ISTM 210 TEST 3

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/158

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

159 Terms

1
New cards
who used gantt chart first
hoover dam then interstates
2
New cards
who is in charge of an entire web based software app
senior web developer
3
New cards
image
4
New cards
document head
5
New cards
anchor
6
New cards
italics
7
New cards
Subtracting Previous from Actual yields what?
variance
8
New cards
 What is it called when two or more people work towards a common goal?
collaboration
9
New cards
All five business departments must do what? 
collaborate
10
New cards
Whose tagline is, "We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us."
Anonymous
11
New cards
What is extremely easy to breach?
An unsecured computer
12
New cards
What is the key aspect of an Intranet?
Privacy
13
New cards
What kind of hardware does a firewall use?
Proxy Server
14
New cards
What keeps unauthorized Internet users out of private intranets?
Firewalls
15
New cards
Standard security practices dictate a what?
Default-deny” Firewall Rules
16
New cards
Where does the term “virus” come from?
Biology
17
New cards
What includes programs specifically intended to penetrate or damage a computer system?
Malware
18
New cards
What malware doesn’t need to attach itself to an existing program to spread?
Worms
19
New cards
What malware’s name originates from Greek mythology?
Trojan
20
New cards
\
What malware is installed covertly on a computer to take control of the system without the user’s knowledge?
Spyware
21
New cards
What is the abuse of an email system called?
Spamming
22
New cards
\
What does the acronym “DoS” stand for?
Denial of Service
23
New cards
What is a program that records every keystroke made on a computer? 
Keylogging
24
New cards
What is the most uncomplicated Internet fraud?
Purchase Scam
25
New cards
Which Internet fraud involves using social engineering techniques?
phishing
26
New cards
What can be defined as the ability to keep personal information out of public view? 
privacy
27
New cards
What means that one’s personal identity is not known?
anonymous
28
New cards
What is the name of Google’s advertising network?
AdSense
29
New cards
How does a website know so much about you when you return to it?
Tracking cookie
30
New cards
What is a list of cached websites on a user’s computer called?
History files
31
New cards
\
What is it called when someone glances at your computer to glean information? 
Shoulder Surfing
32
New cards
\
What does the “S” stand for in SCAM?
Stingy
33
New cards
What is it called when criminals sift through trash for information?
Dumpster Diving
34
New cards
What is it called when someone wrongfully uses another person’s information?
Identity Theft
35
New cards
For protection against identity theft, the United States Department of Justice urges people to remember what acronym?
SCAM
36
New cards
What can be defined simply enough as the ability of an individual to keep their personal information out of public view?
Privacy
37
New cards
What is a criminal activity that involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords, and credit card details by masquerading as a legitimate business organization?
Phishing
38
New cards
What is actually a very broad term that refers to any fraudulent activity in an online setting?
Internet Fraud
39
New cards
What is described as a computer program that is installed covertly on a computer to capture or take control of the system without the user's knowledge or consent?
Spyware
40
New cards
What is the virus that releases many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system?
Trojan horse
41
New cards
Which type of computer file reproduces by making copies of itself within a computer's memory, storage, or on a network?
Worm
42
New cards
What is specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet?
Firewall
43
New cards
Who is typically someone who attempts to invade or disable a computer's security measures and then steal the computer resources at their leisure?
Hacker
44
New cards
What is concerned with risk management, confidentiality, integrity, and availability of the electronic information that is processed and stored within a computing system?
computer security
45
New cards
Which business behavior would focus on SOX?
accounting
46
New cards
Which business behavior would focus on GAAP?
accounting
47
New cards
Two or more people pursuing a common business goal is called what?
collaboration
48
New cards
Which business behavior would focus on people? 
HR
49
New cards
Who coined the Four P’s of Marketing?
***E. Jerome McCarthy***
50
New cards
What are actual goods and services referred to in business?
products
51
New cards
How a product or service is delivered to a customer is called what?
placement
52
New cards
Advertising a product is called what?
promotion
53
New cards
What kind of approach does R&D take towards business?
***Creative and Systematic***
54
New cards
What is a collaborative thought process?
brainstorming
55
New cards
R&D ideas need to be what?
feasible
56
New cards
Who makes goods and services? 
production
57
New cards
Intangible products are called what?
services
58
New cards
Tangible products are called what?
goods
59
New cards
The oldest IT collaboration tool is what?
discussion board
60
New cards
The first post on a discussion board is called what?
thread
61
New cards
Real-time online communication is called what?
instant messaging
62
New cards
An example of Video Conferencing is called what?
webinar
63
New cards
Name an example of project management software. 
microsoft project
64
New cards
Project management software produces road maps called what?
Gantt charts
65
New cards
What collect an organization’s collective knowledge?
KM systems
66
New cards
Distributing ideas is called what?
Knowledge transfer
67
New cards
What is an example of online application software?
google docs and spreadsheets
68
New cards
What does the acronym UML stand for? 
Unified modeling language
69
New cards
 What is an organized entity designed to sell goods and/or services to make a profit?
Business
70
New cards
What is a collaborative system that organizes, creates, and distributes a business's collective knowledge?
KM
71
New cards
Which department prepares goods and services to be sold commercially?
production
72
New cards
Which department takes a creative and systematic approach to evolve a business's original idea and devise new ones?
research and development
73
New cards
Which department focuses on customers and has core responsibilities like advertising and branding a business's products and services?
marketing
74
New cards
Which department is involved in recruiting and hiring new employees, evaluating and managing personnel, tracking personnel data, and administering payroll and pensions?
HR
75
New cards
What is often referred to as the language or mathematics of business?
accounting
76
New cards
Which law was enacted in 2002 to counter fraudulent reporting?
SOX
77
New cards
What are accounting rules for preparing, presenting, and reporting financial statements?
GAAP
78
New cards
Most reports are what?
periodic
79
New cards
What does the acronym TPS mean?
transaction processing report
80
New cards
TPS systems are based in what application software?
database
81
New cards
What provides the groundwork for all other reports?
TPS
82
New cards
What kind of decision is long-term?
strategic
83
New cards
What kind of decision requires specific actions?
tactical
84
New cards
Reports produced whenever needed are called what?
demand
85
New cards
Demand reports are sometimes called what?
ad hoc
86
New cards
The purpose for business reports is to do what?
make decisions
87
New cards
Which report has the highest level of detail?
TPS reporting
88
New cards
TPS Reports support what type of decisions?
tactical
89
New cards
Completely summarized reports support what types of decisions?
strategic
90
New cards
Distilling a detailed report results in what?
summarization
91
New cards
What reports are visual in nature?
graphical reports
92
New cards
Reporting tendencies in business is called what?
trend reporting
93
New cards
Subtracting Forecast from Actual yields what?
variance
94
New cards
What level uses the most summarized reports?
executive
95
New cards
What level uses the most detailed reports?
laborers
96
New cards
Reports with the most detail are for what types of decisions?
tactical
97
New cards
Reports with the most summarization are for what types of decisions?
strategic
98
New cards
Which level report(s) use internal and external data?
executive and managers
99
New cards
Which level report(s) use internal data?
supervisors and laborers
100
New cards
Reports with only internal data are used for what type of decisions?
tactical