This technology allows for secure transactions without a centralized validating authority.
Blockchain
Openness
Including a story about a person affected by an issue in a report may be an example of the ____ fallacy.
Anecdotal Evidence
This strategic model analyzes the competitive forces that shape every industry and helps determine an industry's weaknesses and strengths.
Porter's 5 Forces
Steve jobs was known for being a founder and CEO of tech-giant Apple. Jobs was also the CEO of this company.
Pixar
This technology requires very insulated, dry, and cold conditions in order to function properly.
Quantum Computers
A ___ in cryptography is a number which can be used to convert cipher-text to plain-text.
Key
A potential target audience who does not have direct power to over an issue but has influence upon someone that does is called ______
An advocate
Name the four types of risk mitigation strategies
Acceptance, Reduction, Transfer, Avoidance
This company produced the first ever microprocessors
Intel Inc.
This subset of AI allows for computers to gather information and improve in their functions without being explicitly programmed.
Machine Learning
Name the 9 countries that currently have nuclear weapons
USA, Russia, UK, France, Israel, India, Pakistan, North Korea, China,
What are the two questions we learned to ask to gain a baseline understanding of a person's motivations?
What gets them paid?
What can get them fired?
Typically the most costly type of risk management strategy is ______
Risk Avoidance.
The 'Fox' in the FireFox logo originally was actually this animal
A Red Panda
This company is the world's largest private R&D spender
Amazon
What does the financial metric CAGR represent?
Compound Annual Growth Rate
Name the 4 methods of writing an effective hook we discussed in class.
1.Drop a reader into the action
2.Form an emotional connection
3.Make a surprising statement
4.Leave the reader with questions.
While making a work breakdown structure (WBS), you know that you have broken down the steps in your plan sufficiently when...
when you can identify how long each step will take and how much it will cost.
The Strategic Defense Initiative was a U.S. missile defense program in the 1980s. It was nicknamed after the movie _____
Star Wars
The dark web TOR project was initially funded by_____.
The United States Navy
The 'Nuclear Triad' consists of what 3 elements?
Nuclear Bombers, Submarines, and ICBMs.
Brain candy refers to the strategy of inserting ____ into a piece of writing.
Interesting and easily sharable bits of information.
These metircs allow a project manager to see how much one step in a work breakdown structure can be delayed without impacting the next step.
Slack and Float
This government agency attempted to create robots that were fueled by eating plants.
DARPA