set up a network for the business. The IT manager's boss has some concerns about the cost of a network and its impact on the company and employees. The manager explains that a network will allow employees to use shared peripheral devices on the network. Which example of a peripheral device can the manager provide based on the supply list?

A discussion board facilitates communication between geographically dispersed group members. What is the correct term to describe an initial post and its subsequent comments? --A thread --A stream --Linked posts --Linked comments

A thread

A discussion board facilitates communication between geographically dispersed group members. What is the correct term to describe an initial post and its subsequent comments?

A thread

Tactical decisions Detailed operational data created from the sale of individual items are used to make operational and short-term decisions.

A transaction processing system (TPS) enables the entry and recording of sale-related data such as item purchased, price, and date and time of sale. Which kind of decisions does management use these data for?

Gantt Chart

A type of bar chart that illustrates a project schedule.

Random Access Memory

A type of memory that allows data to be accessed in any order without physical movement of the silicone media.

Which IoT system process is used to reference each IoT device on a network? --Unique identifier --Logon ID --IP address --MAC

A unique identifier (UID) assigned by the user makes it possible to access that particular entity so that it can be interacted with.

Logical_Test

A value or logical expression that can be evaluated as TRUE or FALSE.

Business Intelligence Dashboard

A visual presentation of: -- Graphs -- Charts -- Diagrams

Spreadsheets

A what-if analysis tool, an electronic grid of columns and rows typically used to create, model, and manipulate numerical and financial information. Columns are labeled with letters, and rows are labeled with numbers. When a column and row intersect, they form a cell.

Word Processing Software

A word processor like Microsoft Word, Adobe Acrobat, or Corel WordPerfect is an application software used to create, compose, edit, format, and print documents.

A manager has a data set that contains the profits of 556 stores in the United States. In the data set, along with each store location, there is a column that specifies the regions of the United States that each location belongs to: East, South, Midwest, Mountain, and Pacific. Which function should the manager use to find the average profits of stores in each region?

AVERAGEIF

Security and Privacy

Access to data, and especially the interpretation of data, needs to be left to skilled personnel who can make business intelligence conclusions accurately and in confidence

The IT department of a company has been asked to provide systems for financial and investment management. Which business department has the greatest need for this type of system?

Accounting

The IT department of a company has been asked to provide systems for financial and investment management. Which business department has the greatest need for this type of system? Marketing Sales Operations Accounting

Accounting

MAC Address

Address embedded in network connected devices; Uniquely identifies computer on a network

Qualitative ROI

Addresses the intangible values of data loss or a decrease in operating efficiencies.

Which aspect of human resource management is the responsibility of an IT department?

Administration of information on employees

Which aspect of human resource management is the responsibility of an IT department? Analyzing which benefits to offer employees Developing online employee training resources Recruitment of new employees online. Administration of information on employees

Administration of information on employees. IT provides software and system services to administer employee information.

Adware

Advertising-supported software is typically just irritating to a user and is not usually as malicious. Adware is programs that automatically display or download advertising to a computer. Adware is often installed from internet websites without user intervention or knowledge.

E-books require less investment to publish.

Alice has written and published a novel, and she is deciding whether to publish it in the traditional way or publish a digital e-book. However, she is concerned about whether the book will be successful or not. What is the largest financial advantage of publishing the novel as an e-book?

Main Circuit board

All the internal devices connect to the motherboard, as the motherboard has circuits printed on it that provide pathways for data to be exchanged between all the components connected to it.

cloud database

Allow access to databases from anywhere one can connect to the internet (providing security access is granted).

Customer Relationship Managment

Allows a company to manage and analyze interactions with past, current, and potential customers

What is object embedding?

Allows a user to select an entire area from one application and a part of another. A budget spreadsheet (source file), for example, can be embedded in a proposal document (destination file). Object embedding is static and only takes a "snapshot." When the proposal document is reopened, it can be edited, but the budget spreadsheet source file embedded in it cannot.

USB Purpose

Allows the computer to connect peripheral devices

Online Application Software

Allows two or more users to access browser based software applications.

What is structured data?

Also called normalized data, meaning it is typically well-labeled, often with traditional fields and records common to data tables.

Central Processing Unit (CPU)

Also known as the microprocessor; the brains of the computer.

Sarbanes Oxley act of 2002

An accounting industry act passed by the federal government to oversee the accounting practices of a business and industry. In addition, it bans company loans to executives and job protection to whistleblowers.

Information security analyst

An additional problem that the consultant identified was that unauthorized users could easily access data on the company's internal network. Which IT professional is responsible for addressing this issue?

SQL

An analyst at a furniture company wants to use the company's relational database to find out which customers have made purchases in the past six months. What is an appropriate tool for the data analyst to use to find this information?

Business intelligence software

An analyst uses software to analyze data in the company's data warehouse and produce information to guide the organization. The information is presented in clearly understandable charts and graphs on a dashboard and is used to inform decisions in the organization. Which type of software is this analyst using?

A company is launching a new product that has been requested by thousands of loyal customers and prospective customers. Which form of promotion will best allow the customers and prospective customers to participate in promoting the new product?

An announcement on social media platforms Correct! Companies use social media platforms to share information.

App

An app is a self-contained program that serves a particular purpose, such as a calendar, a mapping program, or a game. Apps are typically downloaded to a mobile device and are called a mobile app

Database Management System Software (DBMS)

An application software that is used to create a collection of related files that consist of records of data separated by fields that can be queried to produce populations of information.

Word Processor

An application software used to create, compose, edit, format, and print documents.

Presentation Software

An application software used to present information in a slideshow format.

OLAP

An approach to answer multi-dimensional analytical queries swiftly in computing. OLAP is part of the broader category of business intelligence, which also encompasses relational databases, report writing and data mining.

Denial-of-service

An attempt to make a computer or any of its resources unavailable to its intended users.

What is a denial-of-service (DoS)?

An attempt to make a computer or any of its resources unavailable to its intended users. eg) email attachment that runs constantly and requires an enormous amount of processing power of the computer. The computer slows down or stops running altogether. DoS attacks often target something as large as an entire network or simply deny use of a website or software.

Clients

An end user's computer in a computer network.

Extranet

An extranet is a controlled private network that allows access to partners, vendors, and suppliers, and is usually a subset of the information accessible from an organization's intranet.

Endothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed. Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week? --An intranet at the manufacturer that Endothon can access --An extranet that provides Endothon access to data from the manufacturer --An extranet that provides the manufacturer access to data at Endothon --An intranet at Endothon that the manufacturer can access

An extranet that provides the manufacturer access to data at Endothon

Endothon Company buys cabinet hardware from one manufacturer. Due to limited storage space for inventory, Endothon has partnered with the manufacturer to ship hardware just when it is needed. Which component of the IT supply chain could the company set up to efficiently communicate what it needs each week?

An extranet that provides the manufacturer access to data at Endothon

Argument

An independent variable associated with a function or proposition and determining its value.The values that functions use to perform calculations.

Hadoop

An infrastructure for storing and processing large sets of data across multiple servers. It uses a distributed file system that allows files to be stored on multiple servers. Best for large companies like Facebook, eBay, and American Express that create terabytes and petabytes of data every day.

Click Fraud

An internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to collect a per-click fee.

What is the InTRAnet?

An intranet is a like a private version of the internet that works the same way, but it is confined within an organization. Intranets contain company policies, computer files, and a host of other business resources.

Transaction processing systems (TPSs) are used by grocery stores to gather data on which products are sold and when they are sold, and customer information. If all TPS data are related to a grocery store's finances, inventory, and customers, which type of network configuration would be most appropriate for the implementation of a TPS? Internet Extranet Intranet Wireless

An intranet is a private network for company access only and would be appropriate since this information is private.

Operating Software

An operating system (OS), often called a platform, is a collection of computer programs that work together to manage hardware and software to ensure that they are working properly. The platform is the groundwork for all system software and performs jobs like allocating memory, administering input and output, and managing files. The most popular platforms in today's market are Microsoft Windows, Mac iOS, Linux, and UNIX.

Business Intelligence

Analyzing large amounts of data for strategic decision making; Data-driven Decision Support System

Node

Any device that is connected as part of a computer network, including computers, hubs, printers, and switches.

Process

Any task a computer performs.

Which category of software includes programs such as word processors and PDF document readers?

Application software

Which category of software includes programs such as word processors and PDF document readers? --Utility software --Application software --Project software --System software

Application software

Application Software

Application software includes word processing programs and PDF document readers

What is Application software?

Application software is defined as software an end user chooses to use, like Microsoft Excel or Adobe Photoshop, that accomplishes a specific task for the user

Which type of research should William and Jack do to understand the electric motorcycles needed to meet customer and industry requirements and needs? --Development research --Business intelligence research --Basic research --Applied research

Applied research is focused on developing a customer product.

William and Jack are motorcyclists. They ride to work each day and own a motorcycle repair shop. They started their business fixing friends' motorcycles, and before long they found they had more work than they could handle. Customers began to ask for services such as a website to buy parts and accessories and information on safety and maintenance. William and Jack believe they could expand their business and increase their revenue by adding these services and selling used motorcycles. To make this possible, they need to install and gain expertise in the use of IT. In addition, they have ideas about converting gas-powered motorcycles to electric motorcycles to differentiate their shop from other shops. This would necessitate the collection of new data and connection with additional suppliers and systems. IT will be key to the growth of their company. Which type of research should William and Jack do to understand the electric motorcycles needed to meet customer and industry requirements and needs?

Applied research(Applied research is focused on developing a customer product.)

Data analysis

Applying statistics and logic techniques to define, illustrate, and evaluate data. Simply stated, data analysis attempts to make sense of an organization's collected data, turn those data into useful information, and validate the organization's future decisions.

Relational Operators

Are considered to be text. Just like the Yes and No arguments we discussed in Boolean Functions.They are used to compare two different values to determine if a relational expression is true or false

Computer System Analyst

Are the conduit between IT and the rest of the organization.

Business analytics

Attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage. Business analytics can also uncover computer system inadequacies within an organization.

Business analytics

Attempts to make connections between data so organizations can try to predict future trends that may give them a competitive advantage. Business analytics can also uncover computer system inadequacies within an organization. It can also uncover computer system inadequacies within an organization.

Data Analysis

Attempts to make sense of an organization's collected data, turn those data into useful information, and validate the organization's future decisions (like what product to sell or whom the organization should hire). Applying statistics and logic techniques to define, illustrate, and evaluate data.

Predictive analytics

Attempts to reveal future patterns in a marketplace, essentially trying to predict the future by looking for data correlations between one thing and any other things that pertain to it.

Businesses are expected to comply with ethical business practices in every department. What is an example of an information technology (IT) business practice that promotes ethical behavior?

Auditing to remove unlicensed software

Determining what is meaningful and what is not

Automated systems cannot determine this, so employees must design the system to sort the data.

What is an example of IoT technology being used to aid airport functions?

Baggage tags that record data about each piece of luggage Correct! Baggage tags that record data about luggage destination and location are an example of IoT.

What is an example of IoT technology being used to aid airport functions? Baggage tags that record data about each piece of luggage Menus at airport restaurants that allow passengers to order food using a tablet computer Monitors that display flight delays and gate changes in real time Automatic parking payment stations that accept credit cards

Baggage tags that record data about luggage destination and location are an example of IoT.

Boolean Function

Based on the Boolean logic, the return will display TRUE or FALSE.

Data Schema

Blueprint of how database is constructed

Which wireless network uses a short-range network for connection between a cell phone and another device, such as a speaker?

Bluetooth

Chief Information Officer (CIO)

Board-level head of an information technology department. Reports to the chief operations officer (COO) or chief executive officer (CEO). Slowly replacing the older "IT director" title that is more common throughout the world. Serve as a company's top IT infrastructure manager. The CIO essentially runs the business's internal IT operations. Manage vendors that supply infrastructure solutions. Align the business's IT infrastructure with its priorities. It is the CIO's job to make sure IT assets are in place to ensure a smooth transition. They deal mostly with internal customers (people who work with their organization). Responsible for explaining and advocating for a new plan to the company's board of directors.

Bookmarking sites:

Bookmarking sites allow a user to save locations or items from the internet and organize them for future reference. Tags are used to assist with the search and to share them with others on social networking sites. Examples of bookmarking sites are Pinterest, Flipboard, and Diggs.

Nested function

Both Vlookup with Hhlookup functions=VLOOKUP(G3,B$4:D$7,HLOOKUP(H3,C$2:D$3,2))

A design business has employees based in different parts of the country, with all employees working remotely from home. This allows the business to attract the best expertise, which is a great benefit to the business. One problem, however, is that employees are often waiting for other employees to complete certain tasks before they can complete their own. This lack of coordination causes significant delays in projects. Which methodology for sharing information would be most appropriate to the business in the scenario?

Browser-based

Which methodology for sharing information would be most appropriate for a remote business? --WAN-based --Forward-facing --Browser-based --LAN-based

Browser-based means the project management software is web-based and well distributed.

Eva wants to make her own website for her real estate business. Which technology could she use to develop her own website without first acquiring programming skills?

Browser-based web development Browser-based web development helps people with limited technical skill to develop their own websites simply using drag-and-drop tools and design interfaces.

Which methodology for sharing information would be most appropriate to the business in the scenario?

Browser-based(Browser-based means the project management software is web-based and well distributed.)

Budgets

Budgets are always constricting items, especially in IT

Sparkit knows that if it wants to be successful on social media, its customers must be familiar with and use mainstream social media technology to develop trust in Sparkit. How can Sparkit most effectively use social media to create trust?

Build an online community using social media.

Decision analytics

Builds on predictive analysis to make decisions about future industries and marketplaces. Decision analytics looks at an organization's internal data, analyzes external conditions like supply abundance, and then endorses the best course of action.

Bluetooth Network

Built into mobile phones so they can communicate with other devices within approximately 30 feet. The concept of Bluetooth is that the network communicates by sending and receiving radio waves communicating with the Bluetooth adapter in the device.

IoT

Bullzai Meat Company has freezer warehouses across the southern United States to hold meat until it is purchased by restaurants and schools. Bullzai needs to monitor the atmosphere and temperature quality of each of its freezers but cannot afford to have personnel perform this on a continual basis. Which technology implementation will allow the company to accomplish this goal?

Master Data Management

Business and IT work together to ensure uniformity

What is the most important qualification that a Chief Information Officer (CIO) must possess?

Business and leadership experience

What is the most important qualification that a Chief Information Officer (CIO) must possess? Business and leadership experience Programming and network design skill IT project management proficiency Information technology knowledge

Business and leadership experience. CIOs sometimes make tactical business decisions, but their expertise and focus is typically their strategic decision and project management skills.

Business collaboration

Business collaboration involves two or more people or departments working toward a common business goal, and it is facilitated by the exchange of data and information.

An analyst uses software to analyze data in the company's data warehouse and produce information to guide the organization. The information is presented in clearly understandable charts and graphs on a dashboard and is used to inform decisions in the organization. Which type of software is this analyst using?

Business intelligence software

An analyst uses software to analyze data in the company's data warehouse and produce information to guide the organization. The information is presented in clearly understandable charts and graphs on a dashboard and is used to inform decisions in the organization. Which type of software is this analyst using? --Data governance software --Business productivity software --Database management software --Business intelligence software

Business intelligence software is used to simplify raw data into different formats that can be understood using graphs, charts, and numerical analyses.

Auditing to remove unlicensed software

Businesses are expected to comply with ethical business practices in every department. What is an example of information technology (IT) business practice that promotes ethical behavior?

What is a key way that social media marketing has simplified the calculation of return on investment (ROI) in marketing?

By allowing companies to track which sales can be connected directly to a specific advertisement

What is a key way that social media marketing has simplified the calculation of return on investment (ROI) in marketing? By providing companies with the opportunity to easily solicit customer feedback and interaction By allowing companies to track which sales can be connected directly to a specific advertisement By providing companies with transparent pricing on all advertising offerings By allowing companies to utilize user-generated content as an advertising tool

By allowing companies to track which sales can be connected directly to a specific advertisement

How can the Internet of Things (IoT) be used to improve supply chain management in the automotive industry?

By placing internet-connected sensors on every part in order to monitor inventory Correct! Using RFID sensors to track and monitor inventories in real time is an IoT application that is relevant to the automotive supply chain.

How can the Internet of Things (IoT) be used to improve supply chain management in the automotive industry? By using blockchain technology to record all transactions on a shared ledger By employing artificial intelligence to look for potential cost saving opportunities By using real-time communication technology to improve coordination with vendors By placing internet-connected sensors on every part in order to monitor inventory

By placing internet-connected sensors on every part in order to monitor inventory. Using RFID sensors to track and monitor inventories in real time is an IoT application that is relevant to the automotive supply chain.

It targets the right customers.

By segmenting data in a data management system, a business achieves a significant advantage over nonsegmentation. What is that advantage?

It targets the right customers. Data segmentation segments information into useful categories.

By segmenting data in a data management system, a business achieves a significant advantage over nonsegmentation. What is that advantage?

The company's board of directors has expressed concerns about the software compatibility issue. Who is responsible for explaining and advocating for the new plan to the company's board of directors?

CIO

The company's board of directors has expressed concerns about the software compatibility issue. Who is responsible for explaining and advocating for the new plan to the company's board of directors? IT architect Programmer IT manager CIO

CIO

Chief Technology Officer (CTO)

CTO runs the organization's IT engineering group and serves as the company's top technology architect, use IT to enhance the company's products and develop strategies to increase the business's revenue. mainly focuses on external customers.

AverageIF Function

Calculates the average for a set of values that match a specific criterion.=AVERAGEIF(range,criteria,[average_range])

SUMIF Function

Calculates the total for a set of values that match a specific criterion.=SUMIF(range,criteria,[sum_range])

Topic analytics

Catalogs phrases of an organization's customer feedback into relevant topics.

Paradigm shift

Cell phones, IoT devices, and GPS have been major technological changes in the IT infrastructure. What is the term used to describe an important change that happens when the usual way of thinking about or doing something is replaced by a completely new and different way?

Servers

Central computers or hubs in Computer network.

A device to notify paramedics when an AED is being used

Charlotte considers installing automated external defibrillator (AED) machines at strategic locations in the airport for enhanced healthcare for patrons. What is an example of an IoT device that can be used to improve the effective use of AED devices?

Light dimmers and thermostats that report passenger traffic through the terminals in real time

Charlotte find that the airport spends more than $100,000 each month on electricity for lighting and the heating and cooling system in the airport. How could Charlotte use IoT to reduce her airport's power bill?

What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information?

Chief information security officer

What is the title of the person within an IT department whose responsibility is to set policies for passwords, create rules for backup and recovery, and facilitate the protection of the data center and computers with the data and information? Chief cybersecurity officer Chief operating officer Chief technology officer Chief information security officer

Chief information security officer

Which IT professional runs the organization's IT engineering group and serves as the company's top technology architect?

Chief technology officer (CTO)

Transparency

Clear on the action and understandable about the information/data

What is the term used to refer to end-user computers on a network? Clients Routers Servers Nodes

Clients are computers that are requesting information from the network, such as accessing web pages.

