Information Technology Management WGU C954
Information Technology Management WGU C954
information age - ANSWERA time when infinite quantities of facts are widely available
to anyone who can use a computer
data aggregation - ANSWERThe collection of data from various sources for the purpose
of data processing
structured data - ANSWERdata that has defined length, type and format and includes
numbers, dates, or strings such as Customer Address
ambient digital experience - ANSWERa blend of the physical, virtual, and electronic
environments creating a real-time ambient environment that changes as the user moves
form one place to another
Internet of Everything (IoE) - ANSWERa concept that extends the Internet of Things
(IoT) emphasis on machine-to-machine communications to describe a more complex
system that also encompasses people and processes
value-added - ANSWERthe term used to describe the difference between the cost of
inputs and the value of price of outputs
operational planning and control (OP&C) - ANSWERdeals with the day to day
procedures for performing work, including scheduling, inventory, and process
management
six sigma quality - ANSWERthe goal is to detect potential problems to prevent their
occurrence and achieve no more than 3.4 defects per million opportunities
malcolm baldric national quality awards - ANSWER1987 U.S. standard awarding quality
awards in seven key areas: leadership, strategic planning, customer/market focus,
information and analysis, human resources focus, process management, and business
results
cloud fabric controller - ANSWERan individual who monitors and provisions cloud
resources similar to a server administrator at an individual company
cloud fabric - ANSWERthe software that makes the benefits of cloud computing
possible
hybrid cloud - ANSWERincludes two or more private, public, or community clouds, but
each cloud remains separate and is only linked by technology that enables data and
application portability
cloud bursting - ANSWERwhen a company uses its own computing infrastructure for
normal usage and accesses the cloud when it needs to sale for high/peak load
requirements, ensuring a sudden spike in usage does not result in poor performance or
system crashes
enterprise architecture - ANSWERa process for how an organization will build, deploy,
use, and share its data, processes, and MIS assets
transborder data flows (TDF) - ANSWERwhen business data flows across international
boundaries over the telecommunications networks of global information systems
carbon emission - ANSWERincludes the carbon dioxide & carbon monoxide in the
atmosphere produced by processes and systems
private cloud - ANSWERserves only one customer or organization and can be located
on the customer's premises or off premises
big data as a service (BDaaS) - ANSWERoffers cloud-based big data service to help
organizations analyze massive amounts of data to solve business dilemmas
child online protection act (COPA) - ANSWERa law that protects minors from accessing
inappropriate material on the internet
fair information practices - ANSWERa general term for a set of standards governing the
collection and use of personal data and addressing issues of privacy and accuracy
acceptable use policy (AUP) - ANSWERa policy that a user must agree to follow in
order to be provided access to a network or to the internet
mail bomb - ANSWERa massive amount email to a specific person or system that can
cause that user's server to stop functioning
mis infrastructure - ANSWERincludes the plans for how a firm will build, deploy, use,
and share its data, processes, and mis assets
client - ANSWERcomputer that is designed yo request information from a server
failover - ANSWERoccurs when redundant storage server offers an exact replica of the
real time data, and if the primary server crashes, the users are automatically directed to
the secondary server or backup server
failback - ANSWERoccurs when the privy machine recovers and resumes operations,
taking over from the secondary server
hot site - ANSWERa separate and fully equipped facility where the company can move
immediately after a disaster and resume business
cold site - ANSWERa separate facility that does not have any computer equipment, but
is a place where employees can move after a disaster
warm site - ANSWERa separate facility with computer equipment that requires
installation and configuration
disaster recovery cost curve - ANSWERcharts the cost to the organization of the
unavailability of information and technology AND the cost of recovering from a disaster
over time
serviceability - ANSWERhow quickly a third party vendor can change system to ensure
