Term
| According to Norton, cybercrime is: |
|
Definition
| committed using a computer, network, or hardware device |
|
|
Term
|
Definition
| the fraudulent use of someone else’s identity |
|
|
Term
| What is the proper description of phishing: |
|
Definition
| the attempt of acquiring usernames or passwords of someone’s account |
|
|
Term
| According to Forbes, companies can protect themselves from cybercrime via: |
|
Definition
|
|
Term
| What is the common casual name for the hormone produced in your brain when you experience stress? |
|
Definition
|
|
Term
| Stress is your body's way of ____________________ you |
|
Definition
|
|
Term
| Stress helps you stay ______________ |
|
Definition
|
|
Term
| According to the video, stress drives you to study for an exam when you'd rather be |
|
Definition
|
|
Term
| To say goodbye to stress you should |
|
Definition
|
|
Term
| What are the three V's associated with Big Data? |
|
Definition
| Velocity, Variety, Volume |
|
|
Term
| Name two companies in sports using Big Data. |
|
Definition
| SportVU and Catapult Sports |
|
|
Term
|
Definition
| Customer Relationship Management |
|
|
Term
| What is Parkinson's Law as it applies to Big Data? |
|
Definition
| Data expands to fill available space |
|
|
Term
| What is the biggest risk to using Big Data? |
|
Definition
|
|
Term
| Who is Linux named after? |
|
Definition
|
|
Term
| Which of the following is a characteristic of the Linux operating system? |
|
Definition
|
|
Term
| According to a April 2013 Forbes article, Apple |
|
Definition
| Took some 45% of all the profits available in the PC business in the last quarter of last year |
|
|
Term
| Which of the following is not a computer operating system |
|
Definition
| All of the above are a computer operating system |
|
|
Term
| A characteristic of a Mac operating system would be |
|
Definition
|
|
Term
| Which of the following is a major positive of laptop computer technology? |
|
Definition
|
|
Term
| Which of the following is a major negative of the laptop computer technology? |
|
Definition
|
|
Term
| One of the major issues when it comes to laptop technology rankings is which of the following? |
|
Definition
| Laptop rankings are subjective |
|
|
Term
| The correct response to which laptop is best for business functions is which of the following? |
|
Definition
| The laptop that is best for a business is one that matches the type of business and personal preference of the employees |
|
|
Term
| One of the most important laptop security issues is which of the following? |
|
Definition
|
|
Term
| What are the Oakland Athletics and "Moneyball" most famous for: |
|
Definition
|
|
Term
| What is the difference between Business Analytics and Business Intelligence? |
|
Definition
| usiness analytics helps identify information to use in the future whereas business intelligence helps improve decision making as it relates to the past. |
|
|
Term
| What are some advantages of using business intelligence? |
|
Definition
|
|
Term
| What is true of business analytics? |
|
Definition
| Companies need the buy-in of core team members so that everyone understand the importance of business analytics. |
|
|
Term
| Which of the following statements about BI, BA, and BPM trends are true? |
|
Definition
| The market grew 7% in 2012 and will grow in the future. |
|
|
Term
| Which of the following companies is NOT a leader in virtualization technology? |
|
Definition
|
|
Term
| Which if the following is NOT one of the ways companies implement virtualization? |
|
Definition
| All of these are ways companies implement virtualization |
|
|
Term
| Virtualization can be defined as: |
|
Definition
| A technique for hiding the physical characteristics of computing resources from the way in which other systems, applications, or end users interact with those resources |
|
|
Term
| Where is the future of Virtualization headed? |
|
Definition
|
|
Term
| What sets Citrix apart from other Virtualization companies? |
|
Definition
| It people-oriented culture |
|
|
Term
| Which of the following are features of virtual reality? |
|
Definition
|
|
Term
| What is a negative aspect of virtual reality? |
|
Definition
|
|
Term
| Which of the following is a new virtual reality device for the future? |
|
Definition
|
|
Term
| What are the 3 main components of interactivity? |
|
Definition
|
|
Term
|
Definition
| Form of technology that creates three-dimensional worlds |
|
|
Term
| Who is the industry leader in wireless networking technology? |
|
Definition
|
|
Term
| What does RFID stand for? |
|
Definition
| Radio Frequency Identification |
|
|
Term
| What does VoIP stand for? |
|
Definition
| Voiceover Internet Protocol |
|
|
Term
| What is the main drawback of wireless networking? |
|
Definition
|
|
Term
| How does wireless technology relate to the sporting world? |
|
Definition
|
|
Term
| Which best describes Search Engine Optimization? |
|
Definition
| Building a website to get the best organic search ranking |
|
|
Term
| Which one of these is NOT a con of Search Engine Optimization? |
|
Definition
|
|
Term
| Pick the organization out of the following list that successfully implemented Search Engine Optimization according to my presentation. |
|
Definition
|
|
Term
| What are the two future trends to pay attention to in Search Engine Optimization? |
|
Definition
| Social media and digital assets |
|
|
Term
| Of the major search engines out there, which two have identical organic search results? |
|
Definition
|
|
Term
| Which is a con of personal anti-virus programs? |
|
Definition
| While running a scan, unlikely to be able to do anything else on computer because of its heavy dependence on computer resources |
|
|
Term
| Which company has the largest anti-virus market share? |
|
Definition
|
|
Term
| Which is not one of the five principles of proposed global privacy governance? |
|
Definition
|
|
Term
| Which is not considered Malware? |
|
Definition
|
|
Term
| What is not one of the three mitigation strategies? |
|
Definition
|
|