Slack

Cloud based set of collaboration tools and services (Searchable Log of all conversation and knowledge)

A company decides to turn its networks and databases over to a third party to manage and to provide access. What term describes the specific solution used by this company?

Cloud database

A company decides to turn its networks and databases over to a third party to manage and to provide access. What term describes the specific solution used by this company? --Cloud database --Distributed database --Managed database --Relational database

Cloud database

What is the term for using clustered servers to provide virtual resources for web pages?

Cloud web hosting

What is the term for using clustered servers to provide virtual resources for web pages? Cloud web hosting Web development Data warehousing Infrastructure as a service

Cloud web hosting. Several servers accommodate the hosting of a website instead of a single server.

Knowledge Management Systems (KMS)

Collaborative systems that organize, create, and distribute an organization's collective knowledge to its employees, which is called knowledge transfer.

Knowledge management System (KMS)

Collaborative systems that organize, create, and distribute an organization's collective knowledge to its employees, which is called knowledge transfer.

Project Management software

Collaborative tool that provides a road map for organizing and managing resources to schedule a project from start to finish.

What is the major issue that hinders the effective use of decision support systems (DSS)? Incorrectly distinguishing between viable and nonviable data Offering multiple solutions to a problem The collection of too much data Poor data governance decisions and administration

Collecting too much data, especially data that may not be relevant, elongates the DSS process and leads to ambiguous DSS outputs.

How can the Internet of Things (IoT) be utilized in driverless or self-driving automobiles?

Communication between vehicles

How can the Internet of Things (IoT) be utilized in driverless or self-driving automobiles? Navigation information Communication between vehicles Passenger information Communication between devices within an automobile

Communication between vehicles. IoT can allow vehicles to communicate with each other regarding location and speed. This is known as vehicle-to-vehicle (V2V) communications.

In the following "IF" statement, what is "C2>B2" called? =IF(C2>B2,"Over Budget","Under Budget")

Components separated by commas within the parentheses are called arguments.

A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server?

Computer System Administrator(CSA)

Networks

Computer networks include devices such as routers, switches, and communication links that allow the computer systems to communicate with each other no matter the distance or location.

Peer-to-peer Networks (P2P)

Computer networks that connect computers directly to one another without the use of a server.

Wide Area Networks (WAN)

Computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together.

Wide area networks (WAN)

Computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together. Often, WANs rely on a telephone company's transmission facilities to connect the smaller networks together. Many large organizations rely on WANs to centralize data and information in a main office and then have the capability to disseminate that information nationwide, or even worldwide. For example, airlines rely on WANs to provide ticketing agents with access to all flight information. The airline is an example of a network with agents connected using what are referred to as "dumb" terminals. A dumb terminal can be best defined as a computer whose sole purpose is to connect to the network and nothing else.

Computer programmers

Computer programmers (informally called coders) produce both system and application software by writing lines of programming instructions for a computer to follow. Some of the more popular computer programming languages are C, C++, Java, and Python. People who know several programming languages are sometimes referred to as generalists.

What is a major function of a computer operating system?

Computer resource management

What is the major function of a computer operating system? Data management Application program management Network management Computer resource management

Computer resource management

Which IT professional installs and performs minor repairs to hardware, performs software troubleshooting, and makes sure peripheral equipment works properly?

Computer support specialist

Computer support specialists

Computer support specialists install and perform minor repairs to hardware like motherboards, perform software troubleshooting, and make sure peripheral equipment like printers work properly.

Which IT professional installs and performs minor repairs to hardware, performs software troubleshooting, and makes sure peripheral equipment works properly? --Computer programmer --Information security analyst --Computer support specialist --Computer systems administrator

Computer support specialists install and perform minor repairs to hardware like motherboards, perform software troubleshooting, and make sure peripheral equipment like printers work properly.

A large company has decided to invest in new IT systems, including a new server. Which IT professional should be tasked with setting up and maintaining the server? --Computer System Administrator --Computer Programmer --Computer System Analyst --Computer Support Specialist

Computer system administrators are responsible for setting up larger computer assets like network servers and maintaining them for smooth, error-free operation.

Which observation about computing technology is expressed in Moore's law?

Computing processing power doubles every 18 months.

Conditional Functions

Conditional functions allow you to perform calculations where the cell references used to complete the calculations depend on the values of other cells in a worksheet. SumIF, AverageIF, and countif functions

Clustered regularly interspaced short palindromic repeats (CRISPR)

Consider clustered regularly interspaced short palindromic repeats, or CRISPR for short. CRISPR is a powerful gene-editing technology that lets scientists cut and paste bits of DNA from one gene to another. This change in genes can alter a person's traits and possibly cure diseases. Much of CRISPR was made possible by faster computer processing and the availability of massive computer storage space.

Within a productivity suite, which method of selecting static data from one application and copying it to another application requires the use of temporary memory? --Copy and paste --Object embedding --Object linking --File transfer

Copy and paste

A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area. Which type of protection should this company seek to protect the computer code for its program from being copied by others?

Copyright

A start-up software company has designed a program that uses publicly available GPS data to show the location of all city buses and trains in a large metropolitan area. Which type of protection should this company seek to protect the computer code for its program from being copied by others? Copyright Brand Trademark Registration

Copyright

An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author. Which type of law prohibits this kind of unethical behavior?

Copyright

An analyst publishes a paper on cybersecurity. In that paper, he includes several pages of a report written by another author, but he does not attribute those pages to the other author. Which type of law prohibits this kind of unethical behavior? Patent Trade secret Copyright Trademark

Copyright

How can creators of new applications (apps) protect the computer programs used to run them?

Copyright

Name 4 main avenues of protection

Copyrights Trademarks Patents Trade Secret

What are 4 main avenues of protection

Copyrights Trademarks Patents Trade Secret

Ransomware attack

Corporations fear a ransomware attack where their systems are invaded and ransom software is installed on their database systems so that it cannot be accessed unless a ransom is paid and a key is provided by the malicious person.

Which advantage does a business gain by using cloud web hosting (CWH) rather than local hosting?

Cost Savings

Which advantage does a business gain by using cloud web hosting (CWH) rather than local hosting? --Managing seasonal access --Speed of access --Customer access --Cost savings

Cost savings. CWH is implemented quickly and is easy to maintain without hiring IT specialists.

How can a business best determine the return on investment (ROI) of advertising on social media?

Count clicks on advertisements. Correct! Social media allows for click counting to determine the effect of the advertising.

How can a business best determine the return on investment (ROI) of advertising on social media? Count the number of social media sign-ons. Calculate the number of advertisements presented. Count clicks on advertisements. Calculate ROI based on cost per advertisement.

Count clicks on advertisements. Social media allows for click counting to determine the effect of the advertising.

COUNT Function

Counts the number of values selected in the argument that contain numbers.=COUNT(value1,[value2],...)

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer legal copyright on these marketing images?

Creating the marketing images

A freelance graphic designer plans to create some marketing images to use in a portfolio as samples for prospective clients. Which action will give the graphic designer legal copyright on these marketing images? --Registering the images with a copyright office --Creating the marketing images --Declaring the images to be copyrighted --Publishing the marketing images

Creating the marketing images

What kind of system should be created to help a company organize, create, and distribute the collective experience and expertise of employees.

Customer Relationship Management

Customer relationship systems (CRM)

Customer relationship systems (CRM) are information systems that manage the information on a company's customers, including all interactions with each customer. They are, to put it mildly, worth their weight in gold to corporations because they indicate to the company who their customers are and what they purchase. CRM is not the return desk or complaint department but a function of the information system that tracks the customer's preferences.

Which method of sharing data requires the use of temporary memory?

Cut and paste

VLOOKUP

Daniel is a loan officer of a credit union and is assigning an interest rate to potential clients. Below is the table of interest rates based on FICO scores (a type of credit score) in column C and annual income in row 3. In order to assign an interest rate to each client based on the client's FICO score range (column C), which Excel function should Daniel use?

Accessibility

Data accessibility is an issue when the right people cannot get to the right data.

Big Data

Data come from everywhere—including smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources—to be sifted for patterns and trends. These collected data sets are coined big data.

Data Feature

Data feature becomes information once given context

One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data. What is the term that describes this effort? Data governance Schema design Database management Master data management

Data governance

One perpetual issue with corporate data is ensuring the data are accurate and valid. Procedures that apply to end users, managers, and IT personnel are often put in place to ensure good data. What is the term that describes this effort?

Data governance

Which term refers to managing the availability, integrity, and security of an organization's data to ensure that the data remain high quality and valid? --Data analytics --Data governance --Data scrubbing --Data normalization

Data governance is the management of the availability, integrity, and security of an organization's data to ensure that the data remain high quality and valid.

Consistent data hygiene process

Data management process includes maintaining clean and updated data

Data acquisition

Data management processes, Sorting through structured, unstructured, and semistructured data to normalize them into a data warehouse and arrive at a structure to make sure they are usable can often be a difficult process

Business Intelligence

Data management tool, provide better business strategic decision-making and even claims to predict the future, refers to an assortment of software applications used to analyze an organization's raw data.

A marketing employee is tasked with mailing discount coupons to the company's top 100 customers by sales volume. The marketing employee only lists for customer' names, customer' addresses, and sales generated by each customer. Which process should this employee use to ensure coupons are mailed to the correct customers?

Data mining

A data analyst wants to use software to look for useful patterns and hidden relationships in this large set of social media data. Which process can be used to look for these patterns and relationships?

Data mining is the process of looking for meaningful patterns in data.

A data analyst wants to use software to look for useful patterns and hidden relationships in this large set of social media data. Which process can be used to look for these patterns and relationships? --Data management --Data scrubbing --Data mining --Data normalization

Data mining is the process of looking for meaningful patterns in data.

Oracle Data Mining (ODM)

Data mining software program, features Structured Query Language (SQL) that can dig data out of big data sets

Data mining

Data mining/discovery is the examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships.

structured data

Data that (1) are typically numeric or categorical (2) can be organized and formatted in a way that is easy for computers to read, organize, and understand and (3) can be inserted into a database in a seamless fashion.

structured data

Data that (1) are typically numeric or categorical; (2) can be organized and formatted in a way that is easy for computers to read, organize, and understand; and (3) can be inserted into a database in a seamless fashion.

Semi-structured Data

Data that can be converted into structured data with a lot of work.

Which type of data are referred to as "decayed"?

Data that have become outdated

What is the distinguishing feature that differentiates data from information?

Data that have been given context become information.

What is the distinguishing feature that differentiates data from information? Data that have been recorded in a computer become information. Data that have been structured become information. Data that have been given context become information. Data that have been verified for correctness become information.

Data that have been given context become information.

What are scrubbed data?

Data that have been validated for accuracy

Big Data

Data that is collected from all over the internet, including smartphone metadata, internet usage records, social media activity, computer usage records, and countless other data sources.

What is data?

Data, after the finances, are the most valuable asset a company can acquire. Data is used for trend analysis, projections of sales revenue, and many other applications of viewing and massaging the data. These data are stored in databases that are designed for access in many different ways

Database administrators (DBAs)

Database administrators (DBAs) categorize data requirements and create the database entities and models that ensure accurate and smooth-flowing information throughout a business. DBAs may work on a head applications developer's team, but they often also work on existing legacy systems.

What is Database software?

Database management system software (DBMS), is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) This data can be used to make business decisions. Databases can consist of hundreds of related tables, in which case they are called relational databases.

Knowledge Management System

Database of: -- Internal reports and articles -- Policies and decisions -- Documents -- Can increase collaboration

Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts?

Database software

Database Software

Database software, or database management system software (DBMS), is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) that can be queried to produce populations of information. The data retrieved by these queries become information that can be used to make business decisions.

Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts? --Spreadsheet software --Presentation software --Word processor software --Database software

Database software. A database is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) that can be queried to produce populations of information.

Database Management Systems (DBMS)

Databases are created using software systems known as Database Management Systems (DBMS). In a DBMS, data are stored in computer files called tables, and tables are connected to other tables with related information; hence, a relational database. Business databases are created and made available to multiple users on the network and are secured to ensure the accuracy of the data and non-access by unauthorized users.

Databases and Tables

Databases are well-thought-out collections of computer files, the most important of which are called tables. Tables are where a database holds data. Tables consist of records (rows) separated by fields (columns) that can be queried (questioned) to produce subsets of information. This information can be used to make business decisions.

Decision analytics

Decision analytics builds on predictive analysis to make decisions about future industries and marketplaces. Decision analytics looks at an organization's internal data, analyzes external conditions like supply abundance, and then endorses the best course of action.

Eva is a realtor and owns her own real estate business. She has six employees: an administrative assistant at her small office and five real estate agents. She is successful and has 28 current listings of houses for sale. Eva does not believe that real estate agents should be in an office but should be meeting with prospective buyers and sellers since mobility and being visible to her customers is key to their success. To accomplish this, Eva has investigated mobile technology to assist her in her business. Which system should Eva use to leverage business intelligence and analytics to gain insights into her real estate data?

Decision support system (DSS) Decision support systems are used to conduct analytics and business intelligence activities to gain insights into business through data.

Which system should Eva use to leverage business intelligence and analytics to gain insights into her real estate data? --Decision support system (DSS) --Supply chain management system (SCM) --Transaction processing system (TPS) --Global positioning system (GPS)

Decision support system (DSS). Decision support systems are used to conduct analytics and business intelligence activities to gain insights into business through data.

Decision support systems (DSS)

Decision support systems (DSS) are information systems that are interactive software-based systems designed to assist decision makers in compiling useful information from business data and business models to make large business decisions. They utilize data gathered from TPS (transaction processing systems) to develop scenarios for businesses to evaluate.

Electronic Computing Tools

Deliver data and exchange information to help make decision.

Descriptive analytics

Descriptive analytics is the baseline that other types of analytics are built upon. Descriptive analytics defines past data you already have that can be grouped into significant pieces, like a department's sales results, and also start to reveal trends. This is categorizing the information.

Summary Statistics

Descriptive figures that help individuals understand what the data shows; an overall picture of the data.

IT Architects

Design computer applications, screen interfaces, middleware, and programming infrastructure.

IT Architect

Design parts of computer applications like screen interfaces, middleware, and programming infrastructure that comply with the head applications developer's design principles.

Countif Function

Determines the number of cells within a range of cells that contain a specific value.=COUNTIF(range,criteria)

What is unstructured data?

Disorganized and cannot be easily read or processed by a computer because it is not stored in rows and columns like structured data.

Data from multiple sources

Disparate data are data that do not match, are housed in different systems, are in different data formats, and, oftentimes, are out of synch

Copyright

Document granting exclusive right to publish and sell literary, musical, or artistic work

A company hopes to use cloud-based storage to allow employees to share all their work-related files. What is a common cloud-based storage solution for the company?

Drop-box

Alice has written and published a novel, and she is deciding whether to publish it in the traditional way or publish a digital e-book. However, she is concerned about whether the book will be successful or not. What is the largest financial advantage of publishing the novel as an e-book?

E-books require less investment to publish.

Alice has written and published a novel, and she is deciding whether to publish it in the traditional way or publish a digital e-book. However, she is concerned about whether the book will be successful or not. What is the largest financial advantage of publishing the novel as an e-book? --E-books can be read in all reader apps in PDF format. --E-books require less investment to publish. --E-books require less advertising. --E-books sell for the same amount as traditional books.

E-books require less investment to publish. She will not incur printing and distribution costs.

A large clothing retailer has an extremely active social media account and hundreds of thousands of followers who create millions of comments per year. Once a quarter, the marketing department offers a major discount to its followers on social media. The company wants to know the return on investment (ROI) of the discounts and store the information in its data warehouse. A data analyst in the IT department is given the task of extracting, processing, and analyzing the data. The data are currently unstructured. The data will be used to create information that will be given to the CIO to inform future decisions. What can the data analyst use to retrieve and process the data to put into the data warehouse?

ETL

ETL

ETL is an acronym for extract, transform, and load, and are tools that are used to standardize data across systems and allow the data to be queried. Querying is a tool that lets you ask your data questions that in turn lead to answers and assist in making decisions.

What can the data analyst use to retrieve and process the data to put into the data warehouse? ETL Hadoop Tableau SQL

ETL is the process of extracting, transforming, and loading the data into the database.

Media Access Control address (MAC)

Each computer attached to the internet or a corporate network is uniquely identified so that it can be sent the information directed to it. What is this unique identifier known as?

Linear Bus Topology

Each device connects in a sequential chain

Which restriction applies to the data in the primary field of a database?

Each key must be unique

Which restriction applies to the data in the primary field of a database? Each key must be unique. The primary field must be generated by the system. The primary key must be the first attribute in the table. Each key must be numeric.

Each key must be unique. The key in the primary field of a database must be unique and cannot be repeated.

What is a MAC (Media Access Control) address?

Each network interface, both NIC and Wi-Fi, provide the computer with a unique 48bit address called a MAC (media access control) address, meaning that no two network interfaces have the same address and therefore uniquely identifies that computer network interface to the network.

Ring Topology

Each node connected to two or more network computers - First and last computers connected together - No host computer is required - Each computer manages its own connectivity - Least used topology

Communications Software

Email, Microsoft Teams, and texting are examples of communications software. Real-time or offline communications are valuable to a business in communicating with both employees and other people and businesses.

Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business?

End User

Data Governance

Ensures data is accurate and valid

Client/server

Essentially means that information is stored in central location like specialized server computer that serves information to many clients computers connect to it.

IoT devices require constant Wi-Fi connectivity.

Establishing a large network of IoT devices can improve the operation of a manufacturing business by automating many aspects of the manufacturing process. What is the main vulnerability to production due to use of IoT devices?

What are the basic components, in addition to computers, that are required for a local network to function?

Ethernet cards, a common protocol, ethernet cables and a hub

A customer relationship management system

Eva wants to implement a tracking system of everyone who logs in and searches her listings of homes for sale, capturing information on who logs in, when, and what information they accessed. Which piece of IT infrastructure should she implement to help automate this process?

Browser-based web development

Eva wants to make her own website for her real estate business. Which technology could she use to develop her own website without first acquiring programming skills?

node

Every device connected to a network

Extract (ETL)

Extract: Once you have determined where your data reside, you can start extracting. The data are often extracted from customer relationship management (CRM) or enterprise resource planning (ERP) systems. One of ERP's main functions is to centralize an organization's data so that they end up being a wealth of data with value across the organization.

A large company uses a system that provides information to its suppliers to maintain the supply chain process. Which type of system is this company using?

Extranet

United States government regulations in the IT industry

FERPA HIPPA Sarbanes

FERPA—Family Educational Rights and Privacy Act

FERPA—Family Educational Rights and Privacy Act: A federal law that protects the rights of students' educational records. Information about grades, attendance, disciplinary records, report cards, transcripts, and so forth cannot be given to anyone not specifically listed on a FERPA form that is signed when a student enters a school.

True or False: The Family Educational Rights and Privacy Act (FERPA) requires all public schools to house student records in a single national database.

False

True or False: Written posts extracted from a social media feed are generally classified as structured data.