it meets user needs and the terms of any contracts, including agreed levels of reliability,
maintainability, or availability
pretexting - ANSWERa form of social engineering in which one individual lies to obtain
confidential data about another individual
information security plan - ANSWERdetails how an org will implement the information
security policies
spear phishing - ANSWERa phishing expedition in which emails are carefully designed
to target a particular person or organization
vishing (voice phishing) - ANSWERscam involving defraud by asking to call bogus
number to confirm their account information
pharming attack - ANSWERuses zombie farm, to launch massive phishing attack (often
used by organized crime)
zombie farm - ANSWERa group of computers on which a hackers have planted zombie
programs
smart card - ANSWERcard with embedded technologies that can store information and
small amounts of software to perform some limited processing
time bombs - ANSWERcomputer viruses that wait for a specific date before executing
instructions
advanced encryption standard (AES) - ANSWERintroduced by the national institute of
standards and technology (NIST), an encryption standard designed to keep government
information secure
publicly encryption (PKE) - ANSWERsystem using two keys: a public key for everyone
and a private key for only the recipient
certificate authority - ANSWERa trusted third party that validates user identities by
means of digital certificates (VeriSign)
digital certificate - ANSWERa data file that identifies individuals or organizations online
and is comparable to a digital signature
intrusion detection software - ANSWERfeatures full-time monitoring tools that search for
patterns in network traffic to identify intruders
patent - ANSWERan exclusive right to make, use, and sell an invention granted by a
government to the inventor
worm - ANSWERspreads itself not only form file to file but form computer to computer
spyware - ANSWERa special class of adware that collects user data and transmits it
without user knowledge or permission
kill switch - ANSWERtrigger that enables project manager to close project prior to
completion
critical path - ANSWERestimates shortest path through the project ensuring all critical
tasks are completed from start to finish
gantt chart - ANSWERa simple bar chart that lists project tasks vertically against the
projects timeframe, listed horizontally
communication plan - ANSWERdefines how, what, when and who regarding the flow of
project information to stakeholders and is key for managing expectations
executive sponsor - ANSWERthe person or group who provides the financial resources
for the project
project management office (PMO) - ANSWERan internal dept that oversees all
organix=zational projects
project objective - ANSWERquantifiable criteria that must be met for the project to be
considered a success
SOA service - ANSWERa business task, such as checking a potential customers credit
rating when opening a new account
systems development life cycle (SDLC) - ANSWERoverall process for developing info
systems from planning and analysis through implementation and maintenance
computer aided software engineering (CASE) - ANSWERtools are software suites that
automate systems analysis, design, and development
control objectives for information and related technologies (COBIT) - ANSWERa set of
best practices that helps an organization to maximize the benefits of an information
system, while at the same time establishing appropriate controls to ensure minimum
errors
test condition - ANSWERthe detailed steps the system must perform along with the
expected results each step
supply chain design - ANSWERdetermines how to structure a supply chain including the
product, selection of partners, the location and capacity of warehouses, transportation
methods, and supporting management information systems
supply chain visibility - ANSWERthe ability to view all areas up and down the supply
chaining real time
electronic data interchange (EDI) - ANSWERa standard format for the electronic
exchange of information between supply chain participants
procurement - ANSWERthe purchasing of goods and services to meet the needs of the
supply chain
cradle to grave - ANSWERprovides logistics support throughout the entire system or life
of the product
chief information officer (CIO) - ANSWERoversees all uses of IT and ensures the
strategic alignment of MIS with business goals and objectives
chief data officer - ANSWERdetermines types of information the enterprise will capture,
retain, analyze, and share
chief privacy officer (CPO) - ANSWERensures the ethical and legal use of information
within an organization
chief security officer (CSO) - ANSWERensures security of MIS systems and developing
