100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Information Technology Management C954 Exam/780 Questions and Answers $20.49   Add to cart

Exam (elaborations)

Information Technology Management C954 Exam/780 Questions and Answers

 4 views  0 purchase
  • Course
  • Institution

Information Technology Management C954 Exam/780 Questions and Answers

Preview 4 out of 56  pages

  • August 26, 2024
  • 56
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Information Technology Management
C954 Exam/780 Questions and Answers
3D printing - -Builds—layer by layer in an additive process—a three-
dimensional solid object from a digital model.

-acceptable use policy (AUP) - -A policy that a user must agree to follow in
order to be provided access to a network or to the Internet.

-access point (AP) - -The computer or network device that serves as an
interface between devices and the network.

-accessibility - -Refers to the varying levels that define what a user can
access, view, or perform when operating a system.

-accounting - -Analyzes the transactional information of the business so the
owners and investors can make sound economic decisions.

-accounting and finance ERP component - -Manages accounting data and
financial processes within the enterprise with functions such as general
ledger, accounts payable, accounts receivable, budgeting, and asset
management.

-accounting department - -Provides quantitative information about the
finances of the business including recording, measuring, and describing
financial information.

-active RFID tags - -Have their own transmitter and a power source
(typically a battery).

-adaptive computer device - -Input devices designed for special applications
for use by people with different types of special needs.

-administrator access - -Unrestricted access to the entire system.

-advanced encryption standard (AES) - -Introduced by the National Institute
of Standards and Technology (NIST), AES is an encryption standard designed
to keep government information secure.

-adware - -Software that, although purporting to serve some useful function
and often fulfilling that function, also allows Internet advertisers to display
advertisements without the consent of the computer user.

, -affinity grouping analysis - -Reveals the relationship between variables
along with the nature and frequency of the relationships.

-Agile BI - -An approach to business intelligence (BI) that incorporates Agile
software development methodologies to accelerate and improve the
outcomes of BI initiatives.

-agile methodology - -Aims for customer satisfaction through early and
continuous delivery of useful software components developed by an iterative
process with a design point that uses the bare minimum requirements.

-agile MIS infrastructure - -Includes the hardware, software, and
telecommunications equipment that, when combined, provides the
underlying foundation to support the organization's goals.

-algorithm - -A mathematical formula placed in software that performs an
analysis on a data set.

-ambient digital experience - -A blend of the physical, virtual, and electronic
environments creating a real-time ambient environment that changes as the
user moves from one place to another.

-analysis latency - -The time from which data are made available to the
time when analysis is complete.

-analysis paralysis - -Occurs when the user goes into an emotional state of
over-analysis (or over-thinking) a situation so that a decision or action is
never taken, in effect paralyzing the outcome.

-analysis phase - -Analyzing end-user business requirements and refining
project goals into defined functions and operations of the intended system.

-analytical information - -Encompasses all organizational information, and
its primary purpose is to support the performing of managerial analysis
tasks.

-analytics - -The science of fact-based decision making.

-anomoly detection - -The process of identifying rare or unexpected items
or events in a data set that do not conform to other items in the data set.

-anti-spam policy - -States that email users will not send unsolicited emails
(or spam).

-antivirus software - -Scans and searches hard drives to prevent, detect,
and remove known viruses, adware, and spyware.

, -appliance - -A computer dedicated to a single function, such as a calculator
or computer game.

-application programming interface (API) - -A set of routines, protocols, and
tools for building software applications.

-application service provider license - -Specialty software paid for on a
license basis or per-use basis or usage-based licensing.

-application software - -Used for specific information processing needs,
including payroll, customer relationship management, project management,
training, and many others.

-arithmetic/logic unit (ALU) - -Performs all arithmetic operations (for
example, addition and subtraction) and all logic operations (such as sorting
and comparing numbers).

-artificial intelligence (AI) - -Simulates human intelligence such as the ability
to reason and learn.

-As-Is process model - -Represents the current state of the operation that
has been mapped, without any specific improvements or changes to existing
processes.

-asset - -Anything owned that has value or earning power.

-asset tracking - -Occurs when a company places active or semipassive
RFID tags on expensive products or assets to gather data on the items'
location with little or no manual intervention.

-asynchronous communication - -Communication such as email in which the
message and the response do not occur at the same time.

-attribute - -The data elements associated with an entity.

-augmented reality - -The viewing of the physical world with computer-
generated layers of information added to it.

-authentication - -A method for confirming users' identities.

-authorization - -The process of providing a user with permission including
access levels and abilities such as file access, hours of access, and amount
of allocated storage space.

-automatic vehicle location (AVL) - -Uses GPS tracking to track vehicles.

, -autonomic computing - -A self-managing computing model named after,
and patterned on, the human body's autonomic nervous system.

-autonomous agent - -Software that carries out some set of operations on
behalf of a user or another program with some degree of independence or
autonomy, and employ some knowledge or representation of the user's goals
or desires.

-availability - -Refers to the time frames when the system is operational.

-backup - -An exact copy of a system's information.

-backward integration - -Takes information entered into a given system and
sends it automatically to all upstream systems and processes.

-balance sheet - -Gives an accounting picture of property owned by a
company and of claims against the property on a specific date.

-balanced scorecard - -A management system, in addition to a
measurement system, that enables organizations to clarify their vision and
strategy and translate them into action.

-behavioral analytics - -Uses data about people's behaviors to understand
intent and predict future actions.

-benchmark - -Baseline values the system seeks to attain.

-benchmarking - -The process of continuously measuring system results,
comparing those results to optimal system performance (benchmark values),
and identifying steps and procedures to improve system performance.

-best practices - -The most successful solutions or problem-solving methods
that have been developed by a specific organization or industry.

-big data - -A collection of large, complex data sets, including structured
and unstructured data, which cannot be analyzed using traditional database
methods and tools.

-Big Data as a Service (BDaaS) - -Offers a cloud-based Big Data service to
help organizations analyze massive amounts of data to solve business
dilemmas.

-biological 3D printing - -Includes the printing of skin and organs and is
progressing from theory to reality, however, politicians and the public do not
have a full understanding of the implications.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Victorious23. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $20.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$20.49
  • (0)
  Add to cart