answers
Artificial Intelligence Ans✓✓✓ Simulates human intelligence such as
the ability to read and learn
- Verbal understanding
- Visual interpretation
- Logical extrapolation
Authentication Ans✓✓✓ A method for confirming users' identity. The
most secure ones involve (defense)
- something the user knows
- something the user has
- something that is part of the user
Authorization Ans✓✓✓ The process of giving someone permission to
do or have something (defense)
Backdoor programs Ans✓✓✓ Viruses that open a way into the network
for future attacks
Black-hat hackers Ans✓✓✓ Break into other people's computer system
and look around or may steal and destroy information
Business facing process Ans✓✓✓ Invisible to the external customer but
essential to the effective management of the business
,Business Intelligence Ans✓✓✓ Information collected from multiple
sources that are analyzed for patterns, trends, and relationships for
strategic decision making
Business process Ans✓✓✓ A standardized set of activities that
accomplish a specific task, such as a specific process
Business Process Model and Notation (BPMN) Ans✓✓✓ The activity
of creating a detailed flowchart or process map of a work process
showing its inputs, tasks, and activities, in a structured sequence
- Event
- Activity
- Gateway
- Flow
Business strategy Ans✓✓✓ A leadership plan that achieves a specific
set of goals or objective such as
- Developing new products or services
- Entering new markets
- Increasing customer loyalty
- Attracting new customers
- Increasing sales
Clickstream data can reveal... Ans✓✓✓ - Number of page views
, - Pattern of websites visited
- Length of stay on a website
- Date and time visited
- Number of customers with shopping carts
- Number of abandoned shopping carts
Closed Source (content sharing) Ans✓✓✓ Program source code that is
kept private, not shared with users to restrict access to functionality,
security features and restrictively shared with vendors and other
developers in order create working devices
Cloud based infrastructure EXAMPLES Ans✓✓✓ - Virtual Machine
(VM) operates at peak performance
- Updates, Maintenance, and Security are maintained by the Service
provider
- The support system identifies a need for more power, turns on and
copies the VM to multiple systems to handle the new load. (No user
interaction needed)
- When the capacity need goes back to normal, the system changes back
to the single node for normal operation
Cloud Elements Ans✓✓✓ - Documents hub
- CRM hub
- Messaging hub
- Service Gub