It100 Finals Accumulated Quiz Questions
It100 Finals Accumulated Quiz Questions
o Hacking or malware
FQ1
Which of the following is an example of a
A tactic used to gain physical access by Personal Information Data?
following an authorized person into a secure o routing codes
building, area, or room disguising as delivery o email account name
or repair person. o availability to access systems
o Robbery o assets
o Piggybanking
o Tailgaiting This describes the resources employed to
o Ransacking protect online identity, data, and other assets.
o system failure mitigation
It is an act of stealing a person's possessions or o digital security
personal information from a computer o security
o Information Theft o risk mitigation
o Hardware Theft
o Credit Card Number Theft It is a cyber-attack in which sensitive,
o Software Theft confidential or otherwise protected data has
been accessed and/or disclosed in an
This is an access to an information system or unauthorized fashion.
network that violates the owner or operator's o Unauthorized Access
stated security policy. o Data Breach
o Access Policy o Malware attacks
o Denial of Access o Drive-by Downloads
o Unauthorized Access
o Authentication Override This network attack uses a bombardment and
overwhelming of enterprise servers with
It is any method of verifying a user without fraudulent traffic.
requiring the user to provide a password. o DDOS
Proving the user’s identity can instead be done o MDM
using an alternative factor like a proof of o MITM
possession factor. o DOS
o mobile authenticator
o biometrics They often gain access by exploiting human
o PIN vulnerabilities, convincing other people to hand
o passwordless authentication over credentials or sensitive data.
o Eye-to-eye contact
It is a program that enables users to install o Psychological Manipulation
administrative remoted access on devices o Mental Telepathy
including laptops, phones, to monitor activities o Social Engineering
and perform remote access.
o Access Programs This occurs when malicious parties intercept
o M2M traffic conveyed between networks and external
o MDM data sources or within a network.
o Authentication Management o DOS
o DDOS
Select ALL that apply. Example of data breach. o SQL injections
o Hardware failure o MITM
o Stolen Data
It is a more of an ideology than mere hacker This occurs when software are outdated and can
group that has many similarities to the cause to create a hole that allows an attacker to
infamous hacking collective 'Anonymous'. sneak malware onto a computer and steal data.
o FilTech Philippines o Malware attacks
o LulzSec o Weak passwords
o Gr3ySh4DoW o System Vulnerabilities
o DarkNet Philippines o Drive-by Downloads
A malicious insider partners with an outsider to which of the following is not a human factor in
provide unauthorized access to physical and information security problems.
digital systems. o “No one ever broke into my computer, so
o Door Propping why should I protect it?”
o Collusion o fires and other catastrophe
o Fraudulent Access Cards o ” Well, I can’t be bothered to lock my
o Collision workstation at the computer station while I go
to the bathroom”
This type of data encompasses information on a o stores his password on a piece of paper e.g.,
patient's health including medical history, under his keyboard.
prescription drugs, health insurance, doctors
and hospital visits. This occurs when attackers use spam and
o Information phishing email tactics to trick the user into
o PHI revealing user credentials, downloading
o Data malware attachments, or directing users to
o SCI vulnerables websites.
o System vulnerabilities
It is someone who uses the Internet or network o Cyberterrorism
to destroy o damage computers for political o Hacking
reasons. o Malware attacks
o Cyberspies
o cyberwarfare It is any event or action that could cause a loss
o Cyberextortionist of or damage to computer or mobile device
o cyberterrorists hardware, software, data, information or
processing capability.
Determine which principle should be applied in o Digital Risk
this scenario: A marketing agent must be able o Data Security
to submit his marketing pieces to his supervisor o Data Security Risk
tonight, apparently, e-mail system isn't o Information Theft
responding to requests at that time
o availability This group of people have an excellent
o authentication computer and networking skills and are hired to
o confidentiality break into a specific computer and steal its
o integrity proprietary data and information.
o unethical employees
It is a mean of protecting all information, o corporate spies
systems, services, and data communications o crackers
appropriately. o script kiddie
o Information Security
o Data security
o insecurity
o information overload
This network attack uses submitting of
malicious codes to compromise the network to Describes an attack whose goal ranges from
access sensitive information such as user disabling a government’s computer network to
passwords. crippling a country.
