BIS Final
Learning platforms that use algorithms to adjust the connect that each student sees in order to maximize learning efficiency is called __________ learning.
Adaptive
· A project management tool that is so important that nearly all PM software includes support systems for it, to ensure that all stakeholders are kept informed of a project's status.
Communication plan
· Cyber criminals often demand __________ as a ransom payment because this type of payment because this type of money is difficult to trace and accessible through any Internet-connected device.
Cryptocurrency
· An event or condition that can lead to IT asset loss and the negative consequences of such loss.
Cybersecurity Threat
· A cyberattack that originate and are executed by foreign governments or small groups.
Cyberwarfare
In a ________, a system is flooded with incoming messages. This creates a bandwidth problem for the system, forcing it to shut down, making the data inaccessible to those who legitimately have access to it.
DoS attack
· Computer viruses and Trojan horses are both programs, but a Trojan horse ________ _______ _______ like a virus does.
Does not replicate
the principles of right and wrong that guide an individual in making decisions
Ethics
· Living a virtuous life involves acting with high morals that are logically defined or shaped by _________.
Ethics
· Initiation, planning, _______, and closure are the four essential phases of all projects.
Executition
· Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using _________ _________ software.
Facial Recognition
· A __________ is hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic in and out of a network or computer.
Firewall
A _________ can serve as a building block to more sophisticated program management tools and help all stakeholders to better understand the intermediate steps required to complete a project
Flowchart
· The type of chart commonly used by project managers is a horizontal bar chart that shows project activities on the y-axis and time on the x-axis.
Gantt Chart
The first step in a five-step ethical analysis is ___________.
Gathering all the facts
The __________ function aims to create an organizational awareness of associated risks in the context of their business and resources.
Identity(ID)
To address the ethical concerns surrounding ___________, many employee handbooks state that the organization must use data responsibly and always respect privacy.
Information Privacy Rights
Tesla's autonomous driving system has raised some concerns from industry experts. They fear the technology used in Tesla's vehicles lacks the use of __________, a critical component in most autonomous vehicles.
LIDAR
This type of network chart depicts the timeline for a project and displays when certain processes will have slack
PERT Chart(also known as a network diagram)
· The _______ _______ ensures that the client understands the project cost and timeline.
Project planner
· This dimension of ethical concerns would examine the issue of how playing video games relates to or influences childhood obesity.
Quality of Life
· A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___________ computing.
Quantum
To assist project managers with determining and evaluating potential risk, the project management body of knowledge (PMBOK) identifies _________ processes.
Six
The act of manipulating or tricking people into sharing confidential, personal information.
Social engineering
XE-HP GPU is designed to support one of the world's fastest _________ Aurora.
Supercomputers
· This principle of ethical conduct calls for allocating rewards equitably according to individuals' productivity.
The Principle of Distributive Justice
Small text files created by websites other than those visited by the Internet user. They are used to track the user's surfing behavior and are considered an invasion of privacy.
Third-party cookies
· The key feature of Violet, the virus-killing robot.
Ultraviolet light
A benign internet robot that gathers data.
Web crawler
· The computer experts that help an organization ensure that its information system is protected against intrusions by testing the system's security measures.
White hat hackers
How have businesses reduced the likelihood of experiencing a data breach?
moving data storage to a cloud service provider such as Amazon Web Services
· The need to be prepared to defend your ethical decision is the __________ and a good reason to document your decision-making process.
o Fifth step