Ch. 4
Ethics and Information Security: MIS Business Concerns
Ch. 5
Infrastructures: Sustainable Technologies
Ch. 6
Data: Business Intelligence
Ch. 4-6 Review
Miscellaneous
100
What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?
What is authorization?
100
What creates multiple "virtual" machines on a single computing device?
What is virtualization?
100
What maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)?
What is a database?
100
What is a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?
What is cluster analysis?
100
What does the acronym GIGO stand for?
What is Garbage-In, Garbage-Out?
200
Which type of hacker breaks into other people's computer systems and may just look around or may steal and destroy information?
What is a black-hat hacker?
200
Give an example of cloud computing.
What is: - Google docs - Apple iCloud - Amazon cloud drive - etc.
200
T/F: There can be more than one foreign key in a table.
What is true.
200
What is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction? *In other words, what model uses the Internet for information instead of being restricted to a certain network?
What is cloud computing?
200
What does the term aggregate mean?
What is when two parts pull together to form a whole?
300
What are the principles and standards that guide our behavior toward other people?
What is ethics?
300
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
What is a hot site?
300
What is the process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information?
What is information cleansing or scrubbing?
300
What is an exact copy of a system's information?
What is a backup?
300
How much carbon-dioxide is emitted from a computer in relation to an automobile?
What is 10% the amount of carbon-dioxide produced by an automobile?
400
Name 3 of the six epolicies that organizations that organizations should implement to protect themselves.
What is: - Ethical Computer Use Policy - Information Privacy Policy - Acceptable Use Policy - Email Privacy Policy - Social Media Policy - Workplace Monitoring Policy
400
What are the three primary elements that an information infrastructure provides to support continuous business operations?
What is: - A backup and recovery plan - A disaster and recovery plan - A business continuity plan
400
In the following example, tell what the object that is starred represents. Database example: *74926* John Smith address age phone 68743 Mark Thomas address age phone 21790 Tom Jones address age phone 49986 Sam Field address age phone
What is a primary key?
400
What is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.
What is a firewall?
400
What is another word for "everywhere" or "omnipresent" that is often used in the business field?
What is ubiquitous?
500
Name the 3 areas of Information Security.
What is: - People: Authentication and Authorization - Data: Prevention and Resistance - Attacks: Detection and Response
500
Name four of the seven characteristics of agile MIS infrastructure.
What is: - Accessibility - Availability - Maintainability - Portability - Reliability - Scalability - Usability
500
Name five common characteristics of high quality information.
What is: - Accurate - Complete - Consistent - Timely - Unique
500
Name two common forms of viruses.
What is: - back doors programs - denial-of-service attack (DoS) - distributed denial-of-service attack (DDoS) - polymorphic viruses and worms - trojan-horse virus - worm
500
Who is the "father of computers."
Who is Charles Babbage?
M
e
n
u