WGU C724 Exam Imagine a Cat Going To School In (ICGTSI - Decision Making Process (6) - ✔Prob ID, Data Collection, Solution Generation, Solutions Test, Solution Selection, Solution Implementation Hard Data Network System Security Ecommerce (IS elements) - ✔Hardware and Software, Data Resource Mgmt, Network, Systems and Decisions, Security and Ethics, Ecommerce and Social Meida System that accepts input data and processes it into information as output ✔Information System Information that have been organized to provide value to an organization - ✔Data Information systems accept _____ as input and process it into ______ as output. ✔data,information The primary component categories that make up a Computer-based Information System (CBIS) - ✔(PPHSND) people, processes, hardware, software, networks, and data Utility Software - ✔Programs perform periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, intrusion detection, and access authentication monitoring Information systems specialists - ✔People who develop, operate, and maintain the systems. Specialists include programmers, systems analysts, testers, computer operators, and other managerial IS personnel Transaction processing systems (TPS) - ✔This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing Management information systems (MIS) - ✔This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly Decision-support systems (DSS) - ✔This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends
Executive information systems (EIS) - ✔This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify longterm trends IS 4 pyramid - ✔TPS, MIS, DSS, EIS The IS function is _____ in structure and its success depends on its cooperation and relationship with the other functions in an organization - ✔Horizontal About one third of the IS management agenda is expected to change every _____ ______ , confirming the highly dynamic nature of the IS management function. - ✔Three years Example of IS helping HR - ✔Monthly payroll Playboys Produced Hotdogs Since Nutritionists Died (IS) - ✔People, processes, hardware, software, networks, and data Hotdogs Since Nutritionists Died (IT = Sub of IS) - ✔Hardware, software, networks and data Information Technology is a subset of ______ - ✔Information Systems HTTP - ✔Hypertext Transfer Protocol is the communications protocol at the foundation of all communication of the World Wide Web HTTPS - ✔Hypertext Transfer Protocol Secure, which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and Web server FTP - ✔File Transfer Protocol = An unsecure method used to transfer files from one computer to another. SFTP - ✔Secure File Transfer Protocol = Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer DHCP - ✔Dynamic Host Configuration Protocol = A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network SMTP - ✔Simple Mail Transfer Protocol = One of several popular email protocols in use today (others include IMAP and POP3)
SNMP - ✔Simple Network Management Protocol = Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status TELNET - ✔An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP) DNS - ✔Domain Name Service = Server-based service that translates human language Web address or URL into an IP address, which is used. LDAP - ✔Lightweight Directory Access Protocol = Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlookâs global address list and Microsoft Active Directory URL - ✔Uniform Resource Locator is a protocol used by a client computer to request a website from a server via HTTP or HTTPS Synchronous - ✔Communication occurs in real time, with their client using online chat or instant messaging Asynchronous - ✔Communication occurs at different times via bulletin boards, blogs, and streaming videos Major business functions by IS - ✔Accounting and Finance, HR, Prod and Ops, Sales and Marketing Accounting and Finance - ✔Accounts payable, receivable, budgeting, general ledgers, payroll, cash flow, financial transactions HR - ✔Recruiting and training, employee benefits and regulations management, employee records Prod and Ops - ✔Product life cycle, manufacturing, inventory management, quality control, research and development Sales and Marketing - ✔Sales analysis, set pricing, marketing mix, and product promotions, customer profiling Which business function is responsible for Quality Control? - ✔Prod and Ops
IT Mgmt Challenges - ✔Political and Legal Pressures, Cultural Pressures, Technological Pressures, Economic Pressures Types of computers - ✔PC, Workstation (more than 1 person), Server (printers, fax), Mainframe (high performance to process large data), Supercomputer (simulating weather patters, decoding genome structures), Grid computing (supercomputer for many smaller systems connected), Virtual Document camera - ✔Real-time image capture for displaying an object to a large audience SDLC (Software Development Life Cycle) - ✔Traditional method to develop software JAD (Joint application design) - ✔Methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops _____ sessions RAD (Rapid application development) - ✔Iterative alternative to the conventional waterfall model of software development CASE (computer-aided software engineering) - ✔Allows designers, code writers, testers, planners, and managers to share a common view of where a project stands at each stage of development. Helps ensure a disciplined, check-pointed process. EUD (End-user development) / EUP (End-user programs) - ✔Refers to activities and tools that allow end-users - people who are not professional software developers - to program computers Object-oriented systems development - ✔Uses the object as the unit of design, and is based on the concepts of class and inheritance. For example, numerous automobiles belong to the class of automobiles, and numerous trucks belong to the class of trucks, but both inherit the property of vehicle from the vehicle class Structured systems models - ✔Methodical and process-oriented, moving from the general level to the specific level through a series of processes Data Mart - ✔Subset of the data warehouse that is usually oriented to a specific business line or team Data Warehouse - ✔Central libraries of data that are combined from one or more sources and organized by subject to support organizational managers ODS (Operational data store) - ✔Database designed to integrate data from multiple sources for additional operations on the data. Unlike a master data store the data is not
