Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
100

Name a decision making tool.

pros and cons, paired comparisons, decision matrix

100

What is a LAN?

Local Area Network
100

What is information security?

protects and safeguards information

100

What is anonymous browsing?

Not allowing websites to track you?

100

Traditional system development life cycle provides a disciplined ______ cycle. (hint nature and water) 

waterfall

200

What do very structured environments limit?

control and freedom to make decisions?

200

What is the Internet of Things?

household and everyday objects that connect to the internet. 

200

What is Risk Management? 

Process of identifying, assessing, and prioritizing information systems security risks

-find risks and tell how high the risk

200

What are cookie managers?

delete unwanted or dangerous cookies 

200

What is a closed source?

prevents users from accessing and modifying the source code

300

What is the difference between goals and requirements? 

Requirements: must have a minimum 

Goals: beyond minimum essential requirements 

300

What is intranet?

uses related internet technologies and applications, but inside of an organization (like when you log into lakehead) 

300

What is a the difference between asymmetric and symmetric encryptions?

Asymmetric- uses different keys to encrypt and decrypt messages 

Symmetric- same key is used to encrypt and decrypt data 

300

What is privacy?

how the confidentiality of the data collected about you is maintained 

300

If you want something fast and cheap, pick any two of what elements? (3 total) 

time, quality, and cost

400

What are the 4 parts of the decision making process?

1)Intelligence (data analysis, sensing what will require action) 

2) Design (developing alternative approaches)

3) Choice (selecting the most effective and efficient alternative) 

4) Implementation (the selected alternative is carried out) 


400

Describe the difference between analog and digital signals. You must include shape of signal, continuous and discrete and the word binary. 

Analog- waves, continuous, transmission rate is low (video, human voices) 

Digital-box, discrete, binary data, transmission rate is fast

400

Name 3 types of malware?

trojan horses, worms, stealth, polymorphic, spyware, virus hoaxes

400

What is one of 2 threats to privacy?

data collection or secondary use of information (data charing) 

400

What is the goal of the design phase?

describe in detail how the system will do

500

What is decision criteria?

objective measures of the requirements and goals that help you choose alternatives  

500

What is DATA hierarchy (in order)?

Bit, Byte, Fields, Records, Files, Database 

500

What are the 3 security goals? (CIA) 

Confidentiality

Integrity (data is consistent and complete) 

Availability (data or system is available when needed) 

500

What is Ethical decision Making (PLUS)?

  • P is consistent with organizational policies, procedures and guidelines

  • L is acceptable under applicable laws and regulations 

  • U conforms to universal values such as empathy, integrity, and justice

-S satisfies your personal definition of what is good, right, and fair

500

Name one of the 4 IT implementation plans. (hint P.P.DC.P) 

Parallel, phased, direct turnover, pilot 

M
e
n
u