INFO 360 Exam 1 Review - Ch. 1,2,4,5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What type of system is used to assist with processes that rely on a large number of inputs that frequently change?

Decision support system

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU

How are managers' jobs expected to change as MIS technology and tools improve?

Managers will be freed from tasks performed by online services or staff using collaboration tools

What is the correct term for when a GIS provides directions to a destination that a user has predetermined?

Route information

What is the most common characteristic of social engineering cybersecurity attacks?

They are conducted via emails that offer a reward in exchange for clicking a given link

What do all cybersecurity threats have in common?

They are connected to the loss of information, software, or hardware.

What is the main purpose of content delivery networks (CDNs)?

To minimize the distance between website users and website servers

A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?

Trello

Why would a vendor agreement be a disadvantage of cloud computing?

Vendor agreements make it difficult to switch services

When should the origin of information be authenticated to protect data integrity?

When electronic votes are submitted during an election

If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create

an intranet

"Ringing up" a customer means (at the time cash registers were invented)

cash drawer opens, register rings, alerting a shop owner to register activity

The first modern transaction processing system was

cash register

What should a company subscribe to in order to ensure sensitive information is kept safe?

cloud services security

The Foreign Key is a ____ field between tables that is not the primary key

common

We use database forms to control how ____ enters a database

data

Data scrubbing (data cleaning) involves identifying ____ in data sets the duplicating these errors to ensure the data is accurate for an organization

errors

Data centralization is critical for increasing data ___

integrity

Database administrators _____ and troubleshoot the database (if needed) to ensure it is stable and usable when needed

monitor

What did Henri Fayol consider to be the main roles or responsibilities of a manager?

planning, organizing, staffing, directing, and controlling processes

SQL-specific queries use specific SQL _____ to execute the query

statements

Adam Smith argued for the division of labor because he believed that

workers who specialize in a task perform it more efficiently and can help identify ways to mechanize it

To set a primary key field in a database table, you must click the ____ key button

primary

Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?

protect (PR) function

Which function of the NIST Cybersecurity Framework calls for an organization to implement plans for resilience?

recover (RC) function


Set pelajaran terkait

Electromagnetic Spectrum and Speed of Light

View Set

International Business Law Chapter 5, Chapter 9 International Environment of Business Management, chapter 6 international business environment, BLAW 497 Exam 2 MC

View Set

CIS 560 IT Services & Project Management Chapters 5 & 6

View Set

Consumer Math Chapter 3 Average Monthly Expenditure

View Set