| Term 
 
        | According to Norton, cybercrime is: |  | Definition 
 
        | committed using a computer, network, or hardware device |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | the fraudulent use of someone else’s identity |  | 
        |  | 
        
        | Term 
 
        | What is the proper description of phishing: |  | Definition 
 
        | the attempt of acquiring usernames or passwords of someone’s account |  | 
        |  | 
        
        | Term 
 
        | According to Forbes, companies can protect themselves from cybercrime via: |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the common casual name for the hormone produced in your brain when you experience stress? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Stress is your body's way of ____________________ you |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Stress helps you stay ______________ |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | According to the video, stress drives you to study for an exam when you'd rather be |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | To say goodbye to stress you should |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the three V's associated with Big Data? |  | Definition 
 
        | Velocity, Variety, Volume |  | 
        |  | 
        
        | Term 
 
        | Name two companies in sports using Big Data. |  | Definition 
 
        | SportVU and Catapult Sports |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Customer Relationship Management |  | 
        |  | 
        
        | Term 
 
        | What is Parkinson's Law as it applies to Big Data? |  | Definition 
 
        | Data expands to fill available space |  | 
        |  | 
        
        | Term 
 
        | What is the biggest risk to using Big Data? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Who is Linux named after? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is a characteristic of the Linux operating system? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | According to a April 2013 Forbes article, Apple |  | Definition 
 
        | Took some 45% of all the profits available in the PC business in the last quarter of last year |  | 
        |  | 
        
        | Term 
 
        | Which of the following is not a computer operating system |  | Definition 
 
        | All of the above are a computer operating system |  | 
        |  | 
        
        | Term 
 
        | A characteristic of a Mac operating system would be |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is a major positive of laptop computer technology? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is a major negative of the laptop computer technology? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | One of the major issues when it comes to laptop technology rankings is which of the following? |  | Definition 
 
        | Laptop rankings are subjective |  | 
        |  | 
        
        | Term 
 
        | The correct response to which laptop is best for business functions is which of the following? |  | Definition 
 
        | The laptop that is best for a business is one that matches the type of business and personal preference of the employees |  | 
        |  | 
        
        | Term 
 
        | One of the most important laptop security issues is which of the following? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the Oakland Athletics and "Moneyball" most famous for: |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the difference between Business Analytics and Business Intelligence? |  | Definition 
 
        | usiness analytics helps identify information to use in the future whereas business intelligence helps improve decision making as it relates to the past. |  | 
        |  | 
        
        | Term 
 
        | What are some advantages of using business intelligence? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is true of business analytics? |  | Definition 
 
        | Companies need the buy-in of core team members so that everyone understand the importance of business analytics. |  | 
        |  | 
        
        | Term 
 
        | Which of the following statements about BI, BA, and BPM trends are true? |  | Definition 
 
        | The market grew 7% in 2012 and will grow in the future. |  | 
        |  | 
        
        | Term 
 
        | Which of the following companies is NOT a leader in virtualization technology? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which if the following is NOT one of the ways companies implement virtualization? |  | Definition 
 
        | All of these are ways companies implement virtualization |  | 
        |  | 
        
        | Term 
 
        | Virtualization can be defined as: |  | Definition 
 
        | A technique for hiding the physical characteristics of computing resources from the way in which other systems, applications, or end users interact with those resources |  | 
        |  | 
        
        | Term 
 
        | Where is the future of Virtualization headed? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What sets Citrix apart from other Virtualization companies? |  | Definition 
 
        | It people-oriented culture |  | 
        |  | 
        
        | Term 
 
        | Which of the following are features of virtual reality? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a negative aspect of virtual reality? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following is a new virtual reality device for the future? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the 3 main components of interactivity? |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | Form of technology that creates three-dimensional worlds |  | 
        |  | 
        
        | Term 
 
        | Who is the industry leader in wireless networking technology? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What does RFID stand for? |  | Definition 
 
        | Radio Frequency Identification |  | 
        |  | 
        
        | Term 
 
        | What does VoIP stand for? |  | Definition 
 
        | Voiceover Internet Protocol |  | 
        |  | 
        
        | Term 
 
        | What is the main drawback of wireless networking? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | How does wireless technology relate to the sporting world? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which best describes Search Engine Optimization? |  | Definition 
 
        | Building a website to get the best organic search ranking |  | 
        |  | 
        
        | Term 
 
        | Which one of these is NOT a con of Search Engine Optimization? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Pick the organization out of the following list that successfully implemented Search Engine Optimization according to my presentation. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the two future trends to pay attention to in Search Engine Optimization? |  | Definition 
 
        | Social media and digital assets |  | 
        |  | 
        
        | Term 
 
        | Of the major search engines out there, which two have identical organic search results? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which is a con of personal anti-virus programs? |  | Definition 
 
        | While running a scan, unlikely to be able to do anything else on computer because of its heavy dependence on computer resources |  | 
        |  | 
        
        | Term 
 
        | Which company has the largest anti-virus market share? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which is not one of the five principles of proposed global privacy governance? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which is not considered Malware? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is not one of the three mitigation strategies? |  | Definition 
 | 
        |  |