INFO 360 Exam 1 Review - Ch. 1,2,4,5
What type of system is used to assist with processes that rely on a large number of inputs that frequently change?
Decision support system
How are data in process different from data at rest or data in storage?
It is held in the device's RAM until it can be processed by the CPU or GPU
How are managers' jobs expected to change as MIS technology and tools improve?
Managers will be freed from tasks performed by online services or staff using collaboration tools
What is the correct term for when a GIS provides directions to a destination that a user has predetermined?
Route information
What is the most common characteristic of social engineering cybersecurity attacks?
They are conducted via emails that offer a reward in exchange for clicking a given link
What do all cybersecurity threats have in common?
They are connected to the loss of information, software, or hardware.
What is the main purpose of content delivery networks (CDNs)?
To minimize the distance between website users and website servers
A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?
Trello
Why would a vendor agreement be a disadvantage of cloud computing?
Vendor agreements make it difficult to switch services
When should the origin of information be authenticated to protect data integrity?
When electronic votes are submitted during an election
If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create
an intranet
"Ringing up" a customer means (at the time cash registers were invented)
cash drawer opens, register rings, alerting a shop owner to register activity
The first modern transaction processing system was
cash register
What should a company subscribe to in order to ensure sensitive information is kept safe?
cloud services security
The Foreign Key is a ____ field between tables that is not the primary key
common
We use database forms to control how ____ enters a database
data
Data scrubbing (data cleaning) involves identifying ____ in data sets the duplicating these errors to ensure the data is accurate for an organization
errors
Data centralization is critical for increasing data ___
integrity
Database administrators _____ and troubleshoot the database (if needed) to ensure it is stable and usable when needed
monitor
What did Henri Fayol consider to be the main roles or responsibilities of a manager?
planning, organizing, staffing, directing, and controlling processes
To set a primary key field in a database table, you must click the ____ key button
primary
Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?
protect (PR) function
Which function of the NIST Cybersecurity Framework calls for an organization to implement plans for resilience?
recover (RC) function
SQL-specific queries use specific SQL _____ to execute the query
statements
Adam Smith argued for the division of labor because he believed that
workers who specialize in a task perform it more efficiently and can help identify ways to mechanize it