Jeopardy MGMT 450
The phone number for the UNM IT Support desk
- 277-5757
According to our class lecture the ratio of unstructured data and structured data is what %'ages
95% to 5%
This aggregation site in ABQ run by UNM provides high speed network connectivity for many govt and education entities in the state of NM
ABQ GigaPop ABQG
Title of position that heads the IT dept. in most orgs
CIO
A major characteristic of this service is that it enables better accessibility to data in terms of place and time
Cloud computing
The term for individual facts or pieces of information
Data
The name of the position responsible for managing, tuning, patching and updating a database
Database Administrator (DBA)
Per our lecture, this computer brand had the largest market share in North America in 2019, with 30.81% of the market
Dell
Per our lecture, the most common method of introducing ransomware is through this approach
Email Phishing
ERP stands for
Enterprise Resource Planning
The frequency that a business is likely to fall victim to ransomware in 2021
Every 11s
This format is useful for managing web content and web-based resources and is particularly useful for structuring data for building mobile apps
Extensible Markup Language (XML)
Modules such as general ledger, travel and expense management and asset management are typically included in a ________ management system
Financial
Tech Byes swim goggles
Form
The product made by Google in 2012/13 initially failed due to cost and privacy issues
Google Glass
Facts that are assembled and analyzed to add meaningfulness and usefulness
Information
The term that addresses the planning for governance data stewardship and data architecture
Master data management
Data about data is known as _____
Metadata
The hypothesis that states that roughly every 2 years number of transistors on an integrated circuit doubles is known as what?
Moore's law
The security protocol that involves something you have, such as a smart phone, and something you know, like a password
Multi-factor Auth (MFA)
A voluntary guide that helps organizations understand and protect themselves against cybersecurity risks
National Institute of Standards Technology (NIST) Cybersecurity Framework
The author of the article "IT doesn't Matter" and "Does IT Matter"
Nicholas Carr
One employee record with multiple job records is an example of this type of relationship
One-to-many
The URL of UNM's site where data sets are shared in XML format
Opendata.unm.edu
The fast network connection that utilizes light wavelengths to transfer data
Optical Fiber
What are the 4 components of IT
People Process Technology Data
Who is quoted as saying "Do what you do best and outsource the rest"
Peter Drucker
We originally learned that the quality of information could be characterized by timeliness accuracy and completeness. Name the four components to consider in information quality
Precision Consistency Bias Duplication
In the analytics maturity model, the most advanced level of analytics which answers the question "What should happen"
Prescriptive Analytics
The type of storage that retains data and information when the power is turned off
Read Only Memory (ROM)
The ITIL term that describes the front-door, single point of contact for reporting and triaging IT related questions and issues
Service Desk
A supplemental system that is prepared by an individual or department and may contain a separate version of the truth
Shadow system
The cloud service model that provides end to end vendor managed services from from infrastructure to application.
Software as a Service
Data that can be organized into hierarchies
Structured data
A supervisor who frequently gives feedback to the employees who report to her- both to praise and let them know areas of improvement notices employee productivity rises. This is known as what effect?
The Hawthorne Effect
Three core characteristics of valuable information
Timeliness Accuracy Completeness
The total of termination costs, hiring costs, training costs, and other costs related to replacing a worker
Turnover costs
UNM's powerful supercomputing facility that is used to facilitate high speed processing related to research is called what?
UNM Center for Advanced Research Computing (CARC)
Pieces of data that cannot be linked together
Unstructured data
The type of software that authenticates users who attempt to access the network before establishing a secure connection with the network
Virtual Private Network (VPN)
The technology that enables task routing and automation for things like authorizations, hiring, etc.
Workflow
Tech bytes that this company leverages virtual horses in an online gaming site
Zed Racing
The XML based approach to tagging financial statements for financial reporting that involves elements, taxonomies, and mapping
eXtensible business reporting language (XBRL)
Which of the following is the central element of the Human capital management (HCM) information system?
employee record
This type of modern database architecture is most effective in organizing complex data types such as graphics and multimedia
object-oriented
The Charleston Police Dept is using Big Data to
predict crime