o DOS o cyberwarfare
o DDOS o cyberextortionists
o MITM o cyberterrorists
o SQL injections o espionage
This principle means that data and systems Which of the following is NOT a digital
should only be used by persons who are security risk.
authorized to use them and not allowing o system login
outsiders the possibility to change or destroy o system failure
data or any access to them at all. o unauthorized access
o integrity o hardware theft
o confidentiality
o availability A type of an unauthorized access tactic that
o responsibility uses social engineering, phishing, or
researching a person to come up with
A person who gains unauthorized access to a information to gain entry to a system.
computer files or networks in order to further o Guessing Passwords
social or political ends. o Exploiting vulnerabilities
o Enthusiasts o Social Engineering
o Hacktivists o Stealing passwords
o Activists
o infotech Which principle supports this situation: data
and systems are reliable, up-to-date, and they
This is someone who accesses a computer will not change or be changed due to hardware
illegally but has the intent of destroying data, or software defects, natural phenomena or
stealing information, or other malicious actions. human interventions.
o hacker o authenticity
o script kiddie o integrity
o cracker o availability
o corporate spies o authentication
These are network attacks where malicious It involves a deliberate act that is against the
parties gain unauthorized access to monitor, law to breach the security of a digital
and steal private data without making any environment.
alterations. o cybercrime
o Passive network attacks o computing crime
o Malware attacks o digital crime
o Active network attacks o crime
o Black hat hackers
TRUE OR FALSE: You could make a case for
A _____ is someone who demands payment to calling digital security a sub-type of cyber
stop an attack on an organization’s technology security. Many industry professionals use the
infrastructure. two terms interchangeably, but in reality,
o cyberextortionist digital security protects information, and cyber
o script kiddie security protects the infrastructure, all systems,
o cracker networks, and information.
o cyberterrorist o FALSE
o TRUE o Certificates
LIVING IN THE IT ERA ~
A security measure that defines who can access
FQ2 a computer, device, or network, when they can
access it, and what actions they can take while
These are digital security tools that bridge the accessing it.
gap between users and the Internet, using o Access Controls
filtering rules in line with an organization's IT o Information Theft
policies. o Email Spoofing
o Antivirus o Vandalism
o Proxies
o Remote Monitoring This is used to detect and protects computer
o Vulnerability scanner and its data from unauthorized intrusions by
monitoring all transmissions to and from the
It involves defacing or destroying digital computer.
equipment. o Antivirus
o Hardware Vandalism o Proxy server
o Hardware o Personal Firewall
o Hardware Fail o Vulnerability scanner
o Hardware Theft
This restricts access to a computer or mobile
It is also called user ID, login name or sign in device until a user performs a specific action.
name. For example, some require a user to swipe
o Identification o Hand Geometry System
o Confidential data o Fingerprint Reader
o Username o Lock Screen
o Access name o Face Recognition
A private combination of words, often A group of compromised computers or mobile
containing mixed capitalization and devices connected to a network, such as the
punctuation, associated with a username that Internet, used to attack other networks, usually
allows access to specific computer resources. for nefarious purposes.
o pin o netbots
o credentials o bot
o passphrase o Botnets
o password o Back Doors
This device measure's hand to verify user's This system recognizes the shape of
identities. handwritten and measures there pressure
o Hand Geometry System exerted, and the motion used to write.
o Fingerprint Reader o Lock Screen
o Lock Screen o Signature Verification System
o Face Recognition o Iris Recognition System
o Face Recognition System
It is the process of converting data that is
readable by humans into encoded characters to A set of characters that the originator of the
prevent unauthorized access. data uses to encrypt the plaintext and the
o Backup recipient of the data uses to decrypt the
o Encryption ciphertext.
o Digital Signature o Encryption program
o Encryption Key
o Password o Trojan Horse
o PIN o Spyware
It a kind of backup which requires an Internet This tool detects, evaluates, and manages any
connection, otherwise files are marked for weak spots in your organization's system.