strategies and MIS safeguards against attacks from hackers and viruses
chief user experience officer - ANSWERcreates the optimal relationship between user
and technology
MIS skills gap - ANSWERdifference between existing MIS workplace knowledge and
that required to fulfill the business goals and strategies
business process model and notation (BPMN) - ANSWERa graphical notation that
depicts the steps in a business process
as-is process model - ANSWERrepresents the current state of the operation that has
been mapped, without any specific improvements or changes to existing processes
swimlane diagram - ANSWERdocuments the steps or activities of a workflow by
grouping activities into swim lanes, which are horizontal or vertical columns containing
all associated activities for that category or department
porter's five forces model - ANSWERanalyzes the competitive forces within the
environment in which a company operates to assess the potential for profitability in an
industry
buyer power - ANSWERthe ability of buyers to affect the price they must pay for an item
porter's three generic strategies - ANSWERgeneric business strategies that are neither
organization nor industry specific and can be applied to any business, product, or
service
business process - ANSWERa standardized set of activities that accomplish a specific
task, such as processing a customer's order
support value activities - ANSWERfound along the top of the value chain and includes
business processes, such as firm infrastructure, human resource management,
technology development, and procurement that support the primary value activities
primary value activities - ANSWERfound at the bottom of the value chain, these include
business processes that acquire raw materials and manufacture, deliver, market, sell,
and provide after sales services
web 2.0 (business 2.0) - ANSWERthe next generation of internet use, a more mature,
distinctive communications platform characterized by new qualities such as
collaboration, sharing, and free
open source - ANSWERsoftware whose source code is made available free for any
third party to review and modify
social media - ANSWERrefers to websites that rely on user participation and user
contributed content
real simple syndication (RSS) - ANSWERa web format used to publish frequently
updated works, such as blogs, news headlines, audio, and video, in a standardized
format
wiki - ANSWERa type of collaborative web page that allows users to add, remove, and
change content, which can be easily organized and reorganized as required
mashup editor - ANSWERwysiwyg for mashups that provide a visual interface to build a
mashup, often allowing the user to drag and drop data points into a web application
mashup - ANSWERa website or web application that uses content form more than one
source to create a completely new product or service
application program interface (API) - ANSWERa set of routines, protocols, and tools for
building software applications
semantic web - ANSWERa component of web 3.0 that describes things in a way that
computers can understand
information architecture - ANSWERthe set of ideas about how all information in a given
context should be organized
middleware - ANSWERseveral different types of software that sit in the middle of and
provide connectivity between two or more software applications
enterprise application integration (EAI) middleware - ANSWERpackages together
commonly used functionality whites reduces time to develop solutions that integrate
applications from multiple vendors
software as a service (SaaS) - ANSWERdelivers applications over the cloud using pay
per use revenue model
hybrid ERP - ANSWERsplits ERP functions between on-premises ERP system and one
or more functions handled as SaaS in the cloud
customer service and support (CSS) - ANSWERa part of the operational CRM that
automates service requests, complaints, product returns, and information requests
sales force automation (SFA) - ANSWERautomatically tracks all steps of the sales
process
uplift modeling - ANSWERa form of predictive analytics for marketing campaigns that
attempts to identify target markets or people who could be convinced to buy products
supplier relationship management (SRM) - ANSWERfocuses on keeping suppliers
satisfied by evaluating and categorizing suppliers for different projects, which optimizes
supplier selection
transaction processing system (TPS) - ANSWERthe basic business system that serves
the operational level (analysts) in an org
source document - ANSWERdescribes the original transaction record along with details
such as date, purpose, amount, cash receipts, canceled CDs, invoices, refunds, time
sheet, etc.
