k201final
Terms
undefined, object
copy deck
- Electronic_____ is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards.
- Tagging
- IT ______ is the hardware, software, and telecommunications equipment that when combined, provide the underlying foundatioin to support the organization's goals.
- Infrastructure
- ______ is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations.
- Telematics
- RFID uses _____ or passive tags in the form of chips or smart labels.
- Active
- Angola is one of the countries that is expected to have one of the largest increases in population between 2000 and ______
- 2050
- Medical knowledge is ______ every eight years.
- Doubling
- The global economy is becoming more ______.
- Integrated
- The growth in information industries is creating a knowlege-______global society
- Dependent
- The world's population is expected to double over the next _______ years.
- 40
- Digital ink refers to technology that digitally represents _________ in its natural form.
- Handwriting
- Digital ink, digital paper, autonomic comuter, _______, and alternative energy sources are the technologies discussed in the text as having the potential to change our world, our future, and our lives.
- Teleliving
- _____ is a dynamic high-resolution electronic display that combines a paperlike reading experience with the ability to access information anytime, anywhere.
- Radiopaper
- All of today's technical knowledge will represent only _______ percent of the knowledge that will be available in 2050.
- One
- Autonomic computing is a(n) _______ computing model named after, and patterned on, the human body's autonomic nervous system.
- Self-managing
- Digital paper is any paper that is optimized for any type of _______ printing.
- Digital
- Computer ______ occurs when a complex system, such as the U.S. economy, is modeled by means of mathematical equations and different scenarios are run against the model to determine "what-if" analysis.
- Simulation
- The study of historical events in order to anticipate the outcome of current developments is called _______ analysis.
- Historical
- Trend _________ is the examination of a trend to identify its natures, causes, speed of development, and potential impacts.
- Analysis
- Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers is known as trend _________.
- Monitoring
- When numerical data are available, a trend can be plotted to display changes through time and into the future is known as trend _______
- Projection
- Businesses typically outsource their _______ business functions, such as payroll and IT.
- Noncore
- Contract length, competitive edge, _______, and scope definition are the four primary challenges for outsourcing.
- Confidentiallity
- Organizations should look at three things when evaluating an outsourcing country including geopolitical risk, English proficiency, and ______.
- Salary
- ________ outsourcing refers to contracting an outsourcing arrangement with a company in a nearby country.
- Nearshore
- Information security ______ identify the rules required to maintain information security.
- Policies
- _______ security is a broad term encompassing the protection of information from accidental or misuse by persons inside or outside an organization.
- Information
- A information security _____ details how an organization will implement the information security policies
- Plan
- Develop the information security policies is the _______ step for creating an information security plan.
- First
- Obtain _______ support is the last step for creating an information security plan.
- Stakeholder
- Content filtering, _______, and firewalls are the three types of prevention and resistance technologies.
- Encryption
- The most common type of defense within detection and response technologies is _______ software.
- Antivirus
- Tokens are small electronic devices that change user passwords ________.
- Automatically
- Social engineering is using one's ______ skills to trick people into revealing access credentials or other information valuable to to the attacker.
- Social
- Smart card is a _______ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
- Device
- Intrusion detection software searches out patterns in information and network traffic to indicate _________ and quickly respond to prevent any harm.
- Attacks
- ______ Filtering occurs when an organization uses software that filters content to prevent the transmission of unautorized information.
- Content
- _______ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
- Dumpster
- _______ is the identification of a user based on a physical characteristic.
- Biometrics
- ______is a method for confirming users' identities
- Authentication