backup when the computer goes back online. o Antivirus
o Continuous Data Protection o Network Scanner
o Incremental Backup o Vulnerability Scanner
o Cloud Backup o Remote Monitoring
o Selective Backup
This occurs when an intruder computer fools a
It is a program that performs a repetitive task network into believing its IP address is
on a network which is used to send spam via associated with a trusted source.
email, spread viruses and other malware. o Clickjacking
o Back Doors o Email Spoofing
o DoS Attacks o Spoofing
o bot o IP Spoofing
o netbots
This outlines the activities for which the
The fraudulent practice of sending text computer and network may and may not be
messages purporting to be from reputable used.
companies in order to induce individuals to o Law
reveal personal information, such as passwords o Access Controls
or credit card numbers. o Procedures
o Spoofing o Acceptable Use Policy
o Phishing
o Smishing This device authenticates a person's identity by
o Clickjacking translating a person's characteristic into a
digital code that is compared with a digital code
A computer or mobile device uses two separate stored in a computer or mobile device.
methods, one after the next, to verify the o CCTV Camera
identity of a user. o Sensors
o Authentication o Biometric Device
o Spoofing o Audio recognition system
o Encryption
o Two-factor verification A program that copies itself repeatedly, for
example, in memory or on a network, uses up
It is an assault whose purpose is to disrupt resources and possibly shuts down the
computer access to an Internet service service computer, device, or network.
such as the web or email. o Worm
o DDoS Attack o Trojan Horse
o Cyber Attack o Virus
o DoS Attack o Spyware
o API Attack
It is a scam in which a perpetrator sends an
Zeus is a malware which uses keystroke official looking email message that attempts to
logging to compromise victim credentials when obtain personal and/or financial information.
the user visits a banking website. What type of o Spyware
malware is Zeus o Clickjacking
o Worm o Malware
o Virus o Phishing
This occur when someone steals personal or
confidential information to make fraudulent
is an encrypted code that a person, website, or purchases or gain unauthorized access to a
organization attaches to an electronic message computer.
to verify the message sender's identity. o Access Controls
o password o Information Theft
o pin o Vandalism
o digital signature o Email Spoofing
o digital certificate
A set of instructions in a program that allows
It is also called symmetric key encryption, both users to bypass security controls when
the originator and the recipient use the same accessing a program, computer, or network
secret key to encrypt and decrypt the data. o Spoofing
o Digital Signature o Back Doors
o Private Key Encryption o Front Door
o Public Key Encryption o Clickjacking
o Encryption
This is also called as cyberforensics which
Identify the image shown below. involves the examination of media, programs,
data and log files on computers, mobile
devices, servers, and networks.
o Forensics
o Cyber investigations
o Digital Pathology
o Digital Forensic
This group by Bashar al-Assad targeted
opposition groups akin to a political protest by
o Pin deploying or executing a DDOS attacks.
o CAPTCHA o Syrian Hacktivists
o Possessed Objects o Syrian Electronic Army
o Passphrase o Syrian Black Hat Hackers
o Syrian Liberation Army
This kind of backup is challenging to manage
individual file backups. Least manageable of all Identify the image shown below.
the backup methods
o Selective Backup
o Cloud Backup
o Continuous Data Protection
o Incremental Backup
This is a specific, private information that is This causes the inability to assess performance,
important to a business because it gives the sales accurately, and convert customers. An
business a competitive advantage in its excellent way to think about it is garbage in,
marketplace. garbage out; poor data input leads to poor
o Trade Secret decision-making and directly impacts
o Trademarks performance.
o Copyrights o Data Integrity
o Patents o Data Processing
o Data Reliability
o Data Quality o Penal System
o Republic Act
It is a small text file that a web server stores on o House Bill
the computer.
o Patch
o Cookies Information given by a client to his lawyer is an
o User Tracker example of:
o User Information o Sensitive personal information
o Sensitive Information
o Personal Information
LIVING IN THE IT ERA ~ o Privileged Information
It is an independent body created under Which right under RA 10173 can be exercised
Republic Act No. 10173, mandated to upon discovery and substantial proof of
administer and implement the provisions of the personal data is incomplete, outdated, false, or
Act, and to monitor and ensure compliance of unlawfully obtained?
