Principles - Module 1
Principles - Module 2
Excel - Module 1
Excel - Module 2
All Topics
100

A model that organizations use to introduce new systems to the workplace. 

What is Leavitt's Diamond Model?

100

The technique used to gain unauthorized access to a device or a network

What is an Attack Vector?

100

Where you enter or edit data in the active cell

What is the formula bar?
100

A picture can be added to a worksheet

What is background?

100

Getting an email from the Dean asking for an available mobile number

What is phishing?

200

Transforms the inputs to outputs in such a way that the value of the input is increased.

What is the value chain?

200

Unintended release of sensitive data or the access of sensitive data by unauthorized individuals, often resulting in identify theft.

What is a data breach?

200

A group of cells in a rectangular block

What is a cell range?

200

An equal sign is used at the start of the cell

What is a formula?

200

Function that counts numeric values

What is the count function?

300

An example of this is Starbucks using AI to understand customer preferences.

What is Information Systems as a means to gain a competitive advantage?

300

Four levels in a layered security solution design.

What are organizational, network, application, and end-user?

300

A line is added along the edge of a cell, row, column or table.

What is a border?

300

Formats can be copied and pasted in various options

What is format painter and paste special?

300

Transpose data with this feature

What is format painter and paste special - transpose?

400

Corporate strategy, business unit strategies, innovative thinking and technology innovations

What are four drivers that sets IS strategy?

400

A risk assessment is a key step within this strategy used to implement CIA at the organizational level

What is security strategy?

400
Shows what will be printed.

What is page break preview?

400

Cell positioning can be changed using this feature

What is alignment buttons?
400

Confidentiality, Integrity, Availability

What is the CIA Security Triad?

500

Microsoft Dynamics, SAP, Vantage by Epicor, and QuickBooks are examples of this sphere of influence

What is Enterprise Information System?

500

Response activities used when a cyber attack occurs

What are incident notification, protection of evidence and activity logs, incident containment, eradication, and incident follow-up?

500

Percent values are stored as decimals but displayed as this

What is a percent symbol?

500

Combining two cells together

What is merge cells?

500

A key value chain for information systems

What is supply chain?

M
e
n
u