BIS Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Learning platforms that use algorithms to adjust the connect that each student sees in order to maximize learning efficiency is called __________ learning.

Adaptive

· A project management tool that is so important that nearly all PM software includes support systems for it, to ensure that all stakeholders are kept informed of a project's status.

Communication plan

· Cyber criminals often demand __________ as a ransom payment because this type of payment because this type of money is difficult to trace and accessible through any Internet-connected device.

Cryptocurrency

· An event or condition that can lead to IT asset loss and the negative consequences of such loss.

Cybersecurity Threat

· A cyberattack that originate and are executed by foreign governments or small groups.

Cyberwarfare

In a ________, a system is flooded with incoming messages. This creates a bandwidth problem for the system, forcing it to shut down, making the data inaccessible to those who legitimately have access to it.

DoS attack

· Computer viruses and Trojan horses are both programs, but a Trojan horse ________ _______ _______ like a virus does.

Does not replicate

the principles of right and wrong that guide an individual in making decisions

Ethics

· Living a virtuous life involves acting with high morals that are logically defined or shaped by _________.

Ethics

· Initiation, planning, _______, and closure are the four essential phases of all projects.

Executition

· Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using _________ _________ software.

Facial Recognition

· A __________ is hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic in and out of a network or computer.

Firewall

A _________ can serve as a building block to more sophisticated program management tools and help all stakeholders to better understand the intermediate steps required to complete a project

Flowchart

· The type of chart commonly used by project managers is a horizontal bar chart that shows project activities on the y-axis and time on the x-axis.

Gantt Chart

The first step in a five-step ethical analysis is ___________.

Gathering all the facts

The __________ function aims to create an organizational awareness of associated risks in the context of their business and resources.

Identity(ID)

To address the ethical concerns surrounding ___________, many employee handbooks state that the organization must use data responsibly and always respect privacy.

Information Privacy Rights

Tesla's autonomous driving system has raised some concerns from industry experts. They fear the technology used in Tesla's vehicles lacks the use of __________, a critical component in most autonomous vehicles.

LIDAR

This type of network chart depicts the timeline for a project and displays when certain processes will have slack

PERT Chart(also known as a network diagram)

· The _______ _______ ensures that the client understands the project cost and timeline.

Project planner

· This dimension of ethical concerns would examine the issue of how playing video games relates to or influences childhood obesity.

Quality of Life

· A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___________ computing.

Quantum

To assist project managers with determining and evaluating potential risk, the project management body of knowledge (PMBOK) identifies _________ processes.

Six

The act of manipulating or tricking people into sharing confidential, personal information.

Social engineering

XE-HP GPU is designed to support one of the world's fastest _________ Aurora.

Supercomputers

· This principle of ethical conduct calls for allocating rewards equitably according to individuals' productivity.

The Principle of Distributive Justice

Small text files created by websites other than those visited by the Internet user. They are used to track the user's surfing behavior and are considered an invasion of privacy.

Third-party cookies

· The key feature of Violet, the virus-killing robot.

Ultraviolet light

A benign internet robot that gathers data.

Web crawler

· The computer experts that help an organization ensure that its information system is protected against intrusions by testing the system's security measures.

White hat hackers

How have businesses reduced the likelihood of experiencing a data breach?

moving data storage to a cloud service provider such as Amazon Web Services

· The need to be prepared to defend your ethical decision is the __________ and a good reason to document your decision-making process.

o Fifth step


Set pelajaran terkait

L17 Genital Cancers: ovary, tube and vulval

View Set

US HIS 121 ch. 1-16 Midterm Review

View Set

Red Hat Section 5.7 Lab: Create, View and Edit Text Files

View Set

Nurse's Tools: Professional Communication: Client Education

View Set

Chap 15 Review (Picture Questions)

View Set

Compensation and Benefits Chapter 10

View Set

Shooting skills and marksmanship

View Set

Chapter 22: An Age Of Nationalism and Realism, 1850-1871

View Set