TECHNOLOGY MANAGEMENT
ESSENTIALS Question and answers
rated A+
Hardware - correct answer ✔Programs that automatically display or
download advertising to a computer.
Application Software - correct answer ✔Software that is designed for the
user to carry out a specific task.
Best Practice - correct answer ✔A management process, technique, or
method that is most effective at arriving at a desired outcome or a better
outcome than any other process, technique, or method.
Big Data - correct answer ✔Data that is collected from all over the internet,
including smartphone metadata, internet usage records, social media activity,
computer usage records, and countless other data sources.
Bus Topology - correct answer ✔A network topology sometimes called a
linear bus, where each of a network's nodes is connected to a common linear
backbone that has two endpoints.
Business Analytics - correct answer ✔Attempts to make connections
between data so organizations can try to predict future trends that may give
them a competitive advantage.
Business Intelligence (BI - correct answer ✔Strategies and technologies
used by enterprises for the data analysis of business information.
,Cache - correct answer ✔A hardware or software component that stores
data so that future requests for that data can be served faster.
Campus Area Network (CAN) - correct answer ✔A computer network that
connects two or more LANs that are located on a campus.
Chief Information Officer (CIO) - correct answer ✔A job title for the board-
level head of an information technology department within a business
organization. The CIO's job is to make sure IT assets are in place to ensure a
smooth transition.
Chief Information Security Officer (CISO) - correct answer ✔The CISO is
generally focused on the security of an organization's data and information,
making sure it is backed up, deciding who gets to see it and who does not,
and so on.
Chief Security Officer (CSO) - correct answer ✔A CSO is in charge of such
things as the physical security and safety of employees, facilities, and
corporate assets and may have a law enforcement background.
Chief Technology Officers (CTO) - correct answer ✔The CTO runs the
organization's IT engineering group and serves as the company's top
technology architect.
Click Fraud - correct answer ✔An internet fraud scheme that automatically
passes a user to an advertiser, whether they had any intention of visiting or
not, in order to collect a per-click fee.
Clients - correct answer ✔An end user's computer in a computer network.
,Computer Network - correct answer ✔Two or more computers connected
together to communicate and share resources.
Cybersecurity - correct answer ✔The convergence of technologies, sound
practice, and processes designed to protect networks and their devices,
programs, and data from attack or unauthorized access.
Data Analysis - correct answer ✔The application of statistics and logic
techniques to define, illustrate, and evaluate data.
Data Management (DM) - correct answer ✔The practices, architectural
techniques, and tools for achieving consistent access to and delivery of data
across the spectrum of data subject areas and data structure types in the
enterprise.
Data Management Processes - correct answer ✔The process of acquiring
data, making sure the data are valid, and then storing and processing the data
into usable information for a business.
Data Mapping - correct answer ✔Extra notes about the definition of a field,
its data, and its use
Data Mining - correct answer ✔The examination of huge sets of data to find
patterns and connections and identify outliers and hidden relationships.
Databases - correct answer ✔Well-thought-out collections of computer files,
the most important of which are called tables.
, Database Administrators (DBAs) - correct answer ✔DBAs categorize data
requirements and create the database entities and models that ensure
accurate and smooth-flowing information throughout a business.
Database Management System Software (DBMS) - correct answer ✔An
application software that is used to create a collection of related files that
consist of records of data separated by fields that can be queried to produce
populations of information.
Default-allow Firewall Rule - correct answer ✔A rule that all traffic is allowed
unless it has been specifically blocked.
Default-deny Firewall Rule - correct answer ✔The only network connections
that are permitted are the ones that have been explicitly allowed.
Denial-of-service - correct answer ✔An attempt to make a computer or any
of its resources unavailable to its intended users.
Disk Storage - correct answer ✔Nonvolatile, secondary storage on a
physical device like a hard drive or optical disk with a read/write apparatus.
Ethernet Card - correct answer ✔Provides the computer with a unique 48-bit
address called a MAC (media access control) address. No two Ethernet cards
have the same address.
Extract, Transform, and Load - correct answer ✔Tools that are used to
standardize data across systems and allow the data to be queried.