False

True or false: Implementation of the IoT in the healthcare industry will increase the need for hospital staff to monitor and record data to be analyzed.

False IoT devices can monitor patients and collect data and report to a database, which reduces data collection tasks for hospital staff.

True or False Microsoft Project is classified as presentation software.

False. It is project management software, not presentation software.

FERPA

Family Educational Rights and Privacy Act: A federal law that protects the rights of students' educational records. Information about grades, attendance, disciplinary records, report cards, transcripts, and so forth cannot be given to anyone not specifically listed on a FERPA form that is signed when a student enters a school.

Smart homes with voice controlled light switches, app-connected video doorbells, and internet-enabled appliances are changing the nature of Eva's work selling real estate. Which improvement in IT infrastructure has enabled these real-time devices to function properly?

Faster internet speeds

Cloud-Based Infrastructure

File hosting services that provides cloud storage, file sychronization, business cloud, and client-side software.

What is the term used to describe a file sharing system that uses cloud-based technology?

File synchronization service

Maria has accumulated on her PC a lot of data that are pertinent to her job. She is investigating automated backup functions, rather than the manual systems she is currently using, to make sure her data are safe. What is the term for these automated systems?

File synchronization services

Dropbox and Google Drive are both examples of what service?

File synchronization services Correct! File synchronization services offer a cloud-based service where automated file transfers are made to update files from a sharing directory on each user's networked device.

Dropbox and Google Drive are both examples of what service? File synchronization services Project Management Software (PROOFHUB, Basecamp., and Asana are all examples of Project Management Software) Function-Specific Software Communications Software

File synchronization services. File synchronization services offer a cloud-based service where automated file transfers are made to update files from a sharing directory on each user's networked device.

What are the three major functions of a computer operating system?

File, memory, and process management

Which kind of system should be created to specifically help a company collect and distribute important electronic documents via a computer network as PDF files?

File-sharing system

Which kind of system should be created to specifically help a company collect and distribute important electronic documents via a computer network as PDF files? --Cloud database system --Knowledge management system --File-sharing system --Project management system

File-sharing system

Switches

Filter the information to the correct part of a network

MIN function

Finds the minimum value of all the values selected in the argument.=MIN (number1,[number2],...)

The business in the scenario frequently works with sensitive data, and it is important to ensure that the network is highly secure. Which network component is specifically designed to prevent unauthorized users from accessing the network?

Firewall

IoT will deliver at least two broad impacts on business

First, IoT represents enormous opportunities for new businesses to innovate through the development of automated devices Second, existing businesses can use IoT to increase speed, reduce risk, improve quality, simplify production, and respond more precisely to key market indicators.

Applied Research

Focused on developing a customer product.

Applied Research

Focused on developing a customer product. Research that is focused on developing a commercial product or process to meet customer or industry requirements and needs.

Marketing

Focuses on customers and is responsible for advertising and branding a business's products and services. How it is affected by IT --SEO, search engine marketing, and database analysis

A database manager is setting up a relational database. The manager creates a field in a table that links to the primary key in a different table in the database. What is this field called?

Foreign Key

The data analyst at Freedom Rock Bicycles wants to link two tables in the database. What is the name of the field in a database table that is used to connect or link two tables together?

Foreign Key

A database manager is setting up a relational database. The manager creates a field in a table that links to the primary key in a different table in the database. What is this field called? --Schema --Function --Absolute reference --Foreign key

Foreign key. A foreign key is a field in a table that links to the primary key in a different table in a database.

Foreign key

Foreign key: A field in a database table that provides a link between two tables in a relational database.

Variety

Form of the data, both structured & unstructured.

Routers

Forward information through a network

Normalize the database

Freedom Rock Bicycles found that it has multiple records due to multiple sales to the same individual. This has caused access problems when looking for specific customers. What can Freedom Rock Bicycles do to alleviate this problem?

Online analytical processing (OLAP)

Freedom Rock Bicycles has installed a new database to keep track of sales by region, salesperson, product, and sales prices, among other items, to keep information on business processes. After installation, Freedom Rock Bicycles discovered additional benefits of the information accumulated in the database and how the information can improve the business profitability and future plans. Freedom Rock Bicycles found that daily reports could be run using SQL to indicate product and parts inventory and sales for the day. Which approach can be used to retrieve this information efficiently?

It can be accessed from anywhere there is an internet connection.

Freedom Rock Bicycles is considering adopting a cloud-database system. What is the primary advantage of a cloud database?

Which type of software is supply chain management software?

Function-specific software

What is the defining characteristic of function-specific software? It is tailored to a specific group or industry. It works only on specific devices. It is graphical in nature. It is designed for use by upper management.

Function-specific software is designed for a very specific purpose.

Which type of software is supply chain management software? Communications software Function-specific software Mobile software General purpose software

Function-specific software is tailored to an industry or a particular business application.

Infrastructure

Fundamental facilities and systems serving a country, city, or area, as transportation and communication systems, power plants, and schools

Delivery drones do not depend on guidance by a human but on information technology systems to run autonomously. Which key network system would a self-guided drone system rely on? --Wi-Fi --GPS --Cellular network --Bluetooth

GPS is available everywhere, and the drone can use GPS to find the correct location.

GRaaS (Governance Rules as a Service)

GRaaS (Governance Rules as a Service) is a thorough rules-based automation for retention of information based on governance rules established by the business. Meets all requirements for record retention and minimizing legal risks associated with keeping records. Included in a GRaaS are better management of record retention and deletion, automated document destruction on a scheduled basis, and assurance that new laws and retention regulations are met.

Each business that retains records, whether in paper form or in a database, needs to have a retention policy as part of the standard audit requirements and.....

GRaaS is an automated process to assist IT in managing and meeting those requirements.

Global positioning systems (GPS)

Global positioning systems are designed to receive signals from an app on a phone and geostationary satellites so that a precise location can be determined. This is done by receiving multiple signals from the satellites and analyzing the data to determine the phone's coordinates on Earth.

A large heating and air conditioning company provides each employee with a small computing device that the employees use to track work and accept payments.

Handheld Computer

What are the six major components of an IT infrastructure?

Hardware Software Networks Data People Processes

What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards? Information Technology Software Operating System Hardware

Hardware is the physical components of a computer system.

HIPAA

Health Insurance Portability and Accountability Act: A federal law that provides data privacy and implements security provisions to safeguard an individual's medical information. A HIPAA form is signed each time you visit a new doctor so they can understand who they can share that information with.

What is the name of the law that states a doctor cannot share a patients results/records?

Health Insurance Portability and Accountability Act: A federal law that provides data privacy and implements security provisions to safeguard an individual's medical information. A HIPAA form is signed each time you visit a new doctor so they can understand who they can share that information with.

Tables

Holds the data for a database. Consists of records and fields that can be queried.

Database Management System Software (DBMS)

Holds the data for a database. Cosists of records and fields that can be queried.

Reference Functions

Horizontal Lookup function and Vertical lookup function

Placement of Marketing

How a product or service is delivered to a customer. How, where, and to whom a product is delivered describes placement.

Count clicks on advertisements.

How can a business best determine the return on investment (ROI) of advertising on social media?

Copyright

How can creators of new applications (apps) protect the computer programs used to run them?

Copyright - Since an app is an original created work that is a written program, much like a book, it is protected by copyright.

How can creators of new applications (apps) protect the computer programs used to run them?

By placing internet-connected sensors on every part in order to monitor inventory

How can the Internet of Things (IoT) be used to improve supply chain management in the automotive industry?

Communication between vehicles

How can the Internet of Things (IoT) be utilized in driverless or self-driving automobiles?

Communication between vehicles IoT can allow vehicles to communicate with each other regarding location and speed. This is known as vehicle-to-vehicle (V2V) communications.

How can the Internet of Things (IoT) be utilized in driverless or self-driving automobiles?

Be stingy about giving out personal information, and treat all of your personal information on a need-to-know basis. Check your financial information on a regular basis and inspect what should and should not be there. Ask periodically for your credit report: it is a good idea to check your credit score on a regular basis as a barometer of your financial status and watch for any unusual fluctuations. Maintain careful records of your banking and financial records.

How can you protect yourself against identity theft and other online SCAMs?

They have to decide based on the situation.

How do IoT designers determine what runs at the edge versus what runs in the cloud?

Wi-Fi

How do most Internet of Things (IoT) devices connect to other devices?

It provides access to collective company knowledge.

How does a knowledge management system (KMS) help a company?

Increased user control of the organization's website

How have online web development tools benefitted small businesses?

Software updates for client computers can be done at once from the server.

How will the maintenance of employee workstations be simplified by creating an office network?

Text Analytics

Hunts through unstructured text data to look for useful patterns.

An additional problem that the consultant identified was that unauthorized users could easily access data on the company's internal network. Which IT professional is responsible for addressing this issue?

ISA (information security analysist)

Information Security Analyst (ISA)

ISAs are responsible for protecting all sensitive information within an organization

Information Security Analysts (ISA)

ISAs are responsible for protecting all sensitive information within an organization.

A company is planning several IT projects including a major software development project. The software development project will be organized using the software development life cycle (SDLC) methodology. Which IT professional should be called upon to create a detailed project plan for this effort?

IT Manager

Which professional designs parts of computer applications (like screen interfaces, middleware, and programming infrastructure) that comply with the head application developer's design principles?

IT architect

IT architects

IT architects (applications architects) design parts of computer applications like screen interfaces, middleware, and programming infrastructure that comply with the head applications developer's design principles. Middleware is the computer programming and software that connect the components that an applications architect designs with the programming infrastructure, which includes the actual programming language components that help an application work as designed.

Which professional designs parts of computer applications (like screen interfaces, middleware, and programming infrastructure) that comply with the head application developer's design principles? --IT architect --Computer systems administrator --Computer systems analyst --Database administrator

IT architects design the parts of computer applications that comply with the head application developer's design principles.

A company is planning several IT projects including a major software development project. The software development project will be organized using the software development life cycle (SDLC) methodology. Which IT professional should be called upon to create a detailed project plan for this effort? --IT Manager --Computer Systems Analyst --Chief Technology Officer --IT Architect

IT managers are in charge of software application development teams that develop, design, program, and test software applications.

IT Managers

IT managers are in charge of software application development teams that develop, design, program, and test software applications.

Who is responsible for designing a detailed plan to address software incompatibility issues? --IT architect --Chief information officer --IT portfolio manager --Computer systems administrator

IT portfolio managers are responsible for the standardization of software rules and plans.

IT portfolio managers

IT portfolio managers are responsible for the standardization of software rules and plans. They design a detailed plan to address software incompatibility issues.

Marketing

IT services that focus on customers promote core business responsibilities such as the branding of a business's products and services. Which business department would these services be most relevant to?

Standardization

Implement a standardization of how data is being handle, to improve data quality

Most mobile applications (apps) go through a standard nine-step development process. What is usually the final step in the development process of a mobile app?

Improve the app based on user feedback. Correct! Responding to users is key and provides valuable feedback for improvements.

Hadoop

In 2005, Doug Cutting and Mike Cafarella created Hadoop, an infrastructure for storing and processing large sets of data across multiple servers. Instead of centralized files in one place like a data warehouse or datamart, Hadoop uses a distributed file system that allows files to be stored on multiple servers. Unlike storing centralized data, Hadoop attempts to identify data files on other servers. Hadoop is flexible enough that it allows for one query to be issued that searches through multiple servers. Unfortunately, Hadoop is not the best for on-the-fly or ad hoc queries and is very difficult to implement and run. Typically, Hadoop needs a highly qualified data scientist to run it. Right now, Hadoop is best for large companies like Facebook, eBay, and American Express that create terabytes and petabytes of data every day.

IT portfolio manager

In charge of the projects and activities of information technology (IT) departments, budget oversight of the IT department, risk management, and standardization of software rules and plans

In which network topology is each client computer connected directly to the hub? Ring Star Bus P2P

In star topology has computers that are connected to a central hub.

Argument

In the following "IF" statement, what is "C2>B2" called? =IF(C2>B2,"Over Budget","Under Budget")

The network administrator

In the report, the consultant noted that the company's network is in need of maintenance. Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software?

Standardize software throughout the organization.

In the scenario above, how should the IT department resolve the incompatibility issue?

Star

In which network topology is each client computer connected directly to the hub?

Semi-structured data

In-between Structured and Unstructured data and can possibly be converted into structured data

How have online web development tools benefitted small businesses?

Increased user control of the organization's website

How have online web development tools benefitted small businesses? Simplified programming education for business owners Increased user control of the organization's website Simplified HTML coding on business websites Increased search engine rankings for small businesses

Increased user control of the organization's website

Online Web Development

Increases user control of organization's website

What term refers to the study, design, development, implementation, support, and management of computer-based information systems?

Information Technology

A company has recently discovered that unauthorized users have accessed data on the company intranet. Which IT professional should investigate this concern?

Information security analyst

Unauthorized users can easily access data on the company's internal network. Which IT professional is responsible for addressing this issue?

Information security analyst

Information security analysts (ISA)

Information security analysts (ISA) (or cybersecurity analysts) are responsible for protecting all sensitive information within an organization. Duties include deploying firewalls to protect intranets and encrypting data transmissions to protect against attacks from inside and outside of an organization. ISAs are responsible for identifying security problems and attacks as well as determining an organization's potential weaknesses.

What is Information technology (IT)?

Information technology (IT) is the study, design, development, implementation, support, and management of computer-based information systems, particularly software and hardware.

Thread

Initial post with subsequent comments

William has a fleet of 60 trucks that deliver products within 100 miles of his distribution center. He would like to know where his trucks are at all times. How can he efficiently manage this? --Use radio signals to track location --Use cell phone tower geolocation --Install RFID tags in his vehicles --Install GPS tracking on his trucks

Install GPS tracking on his trucks

There are many airport vehicles at Charlotte's airport, and time and movement of planes and baggage are of primary importance. Because of this, IoT is used to track the location of baggage vehicles at the airport. When the airport purchases a new baggage vehicle, what must be done to connect it to the IoT system? Install a Bluetooth-enabled tracking system. Install a device with a small Wi-Fi router in the vehicle. Install a sensor with a unique identifier (UID) Install a global positioning system (GPS) navigation system.

Install a sensor with a unique identifier (UID). All vehicles must have a unique sensor to transmit their location to a central computer. Correct! All vehicles must have a unique sensor to transmit their location to a central computer.

William manages the repair department of the business and is frustrated with the process of acquiring parts. Which IT methodology can William use to help manage this process? --Install an extranet to the company's suppliers. --Install a database to manage parts inventory. --Create an intranet connection for the company's suppliers. --Connect suppliers with the company's accounting system.

Install an extranet to the company's suppliers. This will establish a supply chain system that will help manage the supplies needed.

Computer support Specialists

Install and perform minor repair to hardware like motherboards, troubleshoot, work on peripheral equipment too.

Trade Secret

Intellectual work, such as a business plan, that is a company secret and is not based on public information

CRM (Customer Relationship Management)

Internal database

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices. What is the designation of this new protocol?

Internet Protocol version 6 (IPv6)

Every device on the internet has a unique numerical label that identifies it. With so many devices requiring an internet address, a new protocol has been developed that can provide unique identifiers to over 280 trillion devices. What is the designation of this new protocol? Transmission Control Protocol (TCP) Hypertext transfer protocol (HTTP) User Datagram Protocol (UDP) Internet Protocol version 6 (IPv6)

Internet Protocol version 6 (IPv6)

A large agriculture company uses a system that uses sensors to measure the soil moisture at various locations in its fields. These data are used to automatically adjust the irrigation system, which reduces water waste. Which type of technology is this company using to reduce water waste?

Internet of Things

In today's environment, more and more companies are providing "smart" household items such as lights, doorbells, and refrigerators that can be controlled via applications on consumers' phones or tablets. What is the common term for this type of technology?

Internet of Things

In today's environment, more and more companies are providing "smart" household items such as lights, doorbells, and refrigerators that can be controlled via applications on consumers' phones or tablets. What is the common term for this type of technology? Linked devices Distributed systems Internet of Things Cloud services

Internet of Things

A large agriculture company uses a system that uses sensors to measure the soil moisture at various locations in its fields. These data are used to automatically adjust the irrigation system, which reduces water waste. Which type of technology is this company using to reduce water waste?

Internet of Things Correct! This is an example of IoT. The sensors record data, which is then used to intelligently adjust the irrigation system.

Transaction processing systems (TPSs) are used by grocery stores to gather data on which products are sold and when they are sold, and customer information. If all TPS data are related to a grocery store's finances, inventory, and customers, which type of network configuration would be most appropriate for the implementation of a TPS?

Intranet

Bullzai Meat Company has freezer warehouses across the southern United States to hold meat until it is purchased by restaurants and schools. Bullzai needs to monitor the atmosphere and temperature quality of each of its freezers but cannot afford to have personnel perform this on a continual basis. Which technology implementation will allow the company to accomplish this goal?

IoT (Bullzai)

Which technology necessitated the development and implementation of Internet Protocol version 6 (IPv6)?

IoT (IPv6)

A hospital issues new patients a wristband that is not just a barcode but has monitoring and communications properties. Which technology is the hospital using for these wristbands?

IoT (hospital)

Bullzai Meat Company has freezer warehouses across the southern United States to hold meat until it is purchased by restaurants and schools. Bullzai needs to monitor the atmosphere and temperature quality of each of its freezers but cannot afford to have personnel perform this on a continual basis. Which technology implementation will allow the company to accomplish this goal? --RFID --Wi-Fi --Mobile app --IoT

IoT can monitor and send information via the internet.

All industries

IoT devices are devices like smart air conditioning or security systems that can be used in homes and businesses

Which network information is needed to connect an Internet of Things (IoT) device? --Wi-Fi connection information --MAC address --Cellular network information --Network packet type

IoT devices connect to Wi-Fi in a home.

The edge

IoT devices observe and gather data but have limited intelligence for analysis. With respect to the design of an IoT network, where are the IoT devices located?

The edge

IoT devices observe and gather data but have limited intelligence for analysis. With respect to the design of an IoT network, where are the IoT devices located?

Establishing a large network of IoT devices can improve the operation of a manufacturing business by automating many aspects of the manufacturing process. What is the main vulnerability to production due to use of IoT devices?

IoT devices require constant Wi-Fi connectivity

A hospital issues new patients a wristband that is not just a barcode but has monitoring and communications properties. Which technology is the hospital using for these wristbands? --IoT --RFID --Bluetooth --Cloud services

IoT has the capability to monitor and collect information and transmit it.

IOT and Healthcare

IoT hospital beds track different metrics on the patient occupying it—such as heart rate, blood pressure, and oxygen levels—and can even monitor for early warning signs of infection

Oliver would like to integrate Internet of Things (IoT) technologies into his small bike manufacturing business. He has contracted with several different IoT system vendors to automate different aspects of the production process. What is the main potential flaw in Oliver's automation strategy?

IoT systems may be incompatible with each other.