sensitivity analysis - ANSWERstudy of the impact on other variables when one variable
is changed repeatedly
artificial neural network - ANSWERa category of AI that attempts to emulate the way a
human brain works
genetic algorithm - ANSWERan AI system that mimics the evolutionary survival of the
fittest process to generate increasingly better solutions to a problem
intelligent agent - ANSWERa special purpose knowledge based info system that
accomplishes specific tasks on behalf of its users
wireless LAN (WLAN) - ANSWERlocal area wireless network transmitting signals over a
few hundred feet
wireless MAN (WMAN) - ANSWERa metro area network that uses radio signals to
transmit and receive data
wireless WAN (WWAN) - ANSWERa wide area network that uses radio signals to
transmit and receive data
wi-fi protected access (WPA) - ANSWERa wireless security protocol to protect wi-fi
networks
war chalking - ANSWERthe practice of tagging pavement with codes displaying where
wi-fi access is available
RFID tag - ANSWERan electronic device that is made up of a chip and antennae;
passive no power source, active, own battery
asset tracking - ANSWERoccurs when a company places active or semi passive RFID
tags on expensive products or assets to gather data on the items' location with little or
no manual intervention
geocache - ANSWERa GPS technology adventure game that posts on the internet the
latitude and longitude location of an item for users to find
edge matching (warping, rubber sheeting) - ANSWERoccurs when paper maps are laid
edge to edge, items that run across maps but do not match are reconfigured to match
wide area network (WAN) - ANSWERspans a large geographical area like a state,
province, or country
metropolitan area network (MAN) - ANSWERlarge computer network that spans a city
peer-to-peer (P2P) network - ANSWERa computer network that relies on the computing
power and bandwidth of the participants in the network rather than a centralized server
client/server network - ANSWERa model for applications in which the bulk of the back-
end processing, such as performing a physical search of a database, takes place on the
server, while the front-end processing, which involves communicating with the users, is
handled with the clients
packet switching - ANSWERoccurs when the sending computer divides a message into
a number of efficiently sized units called packets, each of which contains the address of
the destination computer
router - ANSWERan intelligent connecting device that examines each packet of data it
receives and then decides which way to send it onward toward its destination
protocol - ANSWERa standard that specifies the format of data as well as the rules to
be followed during transmission
ethernet - ANSWERa physical and data layer technology for LAN networking
network transmission media - ANSWERvarious types of media used to carry the signal
between computers
twisted pair cable - ANSWERa type of cable composed of four (or more) copper wise
twisted around each other within a plastic sheath
coaxial cable - ANSWERable that can carry a wide range of frequencies with low signal
loss
wireless media - ANSWERnatural parts of the earth's environment that can be used as
physical paths to carry electronic signals
software - ANSWERthe set of instructions that the hardware excites to carry out specific
tasks
control unit - ANSWERinterprets software instructions and literally tells the other
hardware devices what to do, based on said instructions
arithmetic/logic unit (ALU) - ANSWERperforms all arithmetic operations and all logic
operations (sorting, comparing numbers)
complex instruction set chip (CISC) - ANSWERtype of CPU that can recognize as many
as 100 or more instructions, enough to carry out most computations directly
reduced instruction set computer chip (RISC) - ANSWERlimits number of instructions
the CPU can execute to increase processing speed
cache memory - ANSWERsmall unit of ultra-fast memory that is used to store recently
accessed or frequently accessed data so that the CPU does not have to retrieve this
data from slower memory circuits like RAM
read only memory (ROM) - ANSWERthe portion of a computer's primary storage that
does not lose its contents when one switches off the power
flash memory - ANSWERspecial type of rewritable read-only (ROM) that is compact and
portable
hard drive - ANSWERsecondary storage medium that uses several rigid discs coated
with a magnetically sensitive material and housed together with the recording heads in a
hermetically sealed mechanism
solid state drive - ANSWERan all electronic storage device that is an alternative to a
hard disk and is faster than hard disks due to zero latency (no read/write head to move)
control panel - ANSWERwindows feature that provides a group of options that set
default values for the windows operating system
safe mode - ANSWERoccurs if the system is failing and will load only the most essential
parts of the operating system and will not run many of the background operating utilities
application software - ANSWERused for specific info processing needs like payroll,
CRM, project management, training, etc.