the country with international standards set for o The right to erasure or blocking
data protection. o The right to damages
o Department of Information and o The right to access
Communications Technology o The right to object
o Office of the Cybercrime
o Information Officer A sign used on products with a specific
o National Privacy Commission geographical origin and possess qualities or a
reputation due to that origin. A sign must
Refers to a person or organization who controls identify a product as originating in a given
the collection, holding, processing or use place
personal information o Geographical Indication
o Personal information handler o Layout-Designs
o Personal information comptroller o Service Mark
o Personal information holder o Industrial Designs
o Personal information controller
The creator of the I Love You virus is a certain
Which right under RA 10173 can be exercised ____________.
if the contents of the personal data that were o Onel Dela Cruz
processed, names and addresses of the recipient o One DeGuzman
of the data or manner by which they were o Onel Guzman
processed. o Onel De Guzman
o The right to access
o The right to object Issue and promulgate guidelines, advisories,
o The right to erasure or blocking and procedures in all matters related to
o The right to damages cybercrime investigation, forensic evidence
recovery, and forensic data analysis consistent
Which of the following is TRUE regarding with industry-standard practices is a power of
electronic signatures under the E-Commerce what government office?
Act. o IPOPHIL
o The other party is authorized and enabled o DICT
to verify the electronic signature and to o NBI
make the decision to proceed with the o OOC?
transaction authenticated by the electronic
signature. The acquisition of domain name over the
o There must be a prescribed method of Internet in bad faith to profit, mislead, destroy
signing alterable by the parties interested in the reputation, and deprive others of registering the
electronic document; same.
o Philippine government has an official PKI o computer-related fraud
system, the Philippine National Public Key o computer-related identity theft
Infrastructure system. o Cyber-squatting
o The method for signing is reliable and o computer-related Forgery
appropriate for the purpose for which the
Minimum penalty for hacking, cracking, and o Cybercrime Prevention Act of 2012
piracy as prescribed in RA 8792. o Safe Spaces Act
o 200,000.00
o 100,000.00
o 50,000.00
o 150,000.00 A type of cybercrime where unauthorized
acquisition, use, misuse, transfer, possession,
This allows to obtain and electronically move, alteration or deletion of identifying information
copy or transfer data in a secure manner, for belonging to another, whether natural or
further use. juridical.
o Data Processing o Libel
o Access Control o Computer-related Identity Theft
o Data Security o Computer-related Fraud
o Data Portability o Cyber-squatting
It is a strategy that intends to connect all Which right should be exercised to control and
government offices to the Internet and provide prevent the erosion of the principle of
universal access tot he general public. territoriality of copyright?
o National Broadband o Right of Reproduction
o National Computer Center o Right to authorize rental
o DICT o Right to importation
o RPWeb o Right to authorize distribution
This right allow right owners to derive financial Which right under 10173 should be exercised
reward from the use of their works by others. when organizations or personal controllers are
Right owners can authorize or prohibit. processing data without the consent for the
o Civil Rights purpose of direct marketing purposes.
o Moral Rights o The right to be informed
o Economic Rights o The right to rectify
o Copyright o The right to file a complaint
o The right to object
An enterprise security leadership role for
overseeing company's data protection strategy A word, phrase, symbol, and/or design that
and its implementation to ensure compliance. identifies and distinguishes the source of the
o Network Administrator goods of one party from those of others.
o Security Officer o Geographical Indications
o Information Officer o Industrial Designs
o Data Privacy Officer o Trademark
o Layout-Designs
This law was patterned after the “UNCITRAL
Model Law on Electronic Commerce” adopted This law prohibits anyone from overhearing,
by the United Nations Commission on intercepting, or recording any private
International Trade Law (UNCITRAL) in 1996. communication by tapping wire or using the
o Republic Act 10175 electronic device without authorization by all
o Republic 11313 parties
o Republic Act 8792 o RA 8293
o Republic Act 10173 o RA 4200
o Ra 11449
This is also known as Republic Act 10173 o RA 8484
o Intellectual Property Code of the Philippines
o Data Privacy Act of 2012
LIVING IN THE IT ERA ~
FQ5
There is a need to criminalize porn actors This involves measuring performance and, if
playing a role as minors. Having porn actors necessary, taking corrective actions.
play as minors provokes the intention to have o Organizing
children partake in sexual activity and insults o Leading
children's rights and, therefore, should be o Planning
banned. o Controlling
o RA 9239
o RA 9775 This level of management are often industry
o RA 9995 experts, having a close association with the
o RA 8790 long-term trajectory of the businesses they
operate in.
