Intro To Info. Mgmt Final Review
Customer Relationship Management (CRM)
An approach to manage a company's interaction with current and potential customers. It uses data analysis about customers history to improve relationships. (Customer Retention)
Structured Data Unstructured DATA Machine Generated Data Human-Generated Data
A) Stored in a traditional system such as a relational database or spreadsheet B)Data that is not stored in a logical, organized way C)Created by a machine without human intervention D)Data that humans, in interaction with computers, generate
Which step in the Systems Development concerns itself with creating a blueprint of what the information system should look like A) Planning b) anaylsis c) design d) development
C) Design
The actual work that takes place to create the software such as software programming and database configuration is called what in the SDLC
Development phase
What is a domain Name Server (DNS)?
Essentially a giant phone book for the internet
What makes a computer a computer?
Input Processor Memory Output
Verifying that separate systems can work together is called
Integration testing
Enterprise Resource Planning (ERP)
NOT A SOFTWARE SOLUTION... it describes the integration of many different systems. Usually referred to as a category of business management software that an organization can use to collect, store, manage and interpret data from the Many different business actions
Using both legacy system and new system until all users verify that the new systems functions correctly is called
Parallel Implementation
Three primary areas of information security are
People, data, and systems
Which was not discussed as a driving factor in the trend of outsourcing systems development
The internet and globalization
Link Layer Internet Layer Transport Layer Application layer
A) Physical Layer, ethernet cable or wifi card B) Deals with addressing C) Deals with actual transportation of data D) Deals with interpreting the data
DATA INFORMATION BUISNESS INTELLEGENCE KNOWLEDGE
A) Raw facts that describe the characteristics of an event or object B) Data converted into a meaningful and useful context C) Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making D) Gain knowledge from info given
Firmware (example) Operating System (example) Application Software (example)
A) Software that is embedded in your hardware in some type of non-volatile memory (BIOS) B) An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. (Windows) C) Microsoft Word
Worms Trojan horse Ransomware
A) Standalone app. Unlike a virus, it does not need a host application. B) a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. (Usually from email) C) a type of malicious software designed to block access to a computer system until a sum of money is paid.
Virus Adware Spyware
A) a contagious piece of code that infects the other software on the host system and spreads itself once it is run. It is mostly known to spread when software is shared between computers. B) also known as advertisement-supported software. Creators of adware include advertisements or help distribute other software to earn money. C) unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
What are some examples of Cloud Solutions
Any Social media platform Any streaming platform Cloud Software (Office 365 and Salesforce) Microsoft Azure
In project management, a logical relationship between the project tasks is called
Dependency
What was not discussed as a form of intellectual property when it comes to technology
Fair use Doctrine
T or F: when an email is sent it only exists in one place at a time
False
What is the internet of things (IOT)?
Objects that are not a laptop or desktop but still connected to the internet (Amazon Alexa, Smart TV, Nest Thermostat, etc...)
What is the first line of defense against Malware?
People. The biggest issue surrounding information security is not a technical issue, but a people issue
What items are considered sources of unplanned downtime for a business
Power Outage Network Failure Corrupted Data
What is virtualization?
Refers to the creation of a virtual resource such as a server, desktop, operating system, storage, or network (Running Windows on a Mac)
Which of the following is listed as a constraint when managing projects
SDLC (Systems development life cycle)
What are the 3 main components of Management Information Systems (MIS) ?
Software Hardware Network
T or F: Most large scale IT projects fail due to people
True
T or F: PERT is a graphical network model that depict a projects task and the relationships between those tasks
True
T or F: in project management the critical path informs a project manager of the timeframe the project could possibly be completed
True
What type of hacker usually does not have malicious intent
White-hat hacker
Enterprise Software
computer software used to satisfy the needs of an organization rather than individual users