Oliver would like to integrate Internet of Things (IoT) technologies into his small bike manufacturing business. He has contracted with several different IoT system vendors to automate different aspects of the production process. What is the main potential flaw in Oliver's automation strategy? IoT provides little benefit for manufacturing firms. IoT systems require significant factory floor space. IoT systems may be incompatible with each other. IoT is generally incompatible with robotic systems.

IoT systems may be incompatible with each other.

IOT and Education

IoT will be able to eliminate time-consuming, mundane tasks like taking roll or grading assignments

Application Software

Is defined as software an end user chooses to use, like Microsoft Excel or Adobe Photoshop, that accomplishes a specific task for the user

Human Resources

Is responsible for the administration of a business's personnel. How it is affected by IT --Database of employee information

System software

Is software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals; Like the Microsoft Windows operating system, The most important aspect of system software is when an operating system is enabled and becomes a platform for application software to work.

What is the purpose of a universal serial bus (USB) on a laptop or desktop computer?

It allows the computer to connect peripheral devices.

What is the purpose of a universal serial bus (USB) on a laptop or desktop computer? It provides a wired ethernet connection to the network. It serves as an internal transmission bus between components within the computer. It allows for universal data transmission to various types of wireless networks. It allows the computer to connect peripheral devices.

It allows the computer to connect peripheral devices.

Freedom Rock Bicycles is considering adopting a cloud-database system. What is the primary advantage of a cloud database?

It can be accessed from anywhere there is an internet connection

Freedom Rock Bicycles is considering adopting a cloud-database system. What is the primary advantage of a cloud database? It can be accessed from anywhere there is an internet connection. Database management is not required by the company. It is inherently secure because it is stored offsite. It requires no software installed on client computers.

It can be accessed from anywhere there is an internet connection. Cloud databases are not located on a physical server within a corporation.

How does a Gantt chart facilitate project management?

It identifies and sequences the tasks of a project.

How does a Gantt chart facilitate project management? It graphically shows the organization of a project team. It helps calculate the projected and actual costs of a project. It identifies and sequences the tasks of a project. It maps the flow of communication and decisions for a project

It identifies and sequences the tasks of a project.

Which three benefits does a customer relationship management system (CRM) provide to a business? Choose 3 answers.

It is a process to capture information about the business's customers. It facilitates marketing strategies to increase business.(A CRM uses captured sales data for marketing analysis.) It provides communication tools and channels.

What is the purpose of a dashboard in business intelligence (BI) software?

It is a visual presentation of graphs, charts, and diagrams.

What is the purpose of a dashboard in business intelligence (BI) software? It is a visual presentation of graphs, charts, and diagrams. It is a graphical display of raw data to assist in data consolidation. It is a user tool for inputting queries into the software. It is a graphical user interface for controlling the execution of the software.

It is a visual presentation of graphs, charts, and diagrams.

Why is a passphrase useful?

It is secure and easy to memorize.

What is the defining characteristic of function-specific software?

It is tailored to a specific group or industry

What is the purpose of a foreign key in a database?

It is used to link two tables together.

What is the purpose of a foreign key in a database? It is a key that has invalid or decayed data. It is used to link multiple databases together. It is a key that connects to the wrong data. It is used to link two tables together.

It is used to link two tables together.

What is the defining characteristic of application software?

It performs a specific task for the user.

How does a knowledge management system (KMS) help a company?

It provides access to collective company knowledge

How does a knowledge management system (KMS) help a company? It generates knowledge from outside data. It provides access to collective company knowledge. It creates rules for sharing company knowledge. It evaluates company knowledge for decision-making.

It provides access to collective company knowledge.

By segmenting data in a data management system, a business achieves a significant advantage over non-segmentation. What is that advantage?

It targets the right customers.

By segmenting data in a data management system, a business achieves a significant advantage over nonsegmentation. What is that advantage? It keeps data valid. It targets the right customers. It makes SQL easier. It increases return on investment (ROI).

It targets the right customers. Data segmentation segments information into useful categories.

What is the purpose of the primary key in a database?

It uniquely identifies the records in a specific table.

What is the purpose of the primary key in a database? It is the primary encryption key for a secure database. It uniquely identifies the tables in a database. It uniquely identifies the records in a specific table. It is the record number of each record in a table.

It uniquely identifies the records in a specific table.

Structured Query Language (SQL)

Jack and William want to hire a person to write code to access their database in order to build management reports. Which skill should a successful applicant possess?

Share the records only after receiving authorization from Jack's son.

Jack meets with the university dean to discuss his 18-year-old son's progress. Jack's son is a freshman at the university. Jack wants to know if his son is performing well in his classes. The dean has access to the computer systems containing the academic records for Jack's son but is also aware of constraints set by the Family Educational Rights and Privacy Act (FERPA). What should the dean do?

Which valuable business intelligence (BI) can Freedom Rock Bicycles acquire from the database that directly relates to overall revenue and profitability based on this scenario? --Knowing the sales price of each product --Knowing who is the best salesperson --Knowing the manufacturing cost of each product --Knowing which products sell the best in each region

Knowing which products sell the best in each region. This is valuable BI for marketing that would increase revenue and profitability.

Which kind of system should be created to help a company organize, create, and distribute the collective experience and expertise of employees?

Knowledge management system

Which kind of system should be created to help a company organize, create, and distribute the collective experience and expertise of employees? --Human resource management system --Customer relationship management system --Knowledge management system --Project management system

Knowledge management system

Midrange Computers

Less powerful and smaller in physical size than mainframe computers, they do many of the same things but on a smaller scale.

A company produces a mobile app that provides recipes and cooking tutorials.

Lifestyle

A company produces a mobile app that provides recipes and cooking tutorials. Which category of app is this? --Social networking --Entertainment --Lifestyle --Utility

Lifestyle

Charlotte finds that the airport spends more than $100,000 each month on electricity for lighting and the heating and cooling system in the airport. How could Charlotte use IoT to reduce her airport's power bill?

Light dimmers and thermostats that report passenger traffic through the terminals in real time

Charlotte finds that the airport spends more than $100,000 each month on electricity for lighting and the heating and cooling system in the airport. How could Charlotte use IoT to reduce her airport's power bill? Door sensors that beep when a door is left open Light dimmers and thermostats that report passenger traffic through the terminals in real time Motion sensors to turn the lights on and off in restrooms Thermostats that turn down the heat at 10 p.m. each night.

Light dimmers and thermostats that report passenger traffic through the terminals in real time. Devices that connect and respond to data traffic are IoT technologies that can reduce energy consumption.

Datamart

Limited in complexity of databases, and smaller than a Data Warehouse, but are cheaper to implement than a full warehouse.

Foreign Key

Links two tables together

A small business has a single network that allows every employee to connect through a central server when they are in the company's main office. What type of network is the business using?

Local area network (LAN)

While the business in the scenario is growing, it is still a small business. There are just 25 employees, and they all work in the same location. Which type of network will the business use?

Local area network (LAN)

Vertical Lookup Function

Look up a value in a table by matching on the first column.=VLOOKUP(value,table,column_index,[range_lookup])

Horizontal Lookup Function

Look up a value in a table by matching on the first row. =HLOOKUP(value,table,row_index,[range_lookup])

What are Mainframe computers?

Mainframe computers are massive, room-sized computers that process and store enormous amounts of bulk data and information. They are typically used by very large organizations like credit card processors who employ them for transaction processing and vital applications. Mainframes require a huge amount of physical space and have special requirements like specialized air-conditioning units and fire protection systems.

What is the term used to refer to a massive, room-sized computer that processes and stores enormous amounts of bulk data and information? Processor Database Hub Mainframes

Mainframes are designed to handle massive amounts of transactions and data.

What is the final step in the deployment and use of an app?

Maintain and upgrade the app based on use and user feedback

What is the final step in the deployment and use of an app? Market the app using focused marketing to reach the desired audience Track the technical performance and user reviews of the app Maintain and upgrade the app based on use and user feedback Launch the app in the app stores for all applicable platforms

Maintain and upgrade the app based on use and user feedback

Data Management

Major function of computer operating system

A company's IT department is currently a subunit of the accounting department, reporting to the accounting manager. The reason for this is that accounting is the single largest consumer of the company's IT services. The company's president decides that due to widespread disorganization and poor communication, she wants to reorganize all business units. What is the best recommendation for placement of IT within the company?

Make the IT department independent

Management Level Reporting

Management level reporting refers to the level of detail or summarization appropriate for a certain level of employee regardless of report type

On a day-to-day basis, what is the major focus and responsibility of a chief technology officer?

Managing the IT group and designing the IT architecture

On a day-to-day basis, what is the major focus and responsibility of a chief technology officer? Interfacing with the IT users and setting end-user policies Ensuring that the IT infrastructure is up to date Managing the IT group and designing the IT architecture Keeping the IT development projects on schedule

Managing the IT group and designing the IT architecture

File synchronization services

Maria has accumulated on her PC a lot of data that are pertinent to her job. She is investigating automated backup functions, rather than the manual systems she is currently using, to make sure her data are safe. What is the term for these automated systems?

=C3>70

Maria recently received a large set of data containing new employees' exam scores. She was asked to prepare the data for analysis. The first task is to identify whether each of the new employees received a score over 70. She is going to use Boolean logic to return "TRUE" if the new employee's score is over 70 and "FALSE" otherwise. What should she type in cell D3 below?

Mainframe Computers

Massive, room-sized computers that process and store enormous amounts of bulk data and information.

Master data management

Master data management, or MDM, is a methodology or process used to define, organize, and manage all the data of an organization that provides a reference for decision-making. A master data management tool works by removing duplicates, standardizing data, and incorporating rules to prevent incorrect data from entering the system. MDM can rearrange and codify the data into meaningful information, reducing duplication and impacting the return on investment (ROI).

Accounting

Measures and provides financial information about an organization. How it is affected by IT --Needs collaboration software and a networked system

Each computer attached to the internet or a corporate network is uniquely identified so that it can be sent the information directed to it. What is this unique identifier known as? --Network Interface Controller (NIC) --Network Operating System (NOS) Transmission Control --Protocol / Internet Protocol (TCP/IP) --Media Access Control address (MAC)

Media Access Control address (MAC). This MAC address is unique to every computer on the network.

Health Insurance Portability and Accountability Act (HIPAA).

Medical records are protected

Virtual Memory

Memory that appears to exist as main storage although most of it is supported by data held in secondary storage, transfer between the two being made automatically as required.

Charlotte is the operations manager at one of the nation's busiest airports. More than 600 flights depart or arrive at her airport every single day. Safety is not only critical but it is defined and monitored by government agencies. Food supply and baggage conveyor systems, maintenance and service vehicles, and, of course, airplanes must all move around the airport's runways and roads without creating hazards or delays for workers or passengers. Airport services including restaurants, shops, medical response, screening and security, and more must all work together seamlessly to ensure the airport runs smoothly and efficiently in order to get passengers to their destinations. Charlotte's job is to make sure that happens. The following questions are about how Internet of Things (IoT) could affect the various businesses and organizations working together at the airport. What is an example of IoT technology being used to aid airport functions?

Menus at airport restaurants that allow passengers to order food using a tablet computer

There are a number of different social media platforms that are categorized into distinct types. Which type of social media platform features short written entries posted for anyone who has subscribed to the account?

Microblogging

Microcomputers

Microcomputers are smaller than mainframes and midrange computers and are so common that they are most commonly referred to simply as computers and sometimes just referred to as boxes. They are the least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.

What are Microcomputers?

Microcomputers are smaller than mainframes and midrange computers and are so common that they are most commonly referred to simply as computers and sometimes just referred to as boxes. They are the least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.

Graphical User Interface (GUI)

Microsoft Windows represents its file management system visually, simply thought as the inner workings of a physical filing cabinet that contains the file folders that house paper files.

Midrange Computers

Midrange computers (sometimes called minicomputers) are less powerful and smaller in physical size than mainframe computers

What are Mid-range computers?

Midrange computers (sometimes called minicomputers) are less powerful and smaller in physical size than mainframe computers; they do many of the same things but on a smaller scale.

Midrange Computers

Midrange computers (sometimes called minicomputers) are less powerful and smaller in physical size than mainframe computers; they do many of the same things but on a smaller scale. Small- to medium-sized businesses that cannot afford mainframes can leverage midrange computers in the exact same way large organizations leverage mainframe computers.

A design business has employees based in different parts of the country, with all employees working remotely from home. This allows the business to attract the best expertise, which is a great benefit to the business. One problem, however, is that employees are often waiting for other employees to complete certain tasks before they can complete their own. This lack of coordination causes significant delays in projects. Which software feature could help address the problem described in the scenario?

Milestone tracking

Which software feature could help address the problem described in the scenario?

Milestone tracking (Project management software allows employees to see what other employees need to complete and when.)

Lucas uses project management software for managing all his projects. Which output of project management software is used to assign tasks?

Milestones Correct! Project management software defines the steps on how to complete a project based on input parameters, such as milestones.

Lucas uses project management software for managing all his projects. Which output of project management software is used to assign tasks? System development life cycle (SDLC) (major steps of any programming project) Unified Modeling Language (UML) Milestones Gantt charts

Milestones. Project management software defines the steps on how to complete a project based on input parameters, such as milestones.

Which function or feature has allowed mobile phones to replace PCs for many small-business functions?

Mobile Apps

Which function or feature has allowed mobile phones to replace PCs for many small-business functions? --Wi-Fi --GPS --Cloud-based data storage --Mobile apps

Mobile apps. Mobile apps replicate many programs previously only offered on PCs.

A mobile app developer has developed a game that users can download and play for free. However, once users reach the one hundredth level, they must pay to unlock additional levels. What has the developer done by requiring app users to unlock additional levels?

Monetized the App

Network Interface Controller

NIC card for each computer; The most common NIC is called an Ethernet card

Policies must be enacted and enforced to protect corporate assets. These policies include strong passwords, safe web browsing protocols, firewall implementations, and malware protection. Who is the IT professional responsible for enacting these policies?

Network Administrator

Policies must be enacted and enforced to protect corporate assets. These policies include strong passwords, safe web browsing protocols, firewall implementations, and malware protection. Who is the IT professional responsible for enacting these policies? Chief Technology Officer (CTO) Network Analyst Chief Information Officer (CIO) Network Administrator

Network Administrator. The network administrator has the authority to develop and implement network policies.

What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software?

Network administrator

What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software? Network administrator Network architect Network engineer Network development

Network administrator

What are Network administrators?

Network administrators are directly responsible for the smooth operations and maintenance of a business's networks and networking technology, including its hardware and software. Network administrators often work in partnership with network engineers and network architects to implement and deploy new networks, expand old ones, or integrate an existing network with another existing network.

In the report, the consultant noted that the company's network is in need of maintenance. Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software? The network installer The network programmer The network administrator The network analyst

Network administrators are responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software.

Which type of device is an ethernet card? --Network server hardware --Network firewall hardware --Network operating system (NOS) --Network interface controller (NIC)

Network interface controller (NIC)

Network Security

Network security starts with a solid understanding of network threats, and the primary threat is an unwanted user. Network administrators must adopt policies and procedures that define rules for network access. These rules determine who is allowed to use the network and to what extent. Network rules and protocols should be documented clearly and they should consider every eventuality. These rules and protocols need to be based on what is available on a computer network

What is a bus topology (linear bus)

Network topology where each of a network's nodes is connected to a common linear backbone that has two endpoints. Data are transmitted between the two endpoints and the nodes are connected to the backbone. One advantage of a bus topology is that all nodes can receive data virtually simultaneously. A disadvantage is that if the backbone is down, all nodes on the backbone are down as well.

What are network?

Networks include devices such as routers, switches, and communication links that allow the computer systems to communicate with each other no matter the distance or location. Networks are sometimes known as the "backbone" of the IT infrastructure. Without communicating and sharing information, each computer would be a stand-alone device and not able to send or receive data.

Disk Storage

Nonvolatile, secondary storage on a physical device like a hard drive or optical disk with a read/write apparatus.

A data analyst is using the ETL process to enter data into the company's relational database. The data contain many redundancies. Which process will the data analyst need to use before loading the extracted data into the database?

Normalization

The data are full of redundancies, which the data analyst needs to remove. Which process can the data analyst use to remove the redundancies? Normalization Data governance Extraction Schema design

Normalization is the process of removing redundancies in data.

Normalization

Normalization of the database reduces redundancy and improves data integrity, helping to ensure queries are effective. Normalization using the primary key sets the first unique identifier for the records. The foreign key then provides the relationship across separate tables within a relational database.

Freedom Rock Bicycles found that it has multiple records due to multiple sales to the same individual. This has caused access problems when looking for specific customers. What can Freedom Rock Bicycles do to alleviate this problem?

Normalize the database (reduce redundancy)

Freedom Rock Bicycles found that it has multiple records due to multiple sales to the same individual. This has caused access problems when looking for specific customers. What can Freedom Rock Bicycles do to alleviate this problem? Load the data Scrub the database Normalize the database Extract the data

Normalize the database. Normalization will reduce redundancy in the database.

Presentation of information

Oftentimes, management do not know what format they need the data to be in or how they want the data presented, but they know something about what they need

Peer-to-peer

Oliver wants to share some company files with his colleague Alice, so they connect their computers using a USB cable to securely transfer the files between their computers. Which term is used to describe this methodology of file sharing?

Adhoc Reports

On Demand Reports

Managing the IT group and designing the IT architecture

On a day-to-day basis, what is the major focus and responsibility of a chief technology officer?

Load

Once data are transformed and normalized, they are ready to finally be transferred into the data warehouse or datamart. The more often this is done, the more up-to-date analytic reports can be.

Load (ETL)

Once data are transformed and normalized, they are ready to finally be transferred into the data warehouse or datamart. The more often this is done, the more up-to-date analytic reports can be. A data mart is a smaller and more targeted version of a data warehouse.

Extract

Once you have determined where your data reside, you can start extracting. The data are often extracted from customer relationship management (CRM) or enterprise resource planning (ERP) systems. One of ERP's main functions is to centralize an organization's data so that they end up being a wealth of data with value across the organization.

Transform

Once you have extracted data, they need to become normalized. Normalizing data means that your data are typically organized into the fields and records of a relational database. Normalization also reduces redundancy in storing data, which saves space and helps ensure that data are consistent.

Trademark

One of Eva's realtors, Alice, creates a web page of her own and places pictures of the houses she has for sale on the page. Alice took the pictures herself; however, she copies the logo from a local hospital and places it on her website to show how close some of the houses are to medical facilities. Which type of law did Alice violate?

online application software

One of the newer online collaboration systems.For instance, two or more users can access the same spreadsheet, word processor, or presentation software and share its data and information

Freedom Rock Bicycles has installed a new database to keep track of sales by region, salesperson, product, and sales prices, among other items, to keep information on business processes. After installation, Freedom Rock Bicycles discovered additional benefits of the information accumulated in the database and how the information can improve the business profitability and future plans. Freedom Rock Bicycles found that daily reports could be run using SQL to indicate product and parts inventory and sales for the day. Which approach can be used to retrieve this information efficiently?