The unauthorized copying, reproduction, o Operation Management
dissemination, distribution, importation, use, o Non managerial Employees
removal. alteration, substitution, modification, o Executive Management
storage, uploading, downloading, o Middle level management
communication, making available to the public,
or broadcasting of protected material, electronic Which of the Supervisory or Operational
signature or copyrighted works including Management function is being describe in the
legally protected sound recordings or following statement. "Pass on the instructions
phonograms or information material on of the middle management to the workers and
protected works, through the use of the worker's suggestions, complaints, etc., to
telecommunication networks the middle management."
o Cracking o Act as guide to Workforce
o Piracy o Training
o Hacking o Act as Supervisor
o Information Theft o Link between Middle Management and
Workforce
Unauthorized hindering with the functioning of
a computer or computer networking by This sets the expectations between the service
inputting, transmitting, damaging, deleting, provider and the customer and describes the
deteriorating, altering, or suppressing computer products or services delivered, the single point
data or program, electronic document, or of contact for end-user problems, and the
electronic data messages, and including the metrics by which the effectiveness of the
introduction or transmission of viruses. This process is monitored and approved.
provision can also cover authorized action if o Partnership Agreement
the person’s activity went beyond the agreed o Non-disclosure Agreement
scope resulting in damages stated in this o Express Agreement
provision. o Service-Level Agreement
o Data Interference
o Misuse of Devices The people who develop and accumulate large
o System Interference amounts of knowledge on customers, suppliers,
o Illegal Interception and workers.
o Capitalists
o Scientists
o Entrepreneurs
o Analysts
o Technological Computing
These are the general managers, branch o IT Computing
managers, and department managers and they o Small-to-Medium Sized Computing
devote more time to organizational and
directional functions. This includes a set of activities that enterprises
o Bottom / Operational Management perform to optimize their business processes,
o Executive Management such as accounting and finance, hiring
o Non managerial employees, and purchasing goods and services.
o Middle Level Management o Business Process Management
o Business Management
o Business Intelligence
A key point difference between Managerial and o Business Process Automation
non-managerial employees in areas of Provides an easy exchange of information
determining objectives, framing policies, among business applications, reduces the need
overseeing functioning in line with policies, for human intervention in processes, and uses
coordinating and supervising employees are software to automate processes wherever
some of their essential responsibilities. o Business Process Automation
o Responsibilities o Business Intelligence
o Meaning o Business Control
o Decision-Making rights o Business Process Management
o Overseeing function
A system with multiple components located on
This type of enterprise seeks to purchase and different machines that communicate and
sell large quantities of goods to other coordinate actions in order to appear as a single
organizations, usually at a lower cost than coherent system to the end-user.
retail. o Cloud Computing
o Retail Enterprise o Enterprise Computing
o Manufacturing Enterprise o Grid computing
o Service Enterprise o Personal Computing
o Wholesales Enterprise
The following are functions of middle level
This level of management are often referred to management EXCEPT:
as first-line managers who oversee the o Strategic Planning
workforce's efforts. o Reporting performance statistics up the chain
o Middle Level Management of command and, when applicable,
o Executive Management recommending strategic changes
o Non-Managerial Employees o Designing and implementing effective group
o Operational Management work and information systems
o Diagnosing and resolving problems within
They industry experts, having a close and among workgroups
association with the long-term trajectory of
their businesses. Which of the following are changes that may
o Top management teams occur when middle management is reduced due
o Intermediate management to reorganization?
o operative management o outsourcing
o executive functions o hiring
o downsizing
It involves using computers in networks that o delayering
encompass a variety of different operating o reduce cost
systems, protocols, and network architectures.
o Enterprise Computing This institution defined cloud computing.
o ISO o personal computer
o DICT
o NPC Includes several applications and technologies
o NIST for acquiring, storing, analyzing, and providing
access to information to help users make more
Includes identifying and combining resources, sound business decisions.
such as money and people, to achieve its goals o Business Intelligence
and objectives. o Business Control
o Leading o Business Process Automation
o Controlling o Business Process Management
o Organizing
o Planning Which of the following is performs strategic
decisions in the organization? Select ALL that
The following are functions of an Operational applies.
