TECHNOLOGY MANAGEMENT
ESSENTIALS ALREADY PASSED
Adware ✔✔Programs that automatically display or download advertising to a computer.
Application Software ✔✔Software that is designed for the user to carry out a specific task.
Best Practice ✔✔A management process, technique, or method that is most effective at arriving
at a desired outcome or a better outcome than any other process, technique, or method.
Big Data ✔✔Data that is collected from all over the internet, including smartphone metadata,
internet usage records, social media activity, computer usage records, and countless other data
sources.
Bus Topology ✔✔A network topology sometimes called a linear bus, where each of a network's
nodes is connected to a common linear backbone that has two endpoints.
Business Analytics ✔✔Attempts to make connections between data so organizations can try to
predict future trends that may give them a competitive advantage.
,Business Intelligence (BI ✔✔Strategies and technologies used by enterprises for the data
analysis of business information.
Cache ✔✔A hardware or software component that stores data so that future requests for that data
can be served faster.
Campus Area Network (CAN) ✔✔A computer network that connects two or more LANs that are
located on a campus.
Chief Information Officer (CIO) ✔✔A job title for the board-level head of an information
technology department within a business organization. The CIO's job is to make sure IT assets
are in place to ensure a smooth transition.
Chief Information Security Officer (CISO) ✔✔The CISO is generally focused on the security of
an organization's data and information, making sure it is backed up, deciding who gets to see it
and who does not, and so on.
,Chief Security Officer (CSO) ✔✔A CSO is in charge of such things as the physical security and
safety of employees, facilities, and corporate assets and may have a law enforcement
background.
Chief Technology Officers (CTO) ✔✔The CTO runs the organization's IT engineering group
and serves as the company's top technology architect.
Click Fraud ✔✔An internet fraud scheme that automatically passes a user to an advertiser,
whether they had any intention of visiting or not, in order to collect a per-click fee.
Clients ✔✔An end user's computer in a computer network.
Computer Network ✔✔Two or more computers connected together to communicate and share
resources.
Cybersecurity ✔✔The convergence of technologies, sound practice, and processes designed to
protect networks and their devices, programs, and data from attack or unauthorized access.
, Data Analysis ✔✔The application of statistics and logic techniques to define, illustrate, and
evaluate data.
Data Management (DM) ✔✔The practices, architectural techniques, and tools for achieving
consistent access to and delivery of data across the spectrum of data subject areas and data
structure types in the enterprise.
Data Management Processes ✔✔The process of acquiring data, making sure the data are valid,
and then storing and processing the data into usable information for a business.
Data Mapping ✔✔Extra notes about the definition of a field, its data, and its use
Data Mining ✔✔The examination of huge sets of data to find patterns and connections and
identify outliers and hidden relationships.
Databases ✔✔Well-thought-out collections of computer files, the most important of which are
called tables.