Online analytical processing (OLAP)

Freedom Rock Bicycles found that daily reports could be run using SQL to indicate product and parts inventory and sales for the day. Which approach can be used to retrieve information efficiently? Online analytical processing (OLAP) Data analytics Data mining Business intelligence (BI)

Online analytical processing (OLAP). OLAP is basic processing to determine counts of information from the database.

Hadoop

Open-source software framework that enables distributed parallel processing of huge amounts of data across many inexpensive computers.

Memory Management

Operating systems coordinate a computer's memory, which includes cache, random access memory (RAM), registers, and virtual memory. Simply put, memory holds data and information in an assortment of ways. Types of memory include random access memory (RAM), known as primary storage. RAM is a type of memory that allows data to be accessed in any order without physical movement of the silicone media

IOT and Manufacturing Tesla facility is full of IOT devices, generates its own electricity

Optimizes line productivity, self reports issues, predicts maintenance and repair IOT and Transportation#^#Every plane is now an IoT device, transmitting all kinds of data to operations control centers, including each plane's performance and needs, passengers and their luggage, airport gate availability, weather conditions, and more.

The Edge

Outside data center, but connected to internet

Which file format is suitable to use when sharing a legal contract that requires a digital signature?

PDF

Which file format is suitable to use when sharing a legal contract that requires a digital signature? --DOCX --PDF --HTML --XML

PDF

Cell phones, IoT devices, and GPS have been major technological changes in the IT infrastructure. What is the term used to describe an important change that happens when the usual way of thinking about or doing something is replaced by a completely new and different way?

Paradigm Shift

What is the main financial benefit of using cloud web services?

Pay for specific services as needed

What is the main financial benefit of using cloud web services? Reduce the number of IT staff Pay for software and hardware separately Pay for specific services as needed Reduce the number of IT products used

Pay for specific services as needed

Peer to Peer Network

Peer to Peer network connects computers together without a server

Oliver wants to share some company files with his colleague Alice, so they connect their computers using a USB cable to securely transfer the files between their computers. Which term is used to describe this methodology of file sharing?

Peer-to-Peer

Peer-to-Peer Networks (P2P)

Peer-to-peer networks (P2P) are computer networks that generally connect computers directly to one another without the use of a server. Unlike the networks described above, P2P does not include the concept of clients and servers, rather, it is a group of clients that act as their own individual servers and share their resources.

People

People are key to an IT infrastructure. Not just the IT gurus who know how to install, manage, and fix IT hardware and software, but also those who use the systems to perform their daily functions.

What is Keylogging?

Perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard. The computer criminal waits for a legitimate user to sign in, and then the keylogging software records the login ID, password, and any other sensitive information.

Dumb Terminal

Personal computer that doesn't contain a hard drive -- Allows user only limited functions, including: -- Access to software, the network, and/or the Internet

An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent?

Phishing

An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password. What type of fraud does this email represent? --Click fraud --Spyware --Keylogging --Phishing

Phishing usually involves attempts to deceptively gain private information, like usernames and passwords, typically in a legitimate-looking email.

Network Administrator

Policies must be enacted and enforced to protect corporate assets. These policies include strong passwords, safe web browsing protocols, firewall implementations, and malware protection. Who is the IT professional responsible for enacting these policies?

Network Administrator

Policies must be enacted and enforced to protect corporate assets. These policies include strong passwords, safe web browsing protocols, firewall implementations, and malware protection. Who is the IT professional responsible for enacting these policies?

PDF

Portable Document Format, File format suitable when signature required

A company uses data on its past call volumes to determine call center staffing. Which type of reporting should the company utilize?

Predictive Reporting

Which type of reporting will provide Jack and William with the right information for making strategic decisions? --Transaction reporting --Executive reporting --Management reporting --Predictive reporting

Predictive analytics and forecasting reports reveal trends in a business to aid in decision-making.

Predictive analytics

Predictive analytics attempts to reveal future patterns in a marketplace, essentially trying to predict the future by looking for data correlations between one thing and any other things that pertain to it.

A company uses data on its past call volumes to determine call center staffing. Which type of reporting should the company utilize? --Strategic reporting --Financial reporting --Predictive reporting --Executive reporting

Predictive reporting. Analysis and predictive reporting systems use data accumulated over a company's history to predict and forecast future needs and opportunities.

Web Developer

Prepare, plan, and implement web based software applications.

Production Department

Prepares goods and services to be sold in the most efficient and cost-effective way. How it is affected by IT --Spreadsheet, design, and collaboration software

Research and Development

Presents a creative and systematic approach to evolve a business's original idea and devise new ones. How it is affected by IT --Collaboration and design software

Primary key

Primary key: A field in a database table that uniquely identifies a record in the table. For example, every student at a university has a unique student ID number. That would be the primary key in the student table.

Tableau

Produces interactive data visualization products focused on business intelligence. Much like spreadsheets, Tableau helps with simplifying raw data into different formats that can be understood using graphs, charts, and numerical analysis.

Which category do Google Docs and Dropbox fall within?

Productivity apps - They enhance productivity by providing services that businesses can use.

Which category do Google Docs and Dropbox fall within? --Productivity apps --Utility apps (tools such as calendars and calculators) --Social networking apps --Lifestyle apps

Productivity apps. They enhance productivity by providing services that businesses can use.

Which category of software is Microsoft Office? --Database software --Productivity software --System software --Network software

Productivity software. Generally includes spreadsheets, word processors, databases, and presentation software. Microsoft Office is an example of productivity software.

William and Jack believe that their large selection of rare parts and motorcycles should be the main focus of messaging to customers. Which of the four Ps of marketing should they focus on when they analyze customer needs and customer support? --Products --Pricing --Promotion --Placement

Products - Products refer to the actual goods that relate to customer requirements.

Malware

Programs specifically intended to penetrate or damage a computer system without the end user's knowledge.

Which type of software is designed to easily generate Gantt charts?

Project management software

A design business has employees based in different parts of the country, with all employees working remotely from home. This allows the business to attract the best expertise, which is a great benefit to the business. One problem, however, is that employees are often waiting for other employees to complete certain tasks before they can complete their own. This lack of coordination causes significant delays in projects. Which type of software is designed specifically to address the coordination problem in the scenario?

Project management software (Project management software will let you set milestones to increase workflow.)

Which type of software is designed to easily generate Gantt charts? --Spreadsheet software --Database management software --Project management software --Graphing software

Project management software. Gantt charts are key features of project management software.

Hypertext Transfer Protocol (HTTP)

Protocol used to define how messages are formatted and transmitted on the internet.

Cloud Service Providers

Provide file storage & cloud-based software that enhances productivity

Cloud Database

Provided by a third party that: Manages data Provides access

IT Department

Provides services and support to other departments

Ethernet Card

Provides the computer with a unique 48-bit address called a MAC (media access control) address. No two Ethernet cards have the same address.

Purchase Scams

Purchase scams are the most uncomplicated type of internet fraud. Purchase scams involve buyers (typically in another country) who approach merchants via spam and ask whether they can pay for shipping with a credit card

Veracity

Quality or "trustworthiness" of the data.

A hospital has installed a system that constantly provides the inventory status of emergency supplies. Tags added to each product contain the product information needed for inventory control and identification, and these tags can be read with a scanner. Which technology did the hospital implement to perform this service?

RFID

A hospital has installed a system that constantly provides the inventory status of emergency supplies. Tags added to each product contain the product information needed for inventory control and identification, and these tags can be read with a scanner. Which technology did the hospital implement to perform this service? --Bluetooth --HTTP --RFID --XX Internet of Things (Each product is not connected to the internet as would be required by IoT devices. Rather, a scanner is required to read the product information contained in the tags.)

RFID transmits product identification over radio waves for inventory.

What is "C2:F2" called in the formula =SUM(C2:F2)?

Range

Function Arguments

Range, Criteria, Sum_range, and Average Range.

A company has experienced significant growth in just a few months. The company expects to continue this rate of growth in the coming year. Which cloud computing feature would most benefit this business in the short term as it manages its growth?

Rapid system scalability

A company has experienced significant growth in just a few months. The company expects to continue this rate of growth in the coming year. Which cloud computing feature would most benefit this business in the short term as it manages its growth? --Enhanced system functionality --Expanded system throughput --Improved system stability --Rapid system scalability

Rapid system scalability. Cloud-based IT solutions adapt to the size requirements of a business. Physical (in-house) IT systems can be adapted but not as quickly or as easily as in the cloud.

Extract

Reading data from database; Data collected from various sources; Extracted and copied to data warehouse

What is the approach that a business would use to facilitate communication when the business has employees that are in different locations and telecommute for work?

Real-time communication

What is the approach that a business would use to facilitate communication when the business has employees that are in different locations and telecommute for work? Face-to-face communication Offline communication Peer-to-peer communication Real-time communication

Real-time communication

What did the Sarbanes-Oxley Act of 2002 require of IT departments in American companies?

Record and preserve accounting records

What did the Sarbanes-Oxley Act of 2002 require of IT departments in American companies? Ensure medical patients have access to their health data Record and preserve accounting records Allow employees to miss work for medical reasons Protect students' educational data privacy

Record and preserve accounting records. The Sarbanes-Oxley oversees standard accounting practices and preservation of accounting data.

Search Engine Marketing

Refers to the use of paid advertisements and organic search results that appear on a search engine results page.

Pricing of Marketing

Refers to what a product costs or at least what a business is willing to exchange for their products.

What is the process of normalization of a database?

Removing redundancies within the database

What is the process of normalization of a database? Using "load" to place data in the data warehouse Creating the schema of the database Removing redundancies within the database Improving database performance

Removing redundant data improves the accuracy of the data and saves space.

Three Aspects of Reporting

Reporting summarization levels Analysis & predictive reporting Management level reporting

Trend Reporting

Reports can begin to reveal trends or tendencies in a business

unique identifiers (UIDs)

Required so that each device can be addressed individually, and the controlling system knows which device is transmitting the data for analysis.

Which core business department is primarily responsible for business intelligence?

Research and development

Which core business department is primarily responsible for business intelligence? --Sales and marketing --Research and development --Production --Human resources

Research and development. R&D gathers information on competitors and creation and sales of their own products.

Structured Data

Resides in a fixed format. It is typically well labeled and often with traditional fields and records of common data tables.

Accountability

Responsible and accountable for the data/information

Systems Administrator

Responsible for setting up larger computer assets like network servers and maintaining them for smooth, error-free operation.

Computer System Administrator

Responsible for setting up larger computer assets like network servers and their maintenance

Network Administrator

Responsible for smooth network operations, network performance & implementation of new nodes & networks.

Data Management Metric

Return on Investment

When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost. What is this metric called?

Return on investment

When a company spends money on data management, it uses a metric to measure the benefit of this spending relative to the cost. What is this metric called? Profitability ratio Profit and loss Cost benefit analysis Return on investment

Return on investment

System Development Life Cycle (SDLC)

SDLC is a process for creating and altering computer applications through a step-by-step approach that includes planning, system analysis, design, implementation, and system maintenance.

Structured Query Language (SQL)

SQL is the most widely used standard computer language for relational databases, as it allows a programmer to manipulate and query data.

An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law. Which law should the IT manager become familiar with? --Freedom of Information Act --Santini-Burton Act --Sarbanes-Oxley Act --Fair Labor Standards Act

Sarbanes-Oxley Act

An IT manager for a large organization is working on setting up a system to digitally retain all accounting records and wants to ensure that the system's accounting record retention policies are set in accordance with federal law. Which law should the IT manager become familiar with?

Sarbanes-Oxley Act

Which strategy can be used to help a company's web page appear on the first page of search results in a browser?

Search engine advertisig

Which strategy includes purchasing paid advertisements that appear at the top of results pages in a web browser?

Search engine marketing

Which strategy includes purchasing paid advertisements that appear at the top of results pages in a web browser? --Landing page strategy --Search engine marketing --Content marketing --Search engine optimization

Search engine marketing

Search engine marketing

Search engine marketing refers to the use of paid advertisements and organic search results that appear on a search engine results page. Anyone who has done a search on the internet has seen search engine results pages (SERPs). These pages have marketing advertisements within the results pages that have been paid for by businesses so that their products will be displayed at the top of the search page based on the search criteria; organic search results are below the paid advertisements.

What are the 3 Requirements for IoT?

Secure Wi-Fi Connection Separate IP address for each device On/Off switch for each device

User level security starts with logon IDs and passwords but can go much further in verification to restrict the user from visiting unauthorized websites or downloads from untrusted sources.

Securing the browser, requiring a strong password, and installing malware protection is what kind of security?

Cut and Paste

Selecting static data from one application; Copying it to another application; Required use of temporary memory

Semi-structured data (1 of 3 data types)

Semi-structured data lands somewhere in-between structured and unstructured data. It can possibly be converted into structured data, but not without a lot of work.

A design business has employees based in different parts of the country, with all employees working remotely from home. This allows the business to attract the best expertise, which is a great benefit to the business. One problem, however, is that employees are often waiting for other employees to complete certain tasks before they can complete their own. This lack of coordination causes significant delays in projects. While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers?

Server

Jack meets with the university dean to discuss his 18-year-old son's progress. Jack's son is a freshman at the university. Jack wants to know if his son is performing well in his classes. The dean has access to the computer systems containing the academic records for Jack's son but is also aware of constraints set by the Family Educational Rights and Privacy Act (FERPA). What should the dean do?

Share the records only after receiving authorization from Jack's son.

Variance Report

Shows the difference between the Actuals and Previous periods

Validity Checks

Shows whether or not data entered meets the requirements set forth by a company

What is object linking?

Similar to object embedding but differs in one very important way: object linking is dynamic. When the source file is linked into the destination file, both files stay up to date. Unlike object embedding, which simply takes a picture, object linking is a dynamic link where both files are current and editable.

copyright.

Since an app is an original created work that is a written program, much like a book, it is protected by ______________

Tracking Cookies

Small files that track user's actions and information

Switch

Small hardware device that joins multiple computers together w/in one LAN.

Faster internet speeds

Smart homes with voice controlled light switches, app-connected video doorbells, and internet-enabled appliances are changing the nature of Eva's work selling real estate. Which improvement in IT infrastructure has enabled these real-time devices to function properly?

What is the term used to describe technologies that enable, facilitate, and enhance people's ability to share digital content?

Social media

What is the term used to describe technologies that enable, facilitate, and enhance people's ability to share digital content? Social media (sharing) Social networking (making connections to people digitally) Mobile apps Mobile technology

Social media allows for sharing independent of time or location.

Social Media Advertisements

Social media, advertising ROI calculations have become much easier and a lot more precise.

Although there are a number of social media platforms, they can be categorized into seven distinct types.

Social networking Bookmarking sites Social news Media sharing Microblogging Forums and blogs Social reviews

Social news:

Social news sites allow a user to post links and other information regarding any topic, usually controlled by a forum. The items are displayed in order of most accessed or read, so the more popular items appear first in the list. Examples of social news sites are Reddit, Digg, Propeller, and Mixx.

Software

Software is a set of computer instructions that tell the computer how to work and actually perform computer tasks. There are three categories of software: application, system, and utility.

Network Operating System (NOS)

Software that controls an entire network.

Application Software

Software that is designed for the user to carry out a specific task.

System Software

Software that runs in the background and requires very little or no user intervention.

How will the maintenance of employee workstations be simplified by creating an office network?

Software updates for client computers can be done at once from the server.

When was the internet born?

Sometime around 1969, the internet was born. However, the internet did not really catch on until the early 90s when Hypertext Markup Language (HTML), Hypertext Transfer Protocol (HTTP), and web browsers became available to people and businesses alike.

Spamming

Spam or junk email is the abuse of an email system to arbitrarily send millions of unsolicited bulk messages. These email messages range from advertising and chain letters to criminal schemes.

A copyright on each algorithm Computer program code is copyrightable.

Sparkit has developed a number of unique algorithms to support its specialized programming projects. What does Sparkit need to apply for in order to best protect its rights to its code?

Copyright on each algorithm - Computer program code is copyrightable.

Sparkit has developed a number of unique algorithms to support its specialized programming projects. What does Sparkit need to apply for in order to best protect its rights to its code?

Firewall

Specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet.

Business computing software 4 basic applications

Spreadsheets, Word processors, Databases, Presentation software

What is spyware?

Spyware is a program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent. Monitors a user's keystrokes and behavior, but can also install new software that can include more spyware or programming to divert a computer to third party advertising websites.

A business consultant has been brought on board to investigate an organization's efficiency problems. After much examination, the consultant reports that departments within the business are using different software packages that are incompatible with each other. This is especially problematic when it comes to sharing data and information. The consultant recommends using the same software in all departments of the business. However, many managers are hesitant to employ this idea of using the same software across the organization. They claim it would be time-consuming to train employees on new software. In the scenario above, how should the IT department resolve the incompatibility issue?

Standardize software throughout the organization.

In the scenario above, how should the IT department resolve the incompatibility issue?

Standardize software throughout the organization.

In the scenario above, how should the IT department resolve the incompatibility issue? Hold a training on how to use each software product to remove incompatibility. Increase help desk support for various software packages. Implement a process that translates data from one software to another. Standardize software throughout the organization.

Standardize software throughout the organization.

What is a Star topology?

Star topologies are the most common of all topologies. A star topology includes nodes that radiate around a central node in a spoke-like fashion. The center of the star is the hub that attaches to the nodes with spokes. If the central hub fails, every node attached to the hub will also fail.

Moore's Law

States that computing power doubles every 18 months.

The following are examples of function-specific software:

Stock market management software to manage your portfolio Supply chain management software Communications and collaboration software, such as MS Teams Group teaching software, such as AdobeConnect Mathematical software, such as MathLab Desktop publishing Webinar software Robotic control software

Business Intelligence (BI)

Strategies and technologies used by enterprises for the data analysis of business information.

Which function of a customer relationship management system helps a company identify opportunities to increase its business?

Strategy

Which function of a customer relationship management system helps a company identify opportunities to increase its business? --Process --Data collection (X result of using a CRM. It may be used to increase business by employing business intelligence or analytics, but the data collection itself does not increase business) --Technology --Strategy

Strategy. A CRM's strategy function helps a company understand customers' concerns and desires and respond in ways that encourage more and better customer activity.

Jack and William want to hire a person to write code to access their database in order to build management reports. Which skill should a successful applicant possess?

Structured Query Language (SQL)

What is the standard programming language that is used to extract and update data in most relational databases?

Structured Query Language (SQL)

What is the standard programming language that is used to extract and update data in most relational databases? Structured Query Language (SQL) JavaScript Python Hypertext markup language (HTML)

Structured Query Language (SQL)

Jack and William want to hire a person to write code to access their database in order to build management reports. Which skill should a successful applicant possess?

Structured Query Language (SQL) (Structured Query Language (SQL) is the primary language used to write database queries that can retrieve data for reports.)

Structured Query Language (SQL)

Structured Query Language (SQL) is the most widely used standard computer language for relational databases, as it allows a programmer to manipulate and query data. SQL is perfect for answering a question such as, "What is the number of customers that live in Utah, Arizona, and Texas?" SQL creates infinite sets of data output for reporting, analysis, and, most importantly, helping with tactical and strategic decisions.

