This site is 100% ad supported. Please add an exception to adblock for this site.

k201final

Terms

undefined, object
copy deck
Electronic_____ is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards.
Tagging
IT ______ is the hardware, software, and telecommunications equipment that when combined, provide the underlying foundatioin to support the organization's goals.
Infrastructure
______ is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations.
Telematics
RFID uses _____ or passive tags in the form of chips or smart labels.
Active
Angola is one of the countries that is expected to have one of the largest increases in population between 2000 and ______
2050
Medical knowledge is ______ every eight years.
Doubling
The global economy is becoming more ______.
Integrated
The growth in information industries is creating a knowlege-______global society
Dependent
The world's population is expected to double over the next _______ years.
40
Digital ink refers to technology that digitally represents _________ in its natural form.
Handwriting
Digital ink, digital paper, autonomic comuter, _______, and alternative energy sources are the technologies discussed in the text as having the potential to change our world, our future, and our lives.
Teleliving
_____ is a dynamic high-resolution electronic display that combines a paperlike reading experience with the ability to access information anytime, anywhere.
Radiopaper
All of today's technical knowledge will represent only _______ percent of the knowledge that will be available in 2050.
One
Autonomic computing is a(n) _______ computing model named after, and patterned on, the human body's autonomic nervous system.
Self-managing
Digital paper is any paper that is optimized for any type of _______ printing.
Digital
Computer ______ occurs when a complex system, such as the U.S. economy, is modeled by means of mathematical equations and different scenarios are run against the model to determine "what-if" analysis.
Simulation
The study of historical events in order to anticipate the outcome of current developments is called _______ analysis.
Historical
Trend _________ is the examination of a trend to identify its natures, causes, speed of development, and potential impacts.
Analysis
Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers is known as trend _________.
Monitoring
When numerical data are available, a trend can be plotted to display changes through time and into the future is known as trend _______
Projection
Businesses typically outsource their _______ business functions, such as payroll and IT.
Noncore
Contract length, competitive edge, _______, and scope definition are the four primary challenges for outsourcing.
Confidentiallity
Organizations should look at three things when evaluating an outsourcing country including geopolitical risk, English proficiency, and ______.
Salary
________ outsourcing refers to contracting an outsourcing arrangement with a company in a nearby country.
Nearshore
Information security ______ identify the rules required to maintain information security.
Policies
_______ security is a broad term encompassing the protection of information from accidental or misuse by persons inside or outside an organization.
Information
A information security _____ details how an organization will implement the information security policies
Plan
Develop the information security policies is the _______ step for creating an information security plan.
First
Obtain _______ support is the last step for creating an information security plan.
Stakeholder
Content filtering, _______, and firewalls are the three types of prevention and resistance technologies.
Encryption
The most common type of defense within detection and response technologies is _______ software.
Antivirus
Tokens are small electronic devices that change user passwords ________.
Automatically
Social engineering is using one's ______ skills to trick people into revealing access credentials or other information valuable to to the attacker.
Social
Smart card is a _______ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
Device
Intrusion detection software searches out patterns in information and network traffic to indicate _________ and quickly respond to prevent any harm.
Attacks
______ Filtering occurs when an organization uses software that filters content to prevent the transmission of unautorized information.
Content
_______ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
Dumpster
_______ is the identification of a user based on a physical characteristic.
Biometrics
______is a method for confirming users' identities
Authentication

Deck Info

39

bwworrel

permalink