CIS exam 1
File management environment; information silos
From the mid-1950s until the early 1970s, organizations managed their data in a _________; this created _______
Which of the following data is NOT currently collected by usage-based car insurance companies?
GPS
Acceptance
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.
ISP (Internet Service Provider)
Network neutrality is an operating model under which _______ must allow customers equal access to content and applications, regardless of the source or nature of the content
Disseminating
Performance Bicycle uses employee knowledge to help customers find products and relevant multimedia content about them. This is an example of ______ knowledge in the KMS cycle
financial; Enron
The Sarbanes-Oxley Act requires publicly held companies to implement _______ controls; it was passed to address the ______ crisis.
Employee Purchasing and Employee Consumer Tax
The US Office of Personnel Management hack involved the loss of _________ information.
common good
The ___________ approach highlights the interlocking relationships that underlie all societies
two
The relational database model is based on the concept of ________-dimensional tables
Hadoop; structured and unstructured data
TrueCar adopted _______ because it had to handle _________
Cyberterrorism
US government considers the Sony attack an act of?
slack
________ is a cloud-based team communication and collaboration software program that helps company employees communicate in real time.
Difficult to work with
________ is a disadvantage of fiber-optic cable
NIC (Network Interface Card)
________ s allow devices to physically connect to the LAN's communication's medium
Fiber-optic
__________ is a cable medium
VPN (Virtual Private Network)
__________ is a private network that uses a public network to connect users.
Wells Fargo Bank
__________ is the most recent example of ethical misbehavior in organizations
Nationwide
___________ does NOT offer usage-based automobile insurance
Rights Approach
ethical action is the one that best protects and respects the moral rights of the affected parties.
deontology approach
morality of an action is based on whether that action itself is right or wrong under a series of rules
utilitarian approach
most good, least harm
Common Good Approach
respect and compassion for all others is the basis for ethical actions
fairness approach
treats everyone equally
Disturbing the roadside assistance Industry
-App based roadside assistance -Honk and Urgent.ly face competition with AAA because of membership perks
Raytheon
-CAVE allows for 3D models of technical blue prints
attack on internet
-Dyn ddos -better security
Lest connected country
-Eritrea -Telecommunications controlled by government -gov't ordered internet service to improve economy
Cuba Information Technology
-No internet access -Revolico the craigslist of Cuba. Gov't blocked site. -AlaMesa promotes cuban culinary culture -Cuban allows WIFI and Hotspots but can't afford them
Ukrane cyber attack
-attacked power distribution center -spear phishing -ddos -better security -back ups
Mariott
-blocks guests wifi -FCC fined hotel
Cancer
-can't give medical records online -Flatiron oncology cloud -match suitable patients with clinic trials
slack
-cloud based team communication
Target expands to Canada
-could not calculate shelf space because of imperial and metric system
Fit problem
-customers not happy with clothing fit -takes data from other brands -virtual fit
Office management breach
-data breaches -info stolen (employees, contractors applicants and family members) -2 fact auth
USPS
-developing services that could disrupt usps services -sensors to help the expansion of smart technology in four areas
online courses
-difficult to grasp the level of student understanding
Free data
-expensive wireless data -Jana mCent -free data at the cost of personal information
Credit card fraud
-fraudulent transactions -trustev erasing data after 90 days -analyzing shoppers behavior while they browse and buy online
Democratic nation comittee
-hackers compromised system -blamed russian hackers -no definite proof who was responsible
Stingray
-harvest information from texts, emails, calls -data must be deleted daily
Ebola
-heatmaps that link the spread of the virus -public mobile call with specific location
Chevron
-improving BPR to BPM to raise funds through improving the company
Cardian hacking
-information leaked online -corporate espionage
Bike
-knowledge transfer sessions
Volkswagon
-manipulated emissions test -stopped selling
Bank of America
-measures to to eliminate problems that led to near death after financial crisis -Simplified IT infrastructures and created apps
Ransomware
-medical center cyberattack -ransomware blocked access to system -decryption key ransom payment
tracking pot
-microchip each plant -entering in info twice -Franwell is looking into developing systems
Ashley Madison
-not completely deleting profiles -hacked site and extorted users
google fiber
-not knowing where to place fiber optic cables -3rd party telephone poles, underground
tracking automobile
-price policy for existing customers -collecting and storing data while monitoring driving habits
Football VR
-reduce physical wear and tear of drills -VR mental experiences
Network neutrality
-ruled unconstitutional -new limits on broadband
Fanfuel and Draft Kings
-simple and fast fantasy betting -only if gov't and state allowed -litigation -60% of players wagering 10,000 a year -seeking regular and legal clarity on gambling issues
Forgotten
-software to remove links
Facebook problem
-surveys -users not reading terms
Bit
A ________ represents the smallest unit of data a computer can process
Patent
A _____________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.
Zappos
According to the Chapter 3 Opening Case, who did NOT get fined for blocking Wi-Fi access?
True
An intranet is a trusted network. True or False
Internet
An/The ______________ is a network of networks
a human error; unintentional
Careless Internet surfing is _________ and is an _________ mistake.
Non-volatile; cannot
Data marts and data warehouses are ________; this means they _____ be updated by users