Jack and William want to hire a person to write code to access their database in order to build management reports. Which skill should a successful applicant possess? Search engine optimization (SEO) Data administration Structured Query Language (SQL) Data analytics

Structured Query Language (SQL) is the primary language used to write database queries that can retrieve data for reports.

Structured data (1 of 3 data types)

Structured data resides in fixed formats. This data is typically well labeled and often with traditional fields and records of common data tables. Structured data does not necessarily have to be "table-like," but needs to at least be in a standard format and have recognizable patterns that allow it to be more easily queried and searched.

Summary statistics

Summary statistics are descriptive figures that help individuals understand what the data shows. They are used to present quantitative descriptions in a manageable form. They take a lot of data and condense it into a simpler summary.

Which level of management gets the most detailed reports directly from the transaction processing system?

Supervisors

Which level of management gets the most detailed reports directly from the transaction processing system? --Managers --Laborers --Supervisors --Executive

Supervisors

Supervisors

Supervisors are first level of management in a business; Gets most detailed reports directly from TPS

IoT devices that track inventories no matter where they are built, shipped, or kept are found primarily in which business unit?

Supply chain

IoT devices that track inventories no matter where they are built, shipped, or kept are found primarily in which business unit? Supply chain Operations Marketing Manufacturing

Supply chain

The data warehouse is very costly and time-consuming to manage, and the data analyst notices that the data warehouse only used 20 percent of its capacity during discovery. How can the company reduce the cost and time associated with managing the data warehouse?

Switch to a data mart

The data warehouse is very costly and time-consuming to manage, and the data analyst notices that the data warehouse only used 20 percent of its capacity during discovery. How can the company reduce the cost and time associated with managing the data warehouse? Use a relational database (DBMS) Process the data with Tableau Configure the data warehouse with SQL Switch to a data mart

Switch to a data mart. A data mart is a smaller and more targeted version of a data warehouse.

What are switches, routers, and hubs?

Switches, routers, and hubs are devices that act like a traffic cop in a network. Routers forward information throughout a network, switches filter the information to the correct part of a network, and hubs are a common point of connection on a network.

Trademark

Symbol or words legally registered or established by use as representing a company or product

What are the two basic categories of software?

System and Application

System level security

System level security: protecting the hardware that the database resides on and other communications equipment from malicious software that tries to enter the system. Firewalls and other network security systems prevent unauthorized intrusion into the system.

What is System software?

System software, like the Microsoft Windows operating system, is software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

Which level of security is required to protect the hardware and communications equipment that support a database?

System-level security

Which level of security is required to protect the hardware and communications equipment that support a database? --System-level security --User-level security --Data-level security --Data-center security

System-level security. Network security and unauthorized access are system-level security.

A business analyst wants to use the social media data to create and present business intelligence. She will create visualizations that will be used by the executive team. Which tool is appropriate for creating and presenting this business intelligence?

Tableau

A business analyst wants to use the social media data to create and present business intelligence. She will create visualizations that will be used by the executive team. Which tool is appropriate for creating and presenting this business intelligence? --Hadoop --Tableau --Data mart --Data mining

Tableau

Tableau

Tableau is a tool that produces interactive data visualization products focused on business intelligence. Tableau helps with simplifying raw data into different formats that can be understood using graphs, charts, and numerical analysis.

A transaction processing system (TPS) enables the entry and recording of sale-related data such as item purchased, price, and date and time of sale.

Tactical decisions

A transaction processing system (TPS) enables the entry and recording of sale-related data such as item purchased, price, and date and time of sale. Which kind of decisions does management use these data for? Executive decisions Tactical decisions Strategic decisions (remember these are made using decision support systems) Predictive decisions

Tactical decisions. Detailed operational data created from the sale of individual items are used to make operational and short-term decisions.

A company creates a new product in response to demand from a small but diverse group of customers with a specific shared interest. What is the most important reason to advertise this product on social media?

Targeted Advertising

Describe 3 elements CRM associates to a business.

Technology: Captures all info. Strategy: Uses CRM to increase business. Process: Used to manage customer relationships.

Telecommunication Services

Telecom Services are provided by internet providers, mobile services, phone services, and much more.

A data analyst wants to search through unstructured data from social media posts to look for useful customer behavior patterns and sentiments. Which type of analytics is appropriate for this task?

Text analytics

A data analyst wants to search though unstructured data from social media posts to look for useful customer behavior patterns and sentiments. Which type of analytics are appropriate for this task? --Predictive analytics --Topic analytics --Text analytics --Decision analytics

Text analytics search through unstructured text data to look for useful patterns.

Text analytics

Text analytics, sometimes called text-mining, hunts through unstructured text data to look for useful patterns such as whether their customers on Facebook or Instagram are unsatisfied with the organization's products or services.

A manager has a data set that contains the profits of 556 stores in the United States. In the data set, along with each store location, there is a column that specifies the regions of the United States that each location belongs to: East, South, Midwest, Mountain, and Pacific. Which function should the manager use to find the average profits of stores in each region? --IF --MAX --AVERAGE --AVERAGEIF

The AVERAGEIF function computes the average of the numbers in a range that meet the supplied criteria.

The Bluetooth network

The Bluetooth network is built into mobile phones so they can communicate with other devices within approximately 30 feet. The concept of Bluetooth is that the network communicates by sending and receiving radio waves communicating with the Bluetooth adapter in the device. This allows any device with a Bluetooth adapter built-in, such as speakers, a car radio, a headset with earphones and a microphone, and even camera and photo devices, to transmit to a phone, tablet, or PC without removing a memory card.

30

The Bluetooth network is built into mobile phones so they can communicate with other devices within approximately how many feet?

Chief Information Security Officer (CISO)

The CISO is generally focused on the security of an organization's data and information, making sure it is backed up, deciding who gets to see it and who does not, and so on.

What hardware component performs most of the calculations for a computer?

The CPU is the "brain" of the computer and performs most of the calculations for a computer

Chief Technology Officers (CTO)

The CTO runs the organization's IT engineering group and serves as the company's top technology architect.

Which IT professional runs the organization's IT engineering group and serves as the company's top technology architect? --Chief technology officer (CTO) --Chief information officer (CIO) --IT project manager --Chief information security officer

The CTO runs the organization's IT engineering group and serves as the company's top technology architect.

IoT devices observe and gather data but have limited intelligence for analysis. With respect to the design of an IoT network, where are the IoT devices located?

The Edge

What makes IT unique compared to other departments in businesses?

The IT department provides services and support to the other departments.

What makes IT unique compared to other departments in businesses? The IT department is funded through the budgets of the other departments. The IT department provides services and support to the other departments. The IT department is given monitoring authority over other departments. The IT department reports directly to the managers of other departments.

The IT department provides services and support to the other departments.

Knowledge management systems (KMS)

The KMS serves as a repository that organizes every idea ever posted into searchable categories, making them easy to access company wide.

What is a Network interface controller (NIC) card?

The NIC is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers. The most common NIC is called an Ethernet card.

Spam

The abuse of an email system to arbitrarily send millions of unsolicited bulk messages.

Product of Marketing

The actual goods and services a business produces and how they relate to customers' needs, including warranties, guarantees, and customer support.

Promotion of Marketing

The advertisement of products and services, as well as publicity.

Wi-Fi signal

The airport installs sensors along the runways, and the sensors provide air traffic controllers with real-time information about the location of every plane on the ground. Which technology allows these sensors to transmit data to the air traffic controllers' server?

Data Analysis

The application of statistics and logic techniques to define, illustrate, and evaluate data.

What are Processes?

The applications that a business uses in its daily operations. These are the functions that end users work with on a daily basis. eg) the DMV has a process where it issues and updates drivers' licenses, a bank has a process whereby it accepts deposits and makes withdrawals of customer finances, WGU has a process that facilitates student study methods by providing online texts. Each of these processes is supported by software that facilitates that particular function.

Descriptive analytics

The baseline that other types of analytics are built upon. Descriptive analytics defines past data you already have that can be grouped into significant pieces, like a department's sales results, and also start to reveal trends. This is categorizing the information.

Central Processing Unit

The brains of the computer; Place where most computations take place

Firewall

The business in the scenario frequently works with sensitive data, and it is important to ensure that the network is highly secure. Which network component is specifically designed to prevent unauthorized users from accessing the network?

Intranet

The business's private web-based network

[Sum_range]

The cells to add together. This is optional, and if omitted, the cells in the range argument are added together.

[Average_range]

The cells to average. This is optional, and if omitted, the cells in the range argument are averaged together.

The cellular network

The cellular network is usually the network over which phone calls are made. This connection is between the cell phone and the towers that support the antennas for the chosen cellular network. The "bars" shown on your phone indicate the strength of the cellular network for making and receiving calls.

Which part of a computer executes the computations required by the software? --The central processing unit --The operating system --The motherboard --The random-access memory

The central processing unit

What is the major issue that hinders the effective use of decision support systems (DSS)?

The collection of too much data

Column_index

The column number from which to retrieve data.

DropBox

The company hopes to use cloud-based storage to allow employees to share all their work-related files. What is a common cloud-based storage solution for the company?

CIO CIOs typically have the most responsibility within an organization

The company's board of directors has expressed concerns about a software compatibility issue. Who is responsible for explaining and advocating for the new plan to the company's board of directors?

CIO - CIOs typically have the most responsibility within an organization

The company's board of directors has expressed concerns about a software compatibility issue. Who is responsible for explaining and advocating for the new plan to the company's board of directors?

CIO

The company's board of directors has expressed concerns about the software compatibility issue. Who is responsible for explaining and advocating for the new plan to the company's board of directors?

Which part of a computer executes the computations required by the software?

The computer processing unit

Systems Analyst

The conduit between IT and the rest of the organization.

Cybersecurity

The convergence of technologies, sound practice, and processes designed to protect networks and their devices, programs, and data from attack or unauthorized access.

Criteria

The criteria used to determine which cells to include in a calculation.

Foreign key

The data analyst at Freedom Rock Bicycles wants to link two tables in the database. What is the name of the field in a database table that is used to connect or link two tables together?

Normalization

The data are full of redundancies, which the data analyst needs to remove. Which process can the data analyst use to remove the redundancies?

When using extract, transform, and load (ETL), what is done during the "transform" step?

The data are normalized and structured.

When using extract, transform, and load (ETL), what is done during the "transform" step? The data are normalized and structured. The data are given context and relevance. The database is queried for relevant data. The database schema is designed and created.

The data are normalized and structured.

Switch to a data mart

The data warehouse is very costly and time-consuming to manage, and the data analyst notices that the data warehouse only used 20 percent of its capacity during discovery. How can the company reduce the cost and time associated with managing the data warehouse?

Which technology is a critical component of customer relationship management (CRM) systems? --The schema --Sales tracking --Data analysis software --The database

The database. The information about customers contained in the database is the most valuable.

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario?

The door lock

A homeowner arrives at home in the evening. A timer has turned on an exterior light before her arrival, and the surveillance camera records her walking to the door. She unlocks the door using a mobile app, and a motion sensor turns on an interior light when she enters the house. What is an example of Internet of Things (IoT) technology in this scenario? --The exterior light --The camera --The door lock --The interior light

The door lock

Where does IoT data collection begin?

The edge

Where does IoT data collection begin? --The edge --The internet --The cloud --The database

The edge

IoT devices observe and gather data but have limited intelligence for analysis. With respect to the design of an IoT network, where are the IoT devices located? The data center The cloud (software and services that run on the internet) The network hub The edge

The edge is outside the data center and is connected to the internet.

Data Mining

The examination of huge sets of data to find patterns and connections and identify outliers and hidden relationships.

Random-access memory (RAM)

The fast, chip-based volatile storage in a computing device.

App Usage & VIP Levels

The goal of the app developer is to create a superior app so that the user will want to pay for the upgraded version. Many mobile app games are renowned for their in-app purchase monetization strategies

An additional problem that the consultant identified was that unauthorized users could easily access data on the company's internal network. Which IT professional is responsible for addressing this issue? Database administrator Computer systems administrator Web developer Information security analyst

The information security analyst has the responsibility for assigning access and monitoring unauthorized access.

Internet

The internet is the world's largest network and connects thousands of other networks together including LANs, CANs, MANs, and WANs. The interconnection of public, private, commercial, industrial, and governmental networks is called the internet.

What is The Internet?

The internet is the world's largest network and connects thousands of other networks together including LANs, CANs, MANs, and WANs. The interconnection of public, private, commercial, industrial, and governmental networks is called the internet.

Microcomputers

The least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.

One of Eva's realtors, Alice, creates a web page of her own and places pictures of the houses she has for sale on the page. Alice took the pictures herself; however, she copies the logo from a local hospital and places it on her website to show how close some of the houses are to medical facilities. Which type of law did Alice violate? Copyright Patent Trademark Trade secret

The logo for the local hospital is a trademark, which cannot be used without permission.

Hypertext Markup Language (HTML)

The major markup language used to create web pages.

Topology

The mapping of a physical network and logical interconnections between nodes.

What is a Physical cable system?

The most commonly used network cable is an Ethernet cable. Ethernet network cables are specialized wires with adapters that plug into the NIC, and the most common type of cable wire is called a twisted pair. A twisted pair is a specialized wire that cancels out electromagnetic interference from other electronic devices and increases reliability.

What is the definition of the term "best practice"?

The most effective way of arriving at a desired outcome

Structured Query Language (SQL)

The most widely used standard computer language for relational databases, as it allows a programmer to manipulate and query data. One of the most common uses of SQL is to query tables.

In a report, the consultant noted that the company's network is in need of maintenance. Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software?

The network administrator

In the report, the consultant noted that the company's network is in need of maintenance. Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software?

The network administrator

Default-deny Firewall Rule

The only network connections that are permitted are the ones that have been explicitly allowed.

Schema

The organization or layout of a database that defines the tables, fields, keys, and integrity of the database. It is the reference or blueprint of the database.

Network Administrator

The person(s) responsible for smooth network operations, network performance, and implementation of new nodes or even new networks.

Hardware

The physical part of the computer.

Data Management (DM)

The practices, architectural techniques, and tools for achieving consistent access to and delivery of data across the spectrum of data subject areas and data structure types in the enterprise.

Data Management Processes

The process of acquiring data, making sure the data are valid, and then storing and processing the data into usable information for a business.

Validity Checks

The process of ensuring that a concept or construct is acceptable in the context of the process or system that it is to be used in.

Range

The range of cells that you want to apply the criteria against.

Ring Topology

The ring shape created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other.

Row_index

The row number from which to retrieve data.

What do all the applications in a productivity software suite have in common?

The same graphical user interface

What do all the applications in a productivity software suite have in common? The same data structure The same graphical user interface The same keyboard commands The same default file format

The same graphical user interface allows data to be easily exchanged across programs in the software suite.

While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers?

The server(it communicates with all clients and distributes software)

Velocity

The speed - How fast the data is needed.

Developmental Research

The stage of R&D where the findings of the research are utilized for the production of products, including the results of the simulations run using IT to develop material requirements and methodologies of production, prototype.

Development Research

The stage of R&D where the findings of the research are utilized for the production of products, including the results of the simulations run using IT to develop material requirements and methodologies of production. According to the NSF, development uses IT to create prototypes and production samples, and passes the production in quantity on to engineering.

Star Topology

The star shape created by network nodes that radiate around a central node in a spoke-like fashion.

Management Information Systems (MIS)

The study of people, technology, organizations, and the relationships among them.

Information Technology

The study, design, development, implementation, support, and management of computer-based information systems, particularly software and hardware.

Table

The table from which to retrieve data.

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS?

The transaction processing system (TPS)

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS? --The transaction processing system (TPS) --The cloud web hosting (CWH) system --The customer relationship management system (CRM) --The business intelligence (BI) system

The transaction processing system (TPS)

A large online retailer uses a decision support system (DSS) to develop scenarios for the executive team to evaluate. What is the primary source of the data used by this DSS?

The transaction processing system (TPS)

Infrastructure

The underlying foundation or basic framework for an organization or project.

Value

The value to look up.

Graphical User Interface (GUI)

The visual system of computer screen designs that allow a user to interact with an electronic device.

Microblogging

There are a number of different social media platforms that are categorized into distinct types. Which type of social media platform features short written entries posted for anyone who has subscribed to the account?

Install a sensor with a unique identifier (UID).

There are many airport vehicles at Charlotte's airport, and time and movement of planes and baggage are of primary importance. Because of this, IoT is used to track the location of baggage vehicles at the airport. When the airport purchases a new baggage vehicle, what must be done to connect it to the IoT system?

Business Computing Software

There are two basic categories of software: system software and application software. The main difference is that system software requires very little if any, user intervention

Which ethical dilemma is created by music-sharing websites?

They allow a user to bypass an artist's copyright.

Data Mapping

They are extra notes about the definition of a field, its data, and its use.

Advertising

They let users download the app for free, then the developers get paid by the advertisements that show up on their mobile app. This model can be successful; however, it requires a massive user base to generate significant revenue. Advertising within a mobile app is a popular strategy because only a small percentage of users will ever pay for an app

Data Level Security

This is where businesses implement processes to protect the actual data from getting stolen or tampered with in the database computers. One method of securing the information is database encryption (encrypting the data so that only authorized access can know how to unencrypt).

System Level Security

This means protecting the hardware that the database resides on and other communications equipment from malicious software that tries to enter the system. Firewalls and other network security systems prevent unauthorized intrusion into the system. Corporations fear a ransomware attack where their systems are invaded and ransom software is installed on their database systems so that it cannot be accessed unless a ransom is paid and a key is provided by the malicious person.

Gantt Chart

Time and activity bar chart ; Identifies and sequences project tasks

What is the purpose of a network switch?

To direct data to the intended target location.

What is the purpose of a network switch? To manage access to the network operating system. Incorrect. This is the job of a Network Administrator. To direct data to the intended target location. To convert data to a universal data type. To categorize unstructured data on the network.

To direct data to the intended target location. A network switch filters information to the correct part of a network.

What is the main purpose of a firewall?

To prevent unauthorized users from accessing the network.

What is the main purpose of a firewall? To stop malware from causing damage within the network. To prevent employees from sharing data outside the network. To prevent unauthorized users from accessing the network. To stop denial-of-service attacks from spreading to the network.

To prevent unauthorized users from accessing the network. Firewalls ensure that only authorized personnel can access and use an organization's intranet.

What is the purpose of a MAC address?

To uniquely identify a computer on a network

What is the purpose of a MAC address? To uniquely identify an internet URL To uniquely identify a computer on a network To uniquely identify a computer motherboard To uniquely identify an email client

To uniquely identify a computer on a network

Extract, Transform, and Load

Tools that are used to standardize data across systems and allow the data to be queried.

ETL (Extract, Transform, Load)

Tools that are used to standardize data across systems and allow the data to be queried. Querying is a tool that lets you ask your data questions that in turn lead to answers and assist in making decisions

Topic analytics

Topic analytics tries to catalog phrases of an organization's customer feedback into relevant topics. For example, if a customer said, "the barista was friendly," that would be categorized under the topic "Employee Friendliness."

What is Topology?