passed back to operational systems. It may be passed for further operations and to the data warehouse for reporting Secondary data - ✔Type of quantitative data that has already been collected by someone else for a different purpose to yours. For example, this could mean using: data collected by a hotel on its customers through its guest history system Data tuple (THU_PL) - ✔In the Relational Model, is a set of named and typed values. The nearest equivalent in SQL is a "row". MDX (Multidimensional Expressions) - ✔Language provides a specialized syntax for querying and manipulating the multidimensional data stored in OLAP cubes OLAP (online analytical processing) - ✔Databases containing data that are used for making decisions OLTP (online transaction processing) - ✔Database design used for browsing and manipulating business transaction activity Flat file database - ✔Model that resembles file cabinet functionality Relational database - ✔Connects tables of records together with complex relationships. Hierarchical database - ✔Connects tables in a master/slave1, leader/follower, or primary/replica format. Object-oriented database - ✔Database that subscribes to a model with information represented by objects Analytical database - ✔Read-only system that stores historical data on business metrics such as sales performance and inventory levels Primary Data - ✔Data observed or collected directly from first-hand experience Primary key - ✔In a relational database that is unique for each record Foreign key - ✔Column or set of columns in one table whose values must have matching values in the primary key of another (or the same) table Clickstream analysis - ✔Collecting, analyzing, and reporting aggregate data about which pages visitors visit in what order - which are the result of the succession of mouse clicks each visitor makes Primary reason to convert to IPv6? - ✔Increase number of IP addresses
Wardriving - ✔Act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA) Defeat wardriving - ✔Hide SSID Information asymmetry - ✔Study of decisions in transactions where one party has more or better information than the other. This creates an imbalance of power in transactions, which can sometimes cause the transactions to go awry, a kind of market failure in the worst case Digital Market - ✔Allow for diminished search costs, costs for changing prices, and a better ability to change prices for different types or categories of customers or sellers, or as market conditions change Token Ring - ✔Network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time Bus topology - ✔Each node is connected to a single cable, by the help of interface connectors Star topology - ✔Each network host is connected to a central hub with a point-to-point connection Ring topology - ✔Connected in a circular fashion and data travels in one direction Mesh topology - ✔In the full topology, each workstation is connected directly to each of the others. In the partial topology, some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data Point to Point topology - ✔Direct link between two computers Tree Topology - ✔Two or more star networks connected together. The central computers of the star networks are connected to a main bus (network of star networks) Wireless repeater - ✔Wireless internet extension Wireless access point - ✔Wired internet extention Wireless bridge - ✔Connects two wired networks together over Wi-Fi
Access point client - ✔Machine wired to access point Bluetooth - ✔Wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[4]) TCP/IP (Transmission Control Protocol/Internet Protocol) - ✔Basic communication language or protocol of the Internet IEEE 802.11 - ✔Specifies an over-the-air interface between a wireless client and a base station or between two wireless clients VoIP - ✔Methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet Wired Equivalent Privacy (WEP) - ✔Wi-Fi security algorithm (64bit) - Retired 2002 Wi-Fi Protected Access (WPA) - ✔Wi-Fi security algorithm (256bit) - 2003 - 2006 Wi-Fi Protected Access II (WPA2) - ✔Latest algorithm - Mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) - 2006 SDLC Phases - ✔Analysis, Design, Implementation SDLC Analysis Phase - ✔Identify problems, determine requirements, analyze system needs SDLC Design Phase - ✔Designing the recommended system, Developing and documenting software SDLC Implementation Phase - ✔Testing and maintaining, Implementing and evaluating Elegant Terrific Outlaws Seized Lethal Penguins (SDLC - Feasibility study) ✔Economic, Technical, Operational, Schedule, Legal, Political TCO (Economic Feasibility) - ✔Total Cost of Ownership Pseudocode - ✔Informal high-level description of the operating principle of a computer program or other algorithm Work Breakdown Structure (WBS) - ✔Broken down list of all deliverables showing what the customer will get at the end of a project.
Unified Modeling Language (UML) - ✔Not a programming language. This is a graphical notation specifically for drawing diagrams of an object-oriented system Critical Path Method (CPM) - ✔Step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems On premises (private cloud) - ✔Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization Software as a service (SAAS) - ✔Software licensed and hosted on centralized or distributed servers that belong to a service provider Platform as a service (PAAS) - ✔A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services Infrastructure as a service (IAAS) - ✔A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications