Preview

CGS 3300 exam II

Satisfactory Essays
Open Document
Open Document
439 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CGS 3300 exam II
Exam:
50 questions
5,6,7,8 10 questions from each chapter
First 10 questions of the exam are about fiber linked around the globe (film)
11. What is business intelligence is a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data
12. What is the goal of information systems, to provide the right information to the right person at the right time in the right format
Chapter 5
Data mining searches 3 things, data bases, data warehouses, and data marts
It can perform two operations; it can predict trends and identify previously unknown patterns
Business intelligence applications OALP (online analytical processing) involves slicing and dicing
How does a business or government agency use business intelligence what are the tools?
Dash board, GIS, reality mining (from your cell phones)
What is GIS and how is it used?
CPM explain how your university could use CPM to find solutions for your campus
It monitors key performance indicators KPI ROI TCO
A manager has 3 roles, interpersonal, informational, and decisional
Structured decisions, unstructured decisions
Code of ethics
Chapter 7 security
What does it take to become a hacker? A little knowledge
50% or more of human error are the causes for security track
Anti-virus first thing you need to do to protect your computer it detects and eliminates the virus
One of the symptoms of a virus is that your computer starts going slow
The anti-virus has a data bank of viruses and checks for the virus
A 0 day virus by definition is a new virus and unknown
Read scada used for cyber terrorism
Supervisory control and data acquisition
How do we know if a website is secure? http has a s the s stands for secure
How many people are involved when you log into your credit card ? you and visa and the company that provides the security the S
The information is encrypted
Threat, risk, vulnerability
What is geo-tagging?> to tag a photo, date, time, size, what you took it with, the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    MUS 354 exam 2 c

    • 1247 Words
    • 9 Pages

    In April of 1979, a U.S. court finds the Beatle 's former manager _________ guilty of tax evasion and he is sentenced to serve two months of a two-year sentence in prison.…

    • 1247 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Mcb300 Exam 2

    • 1816 Words
    • 8 Pages

    MCB300 Exam 2 1. Which of the following statements is false? a. ATP synthase is found in all living organisms b. ATP synthase is a redox-driven proton pump c. ATP synthase can use proton motive force (PMF) to drive ATP synthesis d. ATP synthase can hydrolyze ATP to generate proton motive force (PMF) e. The Boyer model describes how rotary motion is used to synthesize ATP in ATP synthase 2. Which of the following is not associated with photosynthesis? a. Use of bacteriorhodopsin as a light-driven proton pump b. Light-driven oxidation of hydrogen sulfide in purple bacteria c. Oxygen production by Prochlorococcus d. Photoautotrophy e. All of the above are associated with photosynthesis 3. Correctly complete the following sentence: Cyclic photophosphorylation…. a. Is catalyzed by photosystem II in oxygenic phototrophs b. Is required to generate electrons for CO2 reduction in green sulfur bacteria c. Does not involve redox reactions d. Is a major source of ATP synthesis in obligately aerobic anoxygenic phototrophs e. Both “b” and “d” correctly complete the sentence 4. Correctly complete the following sentence: Syntrophic bacteria…. a. are required for conversion of biomass to methane and CO2 in methanogenic ecosystems. b. use protons as terminal electron acceptors. c. cannot grow to high density in the absence of methanogens. d. are involved in the sulfate-dependent anaerobic oxidation of methane. e. All of the above correctly complete the sentence 5. Which of the following mechanisms are not used by chemolithotrophs to bring electron donors and acceptors into close proximity? a. Symbiotic associations with eukaryotes. b. Storage of electron acceptors in large vacuoles. c. Movement between zones with high electron donor concentrations and zones with high electron acceptor concentrations. d. Cyclic photophosphorylation e. Both “a” and “d” are true 6. Correctly complete the following sentence: Metal respiration…. a. is often coupled to oxidation of glucose. b. sometimes…

    • 1816 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    3301 Mkt Exam 2 Questions

    • 2365 Words
    • 10 Pages

    "Wu Chen frequently travels to Caracas, Venezuela where the only hotel he will stay at is the Crown Prince Hotel. His level of brand familiarity toward the Crown Prince Hotel is ______ "…

    • 2365 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ACC 330 FINAL EXAM 1

    • 537 Words
    • 3 Pages

    6. Determine whether Nathan’s care provider is a dependent and explain why or why not?…

    • 537 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    COM 100 Exam 1

    • 1961 Words
    • 9 Pages

    You will have 60 minutes to complete the exam from the time it is distributed. You will have ample time to read each test item carefully and respond to each test item thoughtfully. Test items are not intended to be tricky, but rather to assess the depth of your understanding.…

    • 1961 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    First off, why do we need a business intelligence system for our business? Simply put, an effective business intelligence system can help us streamline almost any aspect of our data management and analysis processes. From organizing daily financial reports and data, to analyzing and predicting market trends, to new business development, a business intelligence system can provide all of these functions and more. The key is clearly defining our focus. To do this, we need to decide what data is most important to us; specifically, what data, if managed in more detail, will help our business reach its goals. Once we have defined our area of interest, we can begin investigating the specific business intelligence software and applications that will apply. Additionally, we also need to look at the acquisition of this business intelligence system from a financial standpoint. How much will this system cost us up front, and how much will it cost us over time in software upgrades and patches? Are the financial costs of the system an acceptable trade-off with the expected long-term business growth and profits which the system should help in providing? Finally, how will this system integrate with our already existing business intelligence systems? Will we need to completely overhaul our IT architecture to install a new intelligence…

    • 1420 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    6) Business intelligence (BI) is a narrow term that refers to specific architectures, tools, databases, analytical tools, applications, and methodologies.…

    • 2350 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Business Intelligence refers to computer-based techniques used in identifying, extracting and analyzing business data, such as sales revenue by products and/or departments, or by associated costs and incomes.…

    • 4568 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Business Intelligence (BI) is defined by IBM as, “the discipline that combines services, applications and technologies to gather, manage and analyze data, transforming it into usable information to develop insight and understanding needed to make informed decisions.” (IBM.com, 2006) In its most basic form, BI is an umbrella principle that synergizes the core understanding of your business, including all of its facets, and acting on what that foundation is made up of.…

    • 1501 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Malware includes computer viruses, computer worms, ransomware, Trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. The majority of active malware threats are usually trojans or worms rather than viruses. Malware such as trojan horses and worms is sometimes confused with viruses, which are technically different: a worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a trojan horse is a program that appears harmless but hides malicious functions. Worms and trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.…

    • 4916 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    Business intelligence is a technology driven procedure for analyzing information and displaying significant data to help corporate administrators, business chiefs and other clients to make more informed business decisions. The process of taking substantial measures of data, examining that data, displaying a high level set of reports that gather the essence of that data into the premise of business activities, and empowering administrations to settle on major day by day business choices. BI as way and system for enhancing business performance by giving capable assists for executives to empower them to have actionable data at hand. BI tools are seen as technology that change the productivity of business operation by giving an expanded worth to the endeavor information and consequently the way this data is used. (Ranjan, 2007)…

    • 2154 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Antivirus Programs

    • 299 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer virus found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Antivirus Programs

    • 333 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    How to Crack a Website

    • 1306 Words
    • 6 Pages

    Install anti-virus software and ensure that it 's regularly updated - this is of the utmost importance. Many times I have come across people who believe that because an anti-virus program is installed, they are protected, yet the last time the virus data file was…

    • 1306 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Antivirus

    • 322 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types, of removable media inserted in the computer (Karanos 201-205).…

    • 322 Words
    • 2 Pages
    Satisfactory Essays