Topology is the mapping of a physical network and logical interconnections between nodes. It is the way a network is arranged and laid out. A node is any device that is connected as part of a computer network, including computers, hubs, printers, and switches.

Network Topology

Topology refers to the mapping of a physical network and logical interconnections between nodes. Simply stated, it is the way a network is arranged and laid out. A node can be defined as any device that is connected as part of a computer network, including computers, hubs, printers, and switches

Many websites keep track of a user's actions and information. They store much of this information on the user's computer in a private folder on the hard drive.

Tracking cookies

Many websites keep track of a user's actions and information. They store much of this information on the user's computer in a private folder on the hard drive. What are these very small files called? Tracking packages Tracking URLs Tracking data Tracking cookies

Tracking cookies

One of Eva's realtors, Alice, creates a web page of her own and places pictures of the houses she has for sale on the page. Alice took the pictures herself; however, she copies the logo from a local hospital and places it on her website to show how close some of the houses are to medical facilities. Which type of law did Alice violate?

Trademark (Eva)

Maria designs a website for her small business using a browser-based web development platform. She copies an image file of a large company's logo and places the words "Just Buy It" underneath the logo. She places the logo prominently on her website. Which intellectual property law does Maria's website violate?

Trademark(Maria)

A company makes personal computers and sells them directly to the public. At present, all business processes are completed manually by employees, lengthening the time from customer order to shipment. Which business process would deliver the most immediate customer satisfaction and reduced costs if automated?

Transaction processing

A company makes personal computers and sells them directly to the public. At present, all business processes are completed manually by employees, lengthening the time from customer order to shipment. Which business process would deliver the most immediate customer satisfaction and reduced costs if automated? --Customer relationships --Transaction processing --Production --Communications

Transaction processing. Using IT to replace manual transaction processing with automated processing would increase speed of delivery and immediately reduce costs.

Transform (ETL)

Transform: Once you have extracted data, they need to become normalized. Normalizing data means that your data are typically organized into the fields and records of a relational database. Normalization also reduces redundancy in storing data, which saves space and helps ensure that data are consistent.

Topic Analytics

Tries to catalog phrases of an organization's customer feedback into relevant topics.

True or False An operating system is sometimes called a platform.

True

True or false: A challenge of IT systems is that they can capture too much data.

True

True or false: Browser-based web development using tools such as visual web designers and drag-and-drop technology has reduced the need for professional web developers.

True

True or false: Business collaboration involves two or more people or departments working toward a common business goal, and it is facilitated by the exchange of data and information.

True

True

True or False An operating system is sometimes called a platform.

False

True or False Microsoft Project is classified as presentation software.

True

True or False On-demand cloud computing (ODC) platforms can be used to reduce data storage costs.

True

True or False: Structured Query Language (SQL) can be used to query data in nearly every type of database.

False

True or False: The Family Educational Rights and Privacy Act (FERPA) requires all public schools to house student records in a single national database.

False

True or False: Written posts extracted from a social media feed are generally classified as structured data.

True

True or false: A challenge of IT systems is that they can capture too much data.

True

True or false: Browser-based web development using tools such as visual web designers and drag-and-drop technology has reduced the need for professional web developers.

True

True or false: Business collaboration involves two or more people or departments working toward a common business goal, and it is facilitated by the exchange of data and information.

True

True or false: Reporting systems facilitate daily, operational decision-making and longer-term strategic planning in business.

False

True or false: Implementation of the IoT in the healthcare industry will increase the need for hospital staff to monitor and record data to be analyzed.

True

True or false: Reporting systems facilitate daily, operational decision-making and longer-term strategic planning in business.

True or false: Reporting systems facilitate daily, operational decision-making and longer-term strategic planning in business.

True. IT provides systems that can show data about a company's operations broken down by day, hour, or even second to show daily productivity. The same data can be rolled up to show weekly, monthly, or yearly trends that can help managers plan for the future.

True or False: Structured Query Language (SQL) can be used to query data in nearly every type of database.

True. SQL is the most common language used to query data in databases and can be used in most databases.

True or false: As the web has grown, the cost of writing, distributing, and selling a mobile application (app) has declined.

True. The expansion of the web has added more tools to help businesses develop and sell apps.

On-demand cloud computing (ODC) platforms can be used to reduce data storage costs. True or False?

True. With an ODC a company does not have to pay for more storage than it will use.

Veracity

Trustworthiness of the data, already "scrubbed" to make the data valuable.

What is a computer network?

Two or more computers connected to shared resources

Computer Network

Two or more computers connected together to communicate and share resources.

IOT and Government

U.S. government is also testing IoT technologies that will detect and report fraud in Medicare and food stamp programs, and others that monitor and report the status of government assets

Unified Modeling Language (UML)

UML includes a set of graphical notation techniques to create computer models and applications. It could be said that UML is a blueprint for developing applications. When a business wants to outsource a computer programming job, it will often use UML to describe the project.

Which IoT system process is used to reference each IoT device on a network?

Unique identifier

Lack of Skills

Universities are now offering bachelor's and master's programs in data analytics, which require students to have a foundation in statistics, data management, graphics, and management.

Unstructured Data

Unorganized data that cannot be easily read or processed by a computer because it is not stored in rows and columns like traditional data tables.

Unstructured Data

Unorganized data that cannot be easily read or processed by a computer because it is not stored in rows and columns like traditional structured data tables.

Unstructured data (1 of 3 data types)

Unstructured data is unorganized data that cannot be easily read or processed by a computer because it is not stored in rows and columns like traditional data tables. Imagine collecting massive numbers of Facebook messages and Instagram posts to determine future fashion trends. Organizations attempt to collect videos, documents, and all manner of fragmented data to eventually make sense of it. A whopping 80% of all data is unstructured!

Internet of Things (IoT).

Use of the internet to connect digital devices, widely used technologies, and control systems in order to more fully automate many aspects of life

William and Jack have a web page, but it does not receive many visitors. How can they make their web page more visible to those who may be looking for a motorcycle repair shop?

Use search engine optimization.(SEO is a marketing tool to provide increased visibility in searches.)

Hub

Used to connect various network segments & make them act as a single segment.

[value_if_false]

Used to specify the result of the IF function if the Boolean expression is FALSE.

[value_if_true]

Used to specify the result of the IF function if the Boolean expression result is TRUE.

What is the main reason marketing return on investment (ROI) is easier to measure with social media marketing than with traditional marketing?

User behavior can be tracked in social media.

What is the main reason marketing return on investment (ROI) is easier to measure with social media marketing than with traditional marketing? Social media surveys provide customer feedback. Social media users often submit product reviews. User behavior is highly predictable in social media. User behavior can be tracked in social media.

User behavior can be tracked in social media.

User Level Security

User level security starts with logon IDs and passwords but can go much further in verification to restrict the user from visiting unauthorized websites or downloads from untrusted sources. Network administrators, along with corporate policies, define who has access to what, and what type of access that can be (read, write, etc.).

What is utility software?

Utility software performs a particular function in the "background"; in other words, it requires little or no interaction with the user, but it is essential to the functioning of the computer. Examples of utility software include virus protection software and printer drivers.

Argument Function

Value, Table, Row_Index, Column_Index, [range_lookup]

Which attribute of big data relates to whether the data are structured or unstructured?

Variety

Gantt chart

Very similar to a road map to keep a project on time and on track, a schedule with all work activities, deadlines, and milestones, and completion dates.

Lucas owns a medium-sized computer programming firm named Sparkit with 12 computer programmers and computer analysts with offices in three cities. The firm's specialty is point-of-sale systems programming. Many times, the firm's customers have unique needs during an implementation, and collaboration among the programmers and analysts is key to the firm's success. Lucas, as a manager, understands the benefits of business information technology. However, he has not adequately implemented IT solutions to benefit Sparkit. Which type of application can Lucas implement to allow for real-time business collaboration?

Video Conferencing

Which type of application can Lucas implement to allow for real-time business collaboration?

Video conferencing Correct! This allows for an audience and presenter.

What are four general attributes that define big data?

Volume Variety Veracity (Trustworthiness) Velocity

Which network information is needed to connect an Internet of Things (IoT) device?

WI-FI connection information

Web developers

Web developers prepare, plan, and implement web-based software applications like shopping carts for online stores to advanced intranet deployment. Generally, a business will identify a legacy system and ask senior web developers to rewrite it completely to make it browser-based so that it can be deployed on the World Wide Web for global distribution. Senior web developer is one of the most sought-after and highly paid positions in the information technology field.

Databases

Well-thought-out collections of computer files, the most important of which are called tables.

Online analytical processing (OLAP) OLAP is basic processing to determine counts of information from the database.

What approach can be used to efficiently retrieve information about sales and inventory from a database?

Accounting Human Resource Marketing Research & Development Production

What are five business departments?

Volume Variety Veracity Velocity

What are four general attributes that define big data?

Reporting systems facilitate daily, operational decision-making and longer-term strategic planning in business.

What are reporting systems used for?

data housing and management, improved communications, customer relationship management, product development, and cost-effective processes.

What are the five main areas that information systems and technology can innovate a business?

The four main components of a network are network interface controller (NIC) cards, protocols like Transmission Control Protocol/Internet Protocol (TCP/IP), cables to connect clients to servers (sometimes wirelessly), and a central hub, often called a server.

What are the four main components of a network?

Too much data Too many options Unskilled team members Technical support

What are the main challenges for IT systems and technology?

When data are collected, they come in three forms (unstructured, structured, and semi-structured), but the most common form is unstructured.

What are the three forms data come in?

Reporting summarization levels Analysis & predictive reporting Management level reporting

What are the three main aspects of business reporting?

File, memory, and process management An operating system (OS), often called a platform, is a collection of computer programs that work together to manage hardware and software to ensure that they are working properly. The platform is the groundwork for all system software and performs jobs like allocating memory, administering input and output, and managing files.

What are the three major functions of a computer operating system?

System and application

What are the two basic categories of software?

Peer-to-peer File synchronization services

What are the two major types of file-sharing systems?

Peer-to-peer - File synchronization services

What are the two major types of file-sharing systems?

Record and preserve accounting records The Sarbanes-Oxley oversees standard accounting practices and preservation of accounting data.

What did the Sarbanes-Oxley Act of 2002 require of IT departments in American companies?

The same graphical user interface

What do all the applications in a productivity software suite have in common?

--business intelligence --data analytics --data management --capabilities

What does a DSS need for accurate decision making?

Network operating systems (NOS) handle network traffic and distribute allocated resources (like memory and application software) appropriately to client users.

What does a NOS do?

Network administrators are responsible for all aspects of network operations, including making sure the network runs smoothly and setting permissions for users.

What does a network administrator do?

CPU

What hardware component performs most of the calculations for a computer?

Range

What is "C2:F2" called in the formula =SUM(C2:F2)?

FERPA—Family Educational Rights and Privacy Act: A federal law that protects the rights of students' educational records. Information about grades, attendance, disciplinary records, report cards, transcripts, and so forth cannot be given to anyone not specifically listed on a FERPA form that is signed when a student enters a school.

What is FERPA?

HIPAA—Health Insurance Portability and Accountability Act: A federal law that provides data privacy and implements security provisions to safeguard an individual's medical information. A HIPAA form is signed each time you visit a new doctor so they can understand who they can share that information with.

What is HIPAA?

1) A technology that captures all the information listed above and puts it into a structure where reports can be run, analyses can be done, and information can be gleaned to support the business. 2) A strategy whereby a company uses the CRM to increase business by having the customers know the CRM is there and use it to their advantage. For example, how many clicks does it take to buy something from Amazon once you are a customer? CRM reduces the clicks, thereby reducing the time and increasing the convenience to purchase from them. 3) A process that a company uses to its advantage to manage relationships with customers.

What is a CRM to a business?

Decision support system (DSS) Decision support systems are used to conduct analytics and business intelligence activities to gain insights into business through data.

What is a DSS?

Two or more computers connected to shared resources

What is a computer network?

An app that is preinstalled on a mobile device

What is a native app?

A device shared by multiple end users in a network

What is a peripheral device in a network?

Intranet

What is a private computer network for sharing corporate information, collaboration tools, and computing services?

Real-time communication

What is the approach that a business would use to facilitate communication when the business has employees that are in different locations and telecommute for work?

=SUM(F3:F17)

What is the correct Excel function expression to calculate the total of all of the scores (column F) in cell C2?

It performs a specific task for the user.

What is the defining characteristic of application software?

It is tailored to a specific group or industry.

What is the defining characteristic of function-specific software?

It is tailored to a specific group or industry. Function-specific software is designed for a very specific purpose.

What is the defining characteristic of function-specific software?

The most effective way of arriving at a desired outcome

What is the definition of the term "best practice"?

Routers forward information throughout a network, switches filter the information to the correct part of a network, and hubs are a common point of connection on a network. A server houses information in a central location, and clients access that information through a connection to the server.

What is the difference between a router, a switch, a hub, and a server?

Data that have been given context become information.

What is the distinguishing feature that differentiates data from information?

IoT devices require constant Wi-Fi connectivity. If the IoT devices cannot communicate for any reason, they cannot function, and manufacturing stops.

What is the main vulnerability to production due to use of IoT devices?

Too much data: Businesses need to make a few decisions when they are creating data warehouses and big data storage areas, like are we capturing the data we need, or are we saving everything in case we need it? Sorting through too much data can be a hinderance to the DSS, CRM, or other processes.

What is the major issue that hinders the effective use of decision support systems (DSS)?

Business and leadership experience

What is the most important qualification that a Chief Information Officer (CIO) must possess?

Removing redundancies within the database

What is the process of normalization of a database?

Switches filter the information to the correct part of a network

What is the purpose of a network switch?

To direct data to the intended target location.

What is the purpose of a network switch?

Cloud web hosting

What is the term for using clustered servers to provide virtual resources for web pages?

File synchronization service

What is the term used to describe a file sharing system that uses cloud-based technology?

Social media

What is the term used to describe technologies that enable, facilitate, and enhance people's ability to share digital content?

Mainframes

What is the term used to refer to a massive, room-sized computer that processes and stores enormous amounts of bulk data and information?

Clients

What is the term used to refer to end-user computers on a network?

A network administrator

What is the title of the person in the organization who is directly responsible for the setup and operation of the organization's networks, including hardware and software?

Volume

What it takes just to hold and manage big data.

Management reports are summarized from supervisory reports that are generated from the transaction processing system. Supervisory reporting is highly detailed and generated directly from the transaction processing system. It is rarely used for high-level decision-making.

What kind of TPS report would be used for making strategic decisions?

internal nonvolatile - they are constructed with memory-like chips, they are very high-speed access and have no moving parts.

What kind of memory is SSD?

random-access memory (RAM)

What kind of memory is considered short term?

separate IP address and MAC address

What two things do you need to connect your phone to an IoT device to your wifi?

CSPs like Dropbox have security measures like strong passwords, biometrics, and two-factor authentication in place, so personal and business clouds remain safe and out of reach of unintended users.

What type of UID do most websites that store personal information use to keep their data secure?

Data

What will the future of IoT will depend on?

Multitasking

When a computer runs more than one process at a time

Keylogging

When a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard.

Data Output

When data are queried from data tables with tools

The data are normalized and structured.

When using extract, transform, and load (ETL), what is done during the "transform" step?

Computer support specialist

Which IT professional installs and performs minor repairs to hardware, performs software troubleshooting, and makes sure peripheral equipment works properly?

The network administrator Network administrators are responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software.

Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software?

The network administrator - Network administrators are responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software.

Which IT professional is directly responsible for the smooth operation and maintenance of a business's networks and networking technology, including its hardware and software?

Chief technology officer (CTO)

Which IT professional runs the organization's IT engineering group and serves as the company's top technology architect?

Chief technology officer (CTO); The CTO runs the organization's IT engineering group and serves as the company's top technology architect.

Which IT professional runs the organization's IT engineering group and serves as the company's top technology architect?

The CTO runs the organization's IT engineering group and serves as the company's top technology architect.

Which IT professional runs the organization's IT engineering group and serves as the company's top technology architect?

Unique identifier

Which IoT system process is used to reference each IoT device on a network?

Cost savings

Which advantage does a business gain by using cloud web hosting (CWH) rather than local hosting?

Product changes can be easily made. CAD software can test the product design. Designs are easily transferred to automated manufacturing tools.

Which advantages do computer-aided design and computer-aided manufacturing (CAD and CAM) provide the manufacturing process?

- CAD software can test the product design. - Designs are easily transferred to automated manufacturing tools. - Product changes can be easily made.

Which advantages do computer-aided design and computer-aided manufacturing (CAD and CAM) provide the manufacturing process? Choose 3 answers.

Administration of information on employees

Which aspect of human resource management is the responsibility of an IT department?

Variety

Which attribute of big data relates to whether the data are structured or unstructured?

Microcomputer

Which category of computer is a business laptop?

Productivity software

Which category of software is Microsoft Office?

A network interface controller

Which component must each client computer in the office have in order to install the new network?

Research and development

Which core business department is primarily responsible for business intelligence?

They allow a user to bypass an artist's copyright.

Which ethical dilemma is created by music-sharing websites?

Strategy

Which function of a customer relationship management system helps a company identify opportunities to increase its business?

Strategy A CRM's strategy function helps a company understand customers' concerns and desires and respond in ways that encourage more and better customer activity.

Which function of a customer relationship management system helps a company identify opportunities to increase its business?

Mobile apps

Which function or feature has allowed mobile phones to replace PCs for many small-business functions?

Faster internet speeds In order for real-time devices to function properly, they need to communicate via the internet without delays.

Which improvement in IT infrastructure has enabled IoT devices to function properly?

Supervisors

Which level of management gets the most detailed reports directly from the transaction processing system?

System-level security

Which level of security is required to protect the hardware and communications equipment that support a database?

Cut and paste

Which method of sharing data requires the use of temporary memory?

Browser-based

Which methodology for sharing information would be most appropriate to the business in the scenario?

Wi-Fi connection information

Which network information is needed to connect an Internet of Things (IoT) device?

Computing processing power doubles every 18 months.

Which observation about computing technology is expressed in Moore's law?

Milestones

Which output of project management software is used to assign tasks?

IT architect

Which professional designs parts of computer applications (like screen interfaces, middleware, and programming infrastructure) that comply with the head application developer's design principles?

Each key must be unique.

Which restriction applies to the data in the primary field of a database?

Milestone tracking

Which software feature could help address the problem described in the scenario?

Search engine marketing

Which strategy includes purchasing paid advertisements that appear at the top of results pages in a web browser?

Segmentation

Which technique is used to ensure data accuracy for a mailing campaign?

The database The information about customers contained in the database is the most valuable.

Which technology is a critical component of customer relationship management (CRM) systems?

The database - The information about customers contained in the database is the most valuable.

Which technology is a critical component of customer relationship management (CRM) systems?

The Internet of Things (IoT)

Which technology necessitated the development and implementation of Internet Protocol version 6 (IPv6)?

Data scrubbing

Which term is used to refer to the process of combining structured, unstructured, and semistructured data into a data warehouse structure?