Manager EXCEPT: o officer manager
o Discipline o president
o Training o chief financial officer
o Maintenance of Quality o chief executive officer
o Supporting Cooperative Behavior o human resource manager
This type of enterprise owns many stores in a This denotes any business and ventures of any
wide geographical area and use their size to size.
obtain discounts and goods they purchase. o Enterprise
o Manufacturing Enterprise o Lending Institutions
o Wholesales Enterprise o Finance
o Service Enterprise o Government
o Retail Enterprise
Typically do not create or sell goods for
This type of enterprise include airlines, regional consumers or other organizations. Examples
transportation authorities, freight and passenger include companies in the insurance, restaurant,
railroads, and trucking firms. and financial industries.
o Manufacturing o Retail enterprises
o Educational o Service enterprises
o Transportation o Wholesale enterprises
o Service o Government enterprises
Which of the following is/are middle manager's These are enterprises that are not present across
roles? Select All that applies. international boundaries, runs on a smaller
o Supporting cooperative behavior business operating scale that may use the same
o To look at the organization as a whole and technology and techniques.
derive comprehensive strategic plans. o Enterprise Computing
o Arrange workplace training o Small-to-Medium Sized Business
o Defining and monitoring group-level o Microenterprise
performance indicators high-risk, high o Large enterprises
return decision-making initiatives
This member of an organization is charged with
It is the use of technology by an individual for strategic decisions and long-term planning
business or personal activities. o Chief Technology Officer
o personal computing o Chief Operating Officer
o IOT o Chief Finance Officer
o cloud computing o Chief Executive Officer
This top management officer is in-charge of
LIVING IN THE IT ERA ~
providing supporting roles in the organization. FQ6
o CFO
o COO It is a system that stores customer data,
o CEO interactions and previous purchases and
o CIO interests.
o customer relationship management
o point of sale
o transaction processing system
Which of the following are non-managerial o customer service management
employees? Select all that applies.
o accountants Which characteristic is being identified in the
o foreman statement: While checking in for flights,
o engineers security agents may seek your photo
o inspectors identification to check your identity.
o secretarial staff o Accurate
o Verifiable
This is the information gathered in the ongoing o Accessible
operations of an enterprise-sized organization. o Timely
o Enterprise Information
o Planning A computer-based application that administers
o Organizing one or more human resource functions.
o Business Management o ERM
o PIM
These are the accountants, engineers, secretary, o HRIS
order entry clerk and are entrusted with specific o HRM
functions depending on the department within
which they are employed. This system are used by multiple departments
o Executive Management and facilitate collaboration within the
o Non managerial enterprise.
o Middle Level Management o General-purpose information system
o Operational Management o Information systems
o Functional Units
Which of the following are true about 2020 o Integrated Information System
IOT and Innovation?
o 25+Billion Embedded and Intelligent An information system that captures and stores
Systems the knowledge of human experts and then
o 10 Billion GBs of Data imitates human reasoning and decision-making.
o 1 Trillion USD in Revenues o Expert Systems
o 4 Billion Connected People o Executive Information System
o 25+ Million Applications o Management information System
o Transaction Processing System
Managerial employees have a more critical
role, thus drawing higher pay packages than An information system that captures and
non-managerial employees. processes data from day-to-day business
o Decision-making rights activities.
o Educational Requirement o Decision Support System
o Payscale o Management Information System
o Overseeing function o Transaction Processing System
o Expert Systems This system enables an organization to
maintain or enhance the product or service's
A particular type of DSS that supports the quality.
strategic information needs of executive o Quality Assurance System
management. o Computer-Aided Manufacturing
o Geodata Information System o Quality Control System
o Robotics o Marketing Information System
o Executive Information System
o Expert Systems
What information are presented in an Executive An example of an expert system that senses a
Information System? Select all that applies. person's actions and, based on logical
o customer support assumptions and prior experience, takes the
o customer data interactions appropriate action to complete the task.