network user license - ANSWERallows anyone on the network to install and use
software
site license - ANSWERenables any qualified users within the org to install software,
regardless of whether the unit is on a network
limited liability - ANSWERshareholders (owners) not personally liable for the losses
incurred by the corporation
limited liability corporation (LLC) - ANSWERhybrid entity that has the legal protections
of a corporation and the ability to be taxed (one time) partnership
solvency - ANSWERrepresents the ability of the business to pay its bills and service its
debt
income statement - ANSWERreports operating results (rev - exp) for a given time period
ending at a specified date
finance - ANSWERdeals with the strategic financial issues associated with increasing
the value of the business while observing applicable laws and social responsibilities
marketing mix - ANSWERincludes the variables that marketing managers can control in
order to best satisfy customers in the target market
data mining - ANSWERprocess of analyzing data to extract info not offered by raw data
alone
data profiling - ANSWERprocess of collecting stats and info about data in an existing
source
outlier - ANSWERdata value that is numerically distant from most of the other data
points in a set of data
fast data - ANSWERapplication of big data analytics to smaller data sets in near-real-
time, real-time time in order to solve a problem or creative business value
data artist - ANSWERbusiness analytics specialist who uses visual tools to help people
understand complex data
data visualization - ANSWERallows users to see data transform info into a business
perspective
optimization model - ANSWERstatistical process that finds the way to make a design,
system, or decision as effective as possible
analysis latency - ANSWERthe time from which data are made available to the time
when analysis is complete
decision latency - ANSWERthe time it takes a human to comprehend the analytic result
and determine an appropriate action
data lake - ANSWERstorage repository that holds vast amount of raw data until it is
needed
data gap analysis - ANSWERoccurs when a company examines its data to determine if
it can meet business expectations
data model - ANSWERlogical data structures that detail the relationships among data
elements using graphics or pictures
relational database model - ANSWERtype of database that stores info in the form of
logically related two dimensional tables
primary key - ANSWERa field (or group of fields) that uniquely identifies a given entity in
a table
foreign key - ANSWERprimary key of one table that appears as an attribute in another
table and acts to provide a logical relationship between the two tables
relational integrity constraint - ANSWERrules that enforce basic and fundamental info
based constraints
business critical integrity constraint - ANSWERenforces business rules vital to an
organization's success and often requires more insight and knowledge than a relational
integrity constraints
identity management - ANSWERa broad administrative area that deals with identifying
individuals in a system (such as a country, a network, or an enterprise) and controlling
their access to resources within that system by associating user rights and restrictions
with the established identity
data driven website - ANSWERinteractive website kept constantly updated and relevant
to the needs of its customers through the use of a database
static information - ANSWERincludes fixed data that are not capable of change in the
event of a user action
dynamic catalog - ANSWERan area of a website that stores information about products
in a database
forward integration - ANSWERtakes info entered into a given system and sends it
automatically to all downstream systems and processes
data dictionary - ANSWERcompiles all of the metadata about the data elements in the
data model
systems thinking - ANSWERa way of monitoring the entire system by viewing multiple
inputs being processed or transformed to produce outputs while continuously gathering
feedback on each part
social media ethics policy (socially communicate) - ANSWERIT ethics policy protects a
company by outlining the corporate guidelines or principles governing online
communication
acceptable use - ANSWERIT ethics policy requiring a user to agree to follow a policy
that indicates requirements for corporate email use, info systems, and the internet
social media (posting info about company) - ANSWERIT ethics policy providing
employee guidance about posting info regarding the org on websites
world future society - ANSWERtime will become one of the most precious commodities
online transaction processing system - ANSWERtool used to capture event info needed
for processing newly updated info
customer order cycle - ANSWERagreed upon time between the purchase and delivery
of a product
PERT chart - ANSWERused by project lead to identify the project's critical path
distance - ANSWERprimary distinction between nearshore and offshore outsourcing
development phase (SLDC) - ANSWERbuild tech architecture, build the database, build
applications