Preview

CGS 3300 exam II

Satisfactory Essays
Open Document
Open Document
439 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CGS 3300 exam II
Exam:
50 questions
5,6,7,8 10 questions from each chapter
First 10 questions of the exam are about fiber linked around the globe (film)
11. What is business intelligence is a broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data
12. What is the goal of information systems, to provide the right information to the right person at the right time in the right format
Chapter 5
Data mining searches 3 things, data bases, data warehouses, and data marts
It can perform two operations; it can predict trends and identify previously unknown patterns
Business intelligence applications OALP (online analytical processing) involves slicing and dicing
How does a business or government agency use business intelligence what are the tools?
Dash board, GIS, reality mining (from your cell phones)
What is GIS and how is it used?
CPM explain how your university could use CPM to find solutions for your campus
It monitors key performance indicators KPI ROI TCO
A manager has 3 roles, interpersonal, informational, and decisional
Structured decisions, unstructured decisions
Code of ethics
Chapter 7 security
What does it take to become a hacker? A little knowledge
50% or more of human error are the causes for security track
Anti-virus first thing you need to do to protect your computer it detects and eliminates the virus
One of the symptoms of a virus is that your computer starts going slow
The anti-virus has a data bank of viruses and checks for the virus
A 0 day virus by definition is a new virus and unknown
Read scada used for cyber terrorism
Supervisory control and data acquisition
How do we know if a website is secure? http has a s the s stands for secure
How many people are involved when you log into your credit card ? you and visa and the company that provides the security the S
The information is encrypted
Threat, risk, vulnerability
What is geo-tagging?> to tag a photo, date, time, size, what you took it with, the

You May Also Find These Documents Helpful

  • Good Essays

    Mcb300 Exam 2

    • 1816 Words
    • 8 Pages

    MCB300 Exam 2 1. Which of the following statements is false? a. ATP synthase is found in all living organisms b. ATP synthase is a redox-driven proton pump c. ATP synthase can use proton motive force (PMF) to drive ATP synthesis d. ATP synthase can hydrolyze ATP to generate proton motive force (PMF) e. The Boyer model describes how rotary motion is used to synthesize ATP in ATP synthase 2. Which of the following is not associated with photosynthesis? a. Use of bacteriorhodopsin as a light-driven proton pump b. Light-driven oxidation of hydrogen sulfide in purple bacteria c. Oxygen production by Prochlorococcus d. Photoautotrophy e. All of the above are associated with photosynthesis 3. Correctly complete the following sentence: Cyclic photophosphorylation…. a. Is catalyzed by photosystem II in oxygenic phototrophs b. Is required to generate electrons for CO2 reduction in green sulfur bacteria c. Does not involve redox reactions d. Is a major source of ATP synthesis in obligately aerobic anoxygenic phototrophs e. Both “b” and “d” correctly complete the sentence 4. Correctly complete the following sentence: Syntrophic bacteria…. a. are required for conversion of biomass to methane and CO2 in methanogenic ecosystems. b. use protons as terminal electron acceptors. c. cannot grow to high density in the absence of methanogens. d. are involved in the sulfate-dependent anaerobic oxidation of methane. e. All of the above correctly complete the sentence 5. Which of the following mechanisms are not used by chemolithotrophs to bring electron donors and acceptors into close proximity? a. Symbiotic associations with eukaryotes. b. Storage of electron acceptors in large vacuoles. c. Movement between zones with high electron donor concentrations and zones with high electron acceptor concentrations. d. Cyclic photophosphorylation e. Both “a” and “d” are true 6. Correctly complete the following sentence: Metal respiration…. a. is often coupled to oxidation of glucose. b. sometimes…

    • 1816 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Agr 3303 Exam 2

    • 2117 Words
    • 9 Pages

    There are 25 questions and each correct response is worth 4 points. Please darken in the circles to spell your last name, FI, and MI and to record your UF ID and test code number. The test code number is located at the bottom of each page of your exam and should be recorded in the spaces provided for questions 76-80. Failure to correctly mark your the test code will result in a grade of 0 for your exam score. Once exams have been graded, your grade will be available through the class website ("exam grades" link). You will need your test code number to access your grade so keep your copy of the exam. Be sure to use a #2 pencil to mark the grade sheet or the computer will not be able to properly grade your exam. Make sure you densely mark the circle corresponding to your choice and make all erasures complete. When you have completed your exam, turn in your scan sheet at the front of the room.…

    • 2117 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    3301 Mkt Exam 2 Questions

    • 2365 Words
    • 10 Pages

    "Wu Chen frequently travels to Caracas, Venezuela where the only hotel he will stay at is the Crown Prince Hotel. His level of brand familiarity toward the Crown Prince Hotel is ______ "…

    • 2365 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    COM 100 Exam 1

    • 1961 Words
    • 9 Pages

    You will have 60 minutes to complete the exam from the time it is distributed. You will have ample time to read each test item carefully and respond to each test item thoughtfully. Test items are not intended to be tricky, but rather to assess the depth of your understanding.…

    • 1961 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    information systems while maintaining the accuracy of the information being exchanged. Its goal is to facilitate access to and…

    • 3649 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    To avoid this, users have to avoid untrusted websites and make sure to scan small attachments before opening them. Simply, reliable and trusted programs must be downloaded which are anti-virus and anti-spyware programs in order to prevent viruses. Also, users must install programs which scan a computer to detect viruses.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    6) Business intelligence (BI) is a narrow term that refers to specific architectures, tools, databases, analytical tools, applications, and methodologies.…

    • 2350 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Business Intelligence refers to computer-based techniques used in identifying, extracting and analyzing business data, such as sales revenue by products and/or departments, or by associated costs and incomes.…

    • 4568 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Business Intelligence (BI) is defined by IBM as, “the discipline that combines services, applications and technologies to gather, manage and analyze data, transforming it into usable information to develop insight and understanding needed to make informed decisions.” (IBM.com, 2006) In its most basic form, BI is an umbrella principle that synergizes the core understanding of your business, including all of its facets, and acting on what that foundation is made up of.…

    • 1501 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Malware includes computer viruses, computer worms, ransomware, Trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. The majority of active malware threats are usually trojans or worms rather than viruses. Malware such as trojan horses and worms is sometimes confused with viruses, which are technically different: a worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a trojan horse is a program that appears harmless but hides malicious functions. Worms and trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.…

    • 4916 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Antivirus Programs

    • 299 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer virus found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Antivirus Programs

    • 333 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    How to Crack a Website

    • 1306 Words
    • 6 Pages

    Install anti-virus software and ensure that it 's regularly updated - this is of the utmost importance. Many times I have come across people who believe that because an anti-virus program is installed, they are protected, yet the last time the virus data file was…

    • 1306 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Antivirus

    • 322 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types, of removable media inserted in the computer (Karanos 201-205).…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Business intelligence is a technology driven procedure for analyzing information and displaying significant data to help corporate administrators, business chiefs and other clients to make more informed business decisions. The process of taking substantial measures of data, examining that data, displaying a high level set of reports that gather the essence of that data into the premise of business activities, and empowering administrations to settle on major day by day business choices. BI as way and system for enhancing business performance by giving capable assists for executives to empower them to have actionable data at hand. BI tools are seen as technology that change the productivity of business operation by giving an expanded worth to the endeavor information and consequently the way this data is used. (Ranjan, 2007)…

    • 2154 Words
    • 7 Pages
    Better Essays