Final Exams (Latest 2024/ 2025 Updates STUDY
BUNDLE PACKAGE WITH SOLUTIONS) Information
Technology Management Essentials | Qs & As| 100%
Correct| Grade A
Adware - ANSWERPrograms that automatically display or download advertising to a
computer.
Application Software - ANSWERSoftware that is designed for the user to carry out a
specific task.
Best Practice - ANSWERA management process, technique, or method that is most
effective at arriving at a desired outcome or a better outcome than any other
process, technique, or method.
Big Data - ANSWERData that is collected from all over the internet, including
smartphone metadata, internet usage records, social media activity, computer usage
records, and countless other data sources.
Bus Topology - ANSWERA network topology sometimes called a linear bus, where
each of a network's nodes is connected to a common linear backbone that has two
endpoints.
Business Analytics - ANSWERAttempts to make connections between data so
organizations can try to predict future trends that may give them a competitive
advantage.
Business Intelligence (BI) - ANSWERStrategies and technologies used by enterprises
for the data analysis of business information.
Cache - ANSWERA hardware or software component that stores data so that future
requests for that data can be served faster.
Campus Area Network (CAN) - ANSWERA computer network that connects two or
more LANs that are located on a campus.
Chief Information Officer (CIO) - ANSWERA job title for the board-level head of an
information technology department within a business organization. The CIO's job is
to make sure IT assets are in place to ensure a smooth transition.
Chief Information Security Officer (CISO) - ANSWERThe CISO is generally focused on
the security of an organization's data and information, making sure it is backed up,
deciding who gets to see it and who does not, and so on.
,Chief Security Officer (CSO) - ANSWERA CSO is in charge of such things as the
physical security and safety of employees, facilities, and corporate assets and may
have a law enforcement background.
Chief Technology Officers (CTO) - ANSWERThe CTO runs the organization's IT
engineering group and serves as the company's top technology architect.
Click Fraud - ANSWERAn internet fraud scheme that automatically passes a user to
an advertiser, whether they had any intention of visiting or not, in order to collect a
per-click fee.
Clients - ANSWERAn end user's computer in a computer network.
Computer Network - ANSWERTwo or more computers connected together to
communicate and share resources.
Cybersecurity - ANSWERThe convergence of technologies, sound practice, and
processes designed to protect networks and their devices, programs, and data from
attack or unauthorized access.
Data Analysis - ANSWERThe application of statistics and logic techniques to define,
illustrate, and evaluate data.
Data Management (DM) - ANSWERThe practices, architectural techniques, and tools
for achieving consistent access to and delivery of data across the spectrum of data
subject areas and data structure types in the enterprise.
Data Management Processes - ANSWERThe process of acquiring data, making sure
the data are valid, and then storing and processing the data into usable information
for a business.
Data Mapping - ANSWERExtra notes about the definition of a field, its data, and its
use.
Data Mining - ANSWERThe examination of huge sets of data to find patterns and
connections and identify outliers and hidden relationships.
Database Administrators (DBAs) - ANSWERDBAs categorize data requirements and
create the database entities and models that ensure accurate and smooth-flowing
information throughout a business.
Database Management System Software (DBMS) - ANSWERAn application software
that is used to create a collection of related files that consist of records of data
separated by fields that can be queried to produce populations of information.
Databases - ANSWERWell-thought-out collections of computer files, the most
important of which are called tables.
, Default-allow Firewall Rule - ANSWERA rule that all traffic is allowed unless it has
been specifically blocked.
Default-deny Firewall Rule - ANSWERThe only network connections that are
permitted are the ones that have been explicitly allowed.
Denial-of-service - ANSWERAn attempt to make a computer or any of its resources
unavailable to its intended users.
Disk Storage - ANSWERNonvolatile, secondary storage on a physical device like a
hard drive or optical disk with a read/write apparatus.
Ethernet Card - ANSWERProvides the computer with a unique 48-bit address called a
MAC (media access control) address. No two Ethernet cards have the same address.
Extract, Transform, and Load - ANSWERTools that are used to standardize data
across systems and allow the data to be queried.
File Allocation Table (FAT) - ANSWERA table of contents that directs the read/write
arm of the hard drive to the location where data exist and accesses the data upon
the user's request.
Firewall - ANSWERSpecialized hardware and software that ensures that only
authorized personnel can access and use an organization's intranet.
Foreign Key - ANSWERA field in a database table that provides a link between two
tables in a relational database.
Gantt Chart - ANSWERA type of bar chart that illustrates a project schedule.
Graphical User Interface (GUI) - ANSWERThe visual system of computer screen
designs that allow a user to interact with an electronic device.
Hardware - ANSWERThe physical part of the computer.
Hypertext Markup Language (HTML) - ANSWERThe major markup language used to
create web pages.
Hypertext Transfer Protocol (HTTP) - ANSWERProtocol used to define how messages
are formatted and transmitted on the internet.
IT Managers - ANSWERIT managers are in charge of software application
development teams that develop, design, program, and test software applications.
Identity Theft - ANSWERA crime concerning the unlawful practice of assuming
another individual's identity.