quiz questions 1-3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The two main components of a processor are the control and the....

Arithmetic Logic Unit (ALU)

The holistic balanced se of measures which reflect the diff drivers that contribute to superior performance and the achievement of the enterprise strategic goal

Balanced Score Card

what business management system seeks to streamline an orgs activities to prevent backlogs and inefficiencies?

Business Process Management (BPM)

The essential RDBMS functions acronym... (and what it stands for)

CRUD create read update delete

In our lecture we laerned about this AI effort by Google through examples ofi t making appts and reservations

Duplex

The CISO heads the IT dept in most orgs? T/F

F, the CIO does

In a uni database, the student table, with student ID as a primary key, is linked to the uni department table through its primary key department ID, in the student table department ID is a...

Foreign Key

Which of the following is a tool commonly used by project managers and accessed w/ PM software?

Gantt chart

What occurs during the process optimization step of business process management:

Managers adapt (modify) the process to enhance process performance

how are managers' jobs expected to change as mgmt MIS tech and tools improve?

Managers will be freed from tasks performed by online services or staff using collaboration tools

The name of Google's project to apply analytics to characteristics of effective mgmt

Oxygen

The 4 components of Information Technology

PPTD: People process technology data

The federal law mandating all electronic and informtation technology developed, procured, maintained or used by the fed govt be accessible to ppl with disabilities

Section 508

SMART goal

Specific, Measurable, Attainable, Realistic, Timely

UNM's Center for Advanced Research Computing is what type of computer

Super Computer

Andrei Ene malware attack TBT =

Tiny Banker Trojan

The unique global address for a webpage or other resource on the internet is called the ____

Uniform Resource Locator (URL)

The organization that makes best practice recommendation to make the web "available to all people whatever their hardware software network infra native lang culture phys/mental ability

World Wide Web COnsortium (W3C)

data analytics

a search engine continually adjusts it algos as more data enters it servers; this is an example of

How does supply chain visibility provided by a SCM system reduce the bullwhip effect?

accurately predicting how many items are expected to sell

A common basic condition for most flextime policies is the requirement that employees must

be able to fullfill their work responsibilities including attending meetings and events in prson

A videoconference may be a better choice than a voice conference call bc it allows

better comms nonverbal cues

A wireless short range transmission protocol is callel

bluetooth

Frederick Taylor used time and motion studies to

break down work tasks to find ways to improve them

Spyware function

capture user's account data passwords keystrokes and more

A key component and major advantage of an ERP is its

centralized database

Which stage of the PM process involves documenting the lessons learned during the projects execution?

closure stage

Best type of collab software for an org to increase engagement w/ remote employees and those "in house"

cloud based forums, messaging and meeting apps

recognizing that inappropriate and inconsistent pay can demotivate, firms use

compensation mgmt softwatre

When creating a database field, we set _____ for each field to decrease data input mistakes

data types

What type of system is used to assist with processes that rely on a large number of inputs that frequently change?

decision support system

The purpose of the application protocol layer of TCP/IP is to

define how email programs and other software communicate within and across etworks

the goal of eXtensible Business Reporting Language in compliance reporting is to

develop a common language for all accounting and business reports

what is the term that involves a ransomer releasing private info collected during a ransom attack?

doxing

Data redundancy is the ____ of data

duplication

What is the key reason to implement cloud computing into ones personal and or business data and information processing?

eliminates need to store files and software on a local drive

HRM systems are invaluable to HR managers who lack legal expertise because the systems

ensure that HR actions comply with govt regs

how often bidniss falls victim to ransomware

every 11s

This involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraud activity

exception reporting

what must be integrated into an org's ERP sol'n to allow it to create and maintain regulatory and compliance info from a centralized location?

financial management systems

calculating reordering poitns and order qty levels are key advantages of modern

inventory management systems

How is metadata related to info?

it helps clarify the nature of the information

Why invest in CRM?

its a lot less expensive to retain existing customer than acquire new

To properly auth or verify the identify of auth'd users and protect assets its important to

keep user logins and pw's confident

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

outline specific recovery times for information technology to resume after an issue occurs

In the analytics maturity model.. "what should happen" is

prescriptive analytics

In a relational database, info is organized into tables in which each row represents a

record

finding evidence of apps you didnt download system configs altered and files disappeared/moved is what cyber threat

rootkit

specialized hardware/software that captures packets transmitted over a network are called packet

sniffers

What is the key role of a client server network in business?

to provide personal computer users secured access to shared data

what is the purpose of social engineering in conjunction with ransomware?

tricks victims into allowing access to data

In which situation should the origin of info be auth'd to protect data integrity

when electronic votes ar esubmitted during an election


Set pelajaran terkait

ls7b week 1-3 PEQs and review questions

View Set

Intro To Networks Final Exam Review

View Set

Окружающий мир 3 класс.Биология (119) карточки

View Set

Factors Affecting Life Insurance Premiums, Endowment Value, Reduced Paid Up Option, and Guaranteed Insurability Rider

View Set

thema 'hoe ziet hij of zij eruit?'

View Set

Psych 101 FINALS (ch 8-11) review

View Set

AI-Powered Shopping ads Certification Test

View Set

DEL Unit 02: Electrical Quantities and Ohm's Law

View Set

ACCT 4631 - Internal Auditing: CIA Quiz Topics 12, 13, 14

View Set

Chapter 47: Drug Therapy for Parkinson's Disease and Anticholinergics

View Set