Data governance

Which term refers to managing the availability, integrity, and security of an organization's data to ensure that the data remain high quality and valid?

It facilitates marketing strategies to increase business. It is a process to capture information about the business's customers. It provides communication tools and channels.

Which three benefits does a customer relationship management system (CRM) provide to a business?

- It is a process to capture information about the business's customers. - It provides communication tools and channels. - It facilitates marketing strategies to increase business.

Which three benefits does a customer relationship management system (CRM) provide to a business? Choose 3 answers.

Hadoop

Which tool allows large data sets to be stored and processed across multiple servers?

Video conferencing

Which type of application can a business implement to allow for real-time business collaboration?

A client computer on a network

Which type of computer runs a network operating system (NOS)?

Data that have become outdated

Which type of data are referred to as "decayed"?

Predictive reporting

Which type of reporting will provide Jack and William with the right information for making strategic decisions?

Function-specific software

Which type of software is supply chain management software?

Knowing which products sell the best in each region

Which valuable business intelligence (BI) can Freedom Rock Bicycles acquire from the database that directly relates to overall revenue and profitability based on this scenario?

100

Which value will be returned in cell C4 if "=MAX(F3:F17)" is input in the cell?

Bluetooth

Which wireless network uses a short-range network for connection between a cell phone and another device, such as a speaker?

Local area network (LAN)

While the business in the scenario is growing, it is still a small business. There are just 25 employees, and they all work in the same location. Which type of network will the business use?

Server

While the workforce is distributed, all the employees' computers will be managed from the main office. Which term refers to the computer that manages software updates for all the employees' computers?

The CIO normally reports to the chief operations officer (COO) or chief executive officer (CEO)

Who does the CIO report to?

Chief information officer (CIO)

Who does the CTO report to?

IT portfolio manager IT portfolio managers are responsible for the standardization of software rules and plans.

Who is responsible for designing a detailed plan to address the incompatibility of software between different departments?

Chief Technology Officer

Who manages IT group; designs IT architecture

It is secure and easy to memorize.

Why is a passphrase useful?

A farmer has placed IoT rain sensors in all owned fields to provide rain density information by field location. Which transmission methodology should the farmer use to gather this information?

Wi-Fi

How do most Internet of Things (IoT) devices connect to other devices?

Wi-Fi

Wi-Fi

Wi-Fi on the mobile device provides the same connectivity to the internet over wireless connection that a PC receives when connected to a network. Most companies provide wireless networks with their cable systems, and of course, many businesses provide Wi-Fi to their customers for free.

The airport installs sensors along the runways, and the sensors provide air traffic controllers with real-time information about the location of every plane on the ground. Which technology allows these sensors to transmit data to the air traffic controllers' server?

Wi-Fi signal Correct! IoT devices use Wi-Fi to transmit data from sensors to a server.

The airport installs sensors along the runways, and the sensors provide air traffic controllers with real-time information about the location of every plane on the ground. Which technology allows these sensors to transmit data to the air traffic controllers' server? Cellular network Bluetooth signal Peer-to-peer network Wi-Fi signal

Wi-Fi signal. IoT devices use Wi-Fi to transmit data from sensors to a server.

Wildland fires are often difficult to map and assess while they are active, and this creates difficulties for wildland firefighters. Which IoT solution can be used to address this problem? --Airplanes that use heat sensors and GPS to map fires --Satellite mapping systems with real-time updates --Wi-Fi headsets that facilitate real-time communication --Wi-Fi-connected drones with GPS and camera

Wi-Fi-connected drones with GPS and camera

Wide Area Networks (WAN)

Wide area networks (WAN) are computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together. Often, WANs rely on a telephone company's transmission facilities to connect the smaller networks together. Many large organizations rely on WANs to centralize data and information in a main office and then have the capability to disseminate that information nationwide, or even worldwide.

Wi-Fi-connected drones with GPS and camera

Wildland fires are often difficult to map and assess while they are active, and this creates difficulties for wildland firefighters. Which IoT solution can be used to address this problem?

Products

William and Jack believe that their large selection of rare parts and motorcycles should be the main focus of messaging to customers. Which of the four Ps of marketing should they focus on when they analyze customer needs and customer support?

Use search engine optimization.

William and Jack has a web page, but it does not receive many visitors. How can they make their web page more visible to those who may be looking for a motorcycle repair shop?

Install an extranet to the company's suppliers.

William manages the repair department of the business and is frustrated with the process of acquiring parts. Which IT methodology can William use to help manage this process?

Data Centers

With the emergence of business intelligence (BI), data are more valuable than ever because they provide historical, current, and predictive analyses for organizations.

browser-based web development

Wordpress.com, Web.com, and Wix.com started pioneering innovative, drag-and-drop technology. HTML, FTP, and a host of other web development tools had vanished, and so did expensive web development.

Worms

Worms are like a virus in that it is self-replicating but can be potentially more insidious in that it does not need to attach itself to an existing program to spread. Worms use networks to travel by sending copies of themselves to other parts of the network without a user's knowledge or intervention

Load

Writing data into target database

Function-specific software

__________________ is tailored to an industry, a particular business application, or a certain group of people trained in a specific technical area, or it is designed to be part of a business's offering to its customers

IoT

_______can allow vehicles to communicate with each other regarding location and speed. This is known as vehicle-to-vehicle (V2V) communications.

IoT

______has the capability to monitor and collect information and transmit it.

What is a Trojan horse?

a Trojan horse is a program that seems harmless and possibly interesting at first until it is executed. When the program is executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs. A particular computer action or even a particular date can initiate them.

File synchronization services offer.....

a cloud-based service where automated file transfers are made to update files from a sharing directory on each user's networked device. Examples of this service are Dropbox and Google Drive.

Productivity Suites

a collection of business computer application programs of associated functionality that share a common GUI and have the capacity to smoothly exchange data across the programs

Firewalls

a combination of specialized hardware and software that ensures that only authorized personnel can access and use an organization's intranet

IT Supply Chains

a component of a company's intranet by use of an extranet.

Spyware

a computer program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent. As the name suggests, spyware secretly monitors a user's keystrokes and behavior, but can also install new software that can include more spyware or programming to divert a computer to third party advertising websites

Extranet

a controlled private network that allows access to partners, vendors, and suppliers, and is usually a subset of the information accessible from an organization's intranet.

Identity Theft

a crime concerning the unlawful practice of assuming another individual's identity, and it is one of the fastest growing crimes in the United States and Canada

Shoulder Surfing

a criminal in a public place will simply glance over the victim's shoulder and watch the person dial a phone number, or type in a password on a laptop, or use a credit card number

Solid-state drives (SSDs)

a distinct advantage in the speed at which they access data. Since they are constructed with memory-like chips, they are very high-speed access and have no moving parts

Spreadsheets

a file that consists of rows and columns of data that can be manipulated and analyzed for business purposes. These data can be searched, sorted, calculated, graphed, and charted

Network interface card (NIC)

a hardware component that enables computers to communicate over a network

Semi-structured Data

a mix of structured and unstructured data.

Intranet

a private version of the internet that works the same way, but it is confined within an organization. Intranets contain company policies, computer files, and a host of other business resources.

Network Protocol

a standard language for the connected computers to communicate; provides a common language and rules for communication, a convention or standard that controls or allows communication and data transfer between two computers, the rules that govern network communication

Relational Database

a structured database that allows a business to identify and access data in relation to another piece of data within the same database.

GRaaS (Governance Rules as a Service)

a thorough rules-based automation for retention of information based on governance rules established by the business.

SUM function

adds all the numerical values in cells referenced in the function, then gives the total.=SUM(number1,[number2],...)

Social media

allows for sharing independent of time or location

What is a native app?

app that is preinstalled on a mobile device

IT managers and IT project managers

are in charge of software application development teams that develop, design, program, and test software applications.

unique identifiers (UIDs)

are required so that each device can be addressed individually, and the controlling system knows which device is transmitting the data for analysis. can be alphanumeric or any string of characters that ensures that the UID can be identified uniquely to the networked system.

Transaction Processing Systems (TPS)

basis for how a company gathers knowledge about its customers, products, and a host of other information.

Data and information exchange software and techniques....

can be categorized as electronic computing tools

collaborative software and techniques...

can be categorized as management tools

Knowledge management systems (KMS)

collaborative systems that organize, create, and distribute a business's collective knowledge. A common example of a knowledge management system within a business starts with distributing ideas, called knowledge transfer

What are Knowledge management systems (KMS)?

collaborative systems that organize, create, and distribute an organization's collective knowledge to its employees, which is called knowledge transfer. They are like private search engines for a business that become more valuable with time because of the accumulated amount of knowledge. The KMS serves as a central location that organizes every idea ever posted into searchable categories, making them easy to access company-wide.

native app

come with the device, such as calculators or calendars.

Computer viruses

computer files that reproduce by making copies of themselves within a computer's memory or storage or on a network. These are called metamorphic viruses and act in similar ways to biological viruses. Unlike biological viruses, computer viruses do not evolve on their own

Malware Solutions

computer programs that attempt to identify, prevent, and eliminate computer viruses and malware, typically before they reach a computing system or network. Antivirus software programs examine computer files and match them to known viruses stored in a database while also monitoring a computing system for suspicious activities that might indicate that a computer is already infected

Computer Security

concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system

File Sharing Systems

consists of either public or private access to corporate data located on a network. Access is granted to individuals based on their position and need to access.(Peer-to-peer File synchronization services)

The future of IoT will depend on.....

data

Database Management Systems (DBMS)

data are stored in computer files called tables, and tables are connected to other tables with related information; hence, a relational database.

Data

data are stored in databases that are designed for access in many different ways, which will be discussed in later units.

Which term refers to managing the availability, integrity, and security of an organization's data to ensure that the data remain high quality and valid?

data goverance

Data management (DM)

data management (DM) consists of the practices, architectural techniques, and tools for achieving consistent access to and delivery of data across the spectrum of data subject areas and data structure types in the enterprise.

A data analyst wants to use software to look for useful patterns and hidden relationships in this large set of social media data. Which process can be used to look for these patterns and relationships?

data mining

Vast amount of data that are collected

data on every aspect of the company are being collected

Looking back at the section on databases,

databases are information repositories and can range in size from small internal archives to massive, big data repositories.

computer network

defined as two or more computers connected together to communicate and share resources

Database administrators

design, create, and monitor databases so they can store and retrieve data crucial to the processes of the business

Network technicians and administrators

design, install, and monitor the network to ensure it is running at maximum efficiency

GPS Global positioning systems

designed to receive signals from an app on a phone and geostationary satellites so that a precise location can be determined. This is done by receiving multiple signals from the satellites and analyzing the data to determine the phone's coordinates on Earth.

Expensify

developed a travel and expense app for personal and business use that simplifies and streamlines the entire process.

There are seven main categories of mobile app types:

digital e-book publishing, entertainment/games, lifestyle, news, productivity, social/business and networking, and utilities

Presentation Software

displayed on-screen and are often projected for an audience. Slideshow presentations are made with a presentation software editor that lets a user insert and format text, graphics, video, and many other display elements

The company hopes to use cloud-based storage to allow employees to share all their work-related files. What is a common cloud-based storage solution for the company?

dropbox

Patents

exclusive rights to make or sell inventions

Chief Information Security Officer (CISO)

focused on the security of an organization's data and information, making sure it is backed up, deciding who gets to see it and who does not, and so on

Analysis and predictive reporting

generate reports that analyze information and are predictive in nature in order to make strategic and tactical decisions.

What term refers specifically to the physical aspects of a computer such as circuit boards, processor chips, memory, and keyboards?

hardware

IoT devices

have sensors that transmit data to another device utilizing the internet. These devices include wireless sensors, software, robotics, and computer devices, each with a unique identifier (UIDs).

Supervisory reporting

highly detailed and generated directly from the transaction processing system. It is rarely used for high-level decision-making.

Industry-specific devices

include sensors in power generating plants or real-time location devices for healthcare

Use of the IoT can be divided into two segments:

industry-specific and all industries.

Dumpster Diving

information is simply thrown away around homes and offices, like copies of checks, bank statements, and credit card statements, that usually bear your name, address, and sometimes even your phone number. Criminals know this and are willing to simply sift through trash to get the information.

Decision support systems (DSS)

information systems that are interactive software-based systems designed to assist decision makers in compiling useful information from business data and business models to make large business decisions.

Customer relationship systems (CRM)

information systems that manage the information on a company's customers, including all interactions with each customer.

Software technicians

install software and assist users in using the software

What is a private computer network for sharing corporate information, collaboration tools, and computing services?

intranet

Supply chain management

involves management of a wide range of components and processes, such as storing raw materials, managing the inventory, warehousing, and moving finished products from the point of manufacture to the point of consumption

Passwords

is a secret word or combination of keyboard characters typed in by a user to authenticate one's identity

The edge

is any place outside of a data center and connected to the internet. Where it all starts. (This includes things like machines, appliances, trucks, cars, streetlamps, thermostats, pets, and healthcare equipment)

Virtual memory

is seemingly an endless supply of memory the operating system provides by coordinating, tracking, and efficiently allocating the use of the CPU cache, registers, RAM, and disk storage.

Utility Software

is software that performs a particular function in the "background"; in other words, it requires little or no interaction with the user, but it is essential to the functioning of the computer. Examples of utility software include virus protection software and printer drivers. Utility software, therefore, requires little or no interaction once installed, and works on an exception basis

Chief Information Officer (CIO)

job title for the board level head of an information technology department, reports to CEO, work to modernize business processes with information technology and serve as a company's top IT infrastructure manager, mainly focuses on internal customers.

Internet of Things

many devices within a home can be connected to the internet to provide additional functionality and improvement in the quality of life. devices like Amazon's Alexa and Google Home that can connect to smart outlets and control things that are plugged in

IT services that focus on customers promote core business responsibilities such as the branding of a business's products and services. Which business department would these services be most relevant to?

marketing

Mainframe Computers

massive, room-sized computers that process and store enormous amounts of bulk data and information. They are typically used by very large organizations like credit card processors who employ them for transaction processing and vital applications. Mainframes require a huge amount of physical space and have special requirements like specialized air-conditioning units and fire protection systems.

Unstructured Data

meaning it is disorganized and cannot be easily read or processed by a computer because it is not stored in rows and columns like structured data.

Return on Investment (ROI)

measures the gain or loss generated by intelligent data management relative to the amount of money invested.

Which category of computer is a business laptop?

microcomputer

Physical Cable System

most commonly used network cable is an Ethernet cable. Ethernet network cables are specialized wires with adapters that plug into the NIC, and the most common type of cable wire is called a twisted pair.

Reverse Phishing/Keylogging

new form of malware, keylogging describes when a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard

The data are full of redundancies, which the data analyst needs to remove. Which process can the data analyst use to remove the redundancies?

normalization

What is an operating system (OS)?

often called a platform, is a collection of computer programs that work together to manage hardware and software to ensure that they are working properly. Performs jobs like allocating memory, administering input and output, and managing files. The most popular platforms in today's market are Microsoft Windows, Mac iOS, Linux, and UNIX.

Structured Data

or normalized data, meaning it is typically well-labeled, often with traditional fields and records common to data tables

Chief Securing Officer (CSO)

originated within information technology as the person who was responsible for IT security, focused on the security of an organization's data and information

End Users

people who use the hardware, software, networks, and databases in their performance of their daily work

Collaboration

people working toward a common goal and, in the case of the automobile manufacturer, many departments working toward a common goal

Intranet

private computer network for sharing corporate information, collaboration tools, operational systems, and other computing services only within an organization. Access is not given to outsiders of the organization.

Computer Programmer

produce both system and application software by writing line of programming instructions for a computer to follow, using programming languages (C, C++, Java, and Python), generalists know several programming languages.

When a business wants to outsource a computer programming job, it will often use what?

project management software, called Unified Modeling Language (UML), to describe the project.

Electronic computing tools

provide data and information exchange to facilitate decisions. (forums or discussion boards,instant messaging and online chatting )

Radio frequency identification (RFID)

radio frequency identification (RFID). RFIDs are essentially small tags used to label products for identification and have the product's information transmitted through radio waves.

shared resources

refer to computer files, folders, software, and peripheral hardware like printers, scanners, and webcams

Handheld Computers

referred to as personal digital assistants or PDAs, are compact but far less powerful than desktops or laptops

Internet Fraud

refers to any fraudulent activity in an online setting. Internet fraud can occur through email systems, message boards, chat rooms, or websites

Monetized the app

refers to generating income from the app. In this case the developer is using content upgrades to generate revenue.

Data governance

refers to the overall management of the availability, usability, integrity, and security of company data. Policies and procedures are established that define the data governance program

top-level executive reporting

requires very little detail (like the level of detail the transaction processing system reports provide

MAX function

returns the maximum value out of the selected data=MAX (number1,[number2],...)

Segmentation

sectioning off your data so you target the right customers

Segmentation

sectioning off your data so you target the right customers. By determining the demographics and other features of your customer base, you can develop a profile of your target audience.

The information repository

serves as a file sharing system in the cloud.

Radio Frequency Identifation (RFID)

small tags used to label products for identification and have the product's information transmitted through radio waves.

Network operating system (NOS)

software that controls an entire network. The NOS is responsible for controlling network traffic, administering packets, managing files, administering certain functions like backup, and maintaining network security.

What does value added mean?

something extra to make a product more desirable

File management

storing and organizing files in the memory of a computer. Operating systems are made up of a hierarchy of directories, typically called folders. Computer files are the modern counterparts of printed documents that in the past were typically stored in a file cabinet.

Management reporting

summarized from the TPS reports and can sometimes be used for strategic decisions, but it is generally used for tactical decisions that require specific actions. Management reports exclusively use internal information

Most function-specific software is....

tailored to either an industry or a certain group of people trained in a specific technical area, or it is designed to be part of a business's offering to its customers.

Systems analysts

take manual processes and find ways for IT to improve the flow, make the process faster, or automate a manual function

Programmers

take the designs from the systems analysts and code the application programs to meet specifications of the business, then test the software before it is implemented

AVERAGE function

takes the arithmetic average of selected numerical values in cells.=AVERAGE(number1,[number2],...)

Which technology is a critical component of customer relationship management (CRM) systems?

the Database

Computer Privacy

the ability of an individual to keep personal information out of public view.

Processes

the applications that a business uses in its daily operations

Ethic

the discipline dealing with what is good and bad and with moral duty and obligation

Copyrights

the exclusive legal rights of authors, composers, playwrights, artists, and publishers to publish and disperse their work as they see fit

Reporting summarization levels

the level of detail or level of summarization in a report; can be used in an infinite number of combinations.

What is a hub?

the most common hub is an Ethernet hub. The hub is a central location of the computer network that serves as a traffic cop for network connection and communication. Hubs ensure that computer traffic collisions are eliminated. Cables from network computers and other devices are plugged into a hub.


Kaugnay na mga set ng pag-aaral

ABeka 5th Grade History Chapter 14 Check Up Section J

View Set

Business Analytics Cumulative Final - Practice Problems

View Set

Ev.- Maternity and Women's Health Nursing

View Set