o trends o Artificial Intelligence
o ratios o Virtual Reality
o charts o Artificial Reality
o Enterprise Intelligence
A set of hardware, software, data, people, and
procedures that work together to produce This system in a Hospital Information System
information. features Comprehensive IP Management that
o Information System handles corporate and insurance patients,
o Enterprise Systems reduces pilferage, and eliminates paperwork.
o Business Systems o HMS-PHARMA
o Knowledge Systems o HMS-LAB
o HMS-IP
An information system that enables employees o HMS-OP
to perform tasks using computers and other
electronic devices instead of manually. This system in a Hospital Information System
o Office Information Systems features visual electronic medical records,
o Expert Systems comprehensive appointments, integrated
o Transaction Processing System outpatient billing, flexible queue management,
o Decision Support System and e-prescription.
o HMS-IP
The practice of working from home, making o HMS-PHARMA
use of the internet, email, and the telephone. o HMS-LAB
o Work From Home o HMS-OP
o Telecommuting
o Virtual Commuting Provides the administration and coordination of
o Videoconferencing an enterprise's continuous activities, such as
manufacturing and distribution, accounting and
finance, sales, product planning, and human This functional unit of an enterprise is
resources. responsible for researching the clusters of
o Enterprise Resource Planning consumers in which the enterprise operates to
o Enterprise Resource determine the products and features that the
o System Resource Planning business should develop.
o Systems Planning o Marketing
o Engineering
o Customer Service
o Distribution
Virtual Commuting
Videoconferencing
Telecommuting
Work From Home
Living in the IT Era ~ FQ7 Develops and directs an organization's
mobile strategy, including marketing and
Answers hardware, software, and
app development
networking questions in person, over the
phone, or electronically via email or a chat Mobile Strategist
room. Mobile Technology Expert
Games Designer
Call Center Agent Mobile Programmer
Help Desk Specialists
Computer Technicians Identify the following step that satisfies this
Computer Programmers statement, "Remember to look for positions
where you can add the most value to
Collects and measures Internet data, such as
employers."
website traffic patterns and advertising, and
develops reports that recommend strategies Practice for your interview
to maximize an organization's web Do your research
Clearly define your skills and
presence.
interests
Web Architect Strategize your job search
Web Analytics Expert A written list of short-term and long-term
Web Designer
goals. It involves the employees' planned
Web Developer
formal and informal experiences and any
Writes and develops web content and required training to attain the goal.
website layouts so that they will appear at
the beginning of search results when users Career Assessment
Personal website
search for content.
Career Development Plan
Computer Security Specialists Resume
CRM Specialists Identify the following step that satisfies this
SEO Expert
statement, "What am I really good at? What
are the things that I am most passionate Systems Analysts
Program and App Developer
about?"
Works closely with users to analyze their This percentage of workers according to
requirements, designs and develops new studies dream of leaving the confines of an
information systems, and incorporate new office to work from the comfort of home, at
technologies least part of the time.
70%
75%
80%
85%
A section of the IT department that
Implements security procedures and evaluates and integrates new technologies,
methods, looks for flaws in security of a administers the organization's data
company's devices and networks, works resources, and supports the centralized
with and trains employees at all levels, and computer operating system and servers.
assigns permissions and network settings.
Management
Computer Security Specialists Information Security Services
Security Analysts Operations
Digital Forensics Analysts Technical Support Services
Security System Project Manager
A job under web marketing and social
Inspects electronic data to recover media that integrates apps, and data related
documents and files from data storage to customer inquiries, purchases, support
devices that may have been damaged or requests, and behaviors in order to provide
deleted, to use them as evidence in a complete application that manages a
criminal investigation. company's relationships with its customers.
Hardware certifications
Security Certifications
Hardware Assessment
Security Assessment
JobStreet
Network Administrator
Technical Project Manager
Technical Project Manager IT Consultant
Network Administrator Engineer Help Desk Specialist
Technology Salesperson
Computer repair technician