quiz questions 1-3
The two main components of a processor are the control and the....
Arithmetic Logic Unit (ALU)
The holistic balanced se of measures which reflect the diff drivers that contribute to superior performance and the achievement of the enterprise strategic goal
Balanced Score Card
what business management system seeks to streamline an orgs activities to prevent backlogs and inefficiencies?
Business Process Management (BPM)
The essential RDBMS functions acronym... (and what it stands for)
CRUD create read update delete
In our lecture we laerned about this AI effort by Google through examples ofi t making appts and reservations
Duplex
The CISO heads the IT dept in most orgs? T/F
F, the CIO does
In a uni database, the student table, with student ID as a primary key, is linked to the uni department table through its primary key department ID, in the student table department ID is a...
Foreign Key
Which of the following is a tool commonly used by project managers and accessed w/ PM software?
Gantt chart
What occurs during the process optimization step of business process management:
Managers adapt (modify) the process to enhance process performance
how are managers' jobs expected to change as mgmt MIS tech and tools improve?
Managers will be freed from tasks performed by online services or staff using collaboration tools
The name of Google's project to apply analytics to characteristics of effective mgmt
Oxygen
The 4 components of Information Technology
PPTD: People process technology data
The federal law mandating all electronic and informtation technology developed, procured, maintained or used by the fed govt be accessible to ppl with disabilities
Section 508
SMART goal
Specific, Measurable, Attainable, Realistic, Timely
UNM's Center for Advanced Research Computing is what type of computer
Super Computer
Andrei Ene malware attack TBT =
Tiny Banker Trojan
The unique global address for a webpage or other resource on the internet is called the ____
Uniform Resource Locator (URL)
The organization that makes best practice recommendation to make the web "available to all people whatever their hardware software network infra native lang culture phys/mental ability
World Wide Web COnsortium (W3C)
data analytics
a search engine continually adjusts it algos as more data enters it servers; this is an example of
How does supply chain visibility provided by a SCM system reduce the bullwhip effect?
accurately predicting how many items are expected to sell
A common basic condition for most flextime policies is the requirement that employees must
be able to fullfill their work responsibilities including attending meetings and events in prson
A videoconference may be a better choice than a voice conference call bc it allows
better comms nonverbal cues
A wireless short range transmission protocol is callel
bluetooth
Frederick Taylor used time and motion studies to
break down work tasks to find ways to improve them
Spyware function
capture user's account data passwords keystrokes and more
A key component and major advantage of an ERP is its
centralized database
Which stage of the PM process involves documenting the lessons learned during the projects execution?
closure stage
Best type of collab software for an org to increase engagement w/ remote employees and those "in house"
cloud based forums, messaging and meeting apps
recognizing that inappropriate and inconsistent pay can demotivate, firms use
compensation mgmt softwatre
When creating a database field, we set _____ for each field to decrease data input mistakes
data types
What type of system is used to assist with processes that rely on a large number of inputs that frequently change?
decision support system
The purpose of the application protocol layer of TCP/IP is to
define how email programs and other software communicate within and across etworks
the goal of eXtensible Business Reporting Language in compliance reporting is to
develop a common language for all accounting and business reports
what is the term that involves a ransomer releasing private info collected during a ransom attack?
doxing
Data redundancy is the ____ of data
duplication
What is the key reason to implement cloud computing into ones personal and or business data and information processing?
eliminates need to store files and software on a local drive
HRM systems are invaluable to HR managers who lack legal expertise because the systems
ensure that HR actions comply with govt regs
how often bidniss falls victim to ransomware
every 11s
This involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraud activity
exception reporting
what must be integrated into an org's ERP sol'n to allow it to create and maintain regulatory and compliance info from a centralized location?
financial management systems
calculating reordering poitns and order qty levels are key advantages of modern
inventory management systems
How is metadata related to info?
it helps clarify the nature of the information
Why invest in CRM?
its a lot less expensive to retain existing customer than acquire new
To properly auth or verify the identify of auth'd users and protect assets its important to
keep user logins and pw's confident
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
outline specific recovery times for information technology to resume after an issue occurs
In the analytics maturity model.. "what should happen" is
prescriptive analytics
In a relational database, info is organized into tables in which each row represents a
record
finding evidence of apps you didnt download system configs altered and files disappeared/moved is what cyber threat
rootkit
specialized hardware/software that captures packets transmitted over a network are called packet
sniffers
What is the key role of a client server network in business?
to provide personal computer users secured access to shared data
what is the purpose of social engineering in conjunction with ransomware?
tricks victims into allowing access to data
In which situation should the origin of info be auth'd to protect data integrity
when electronic votes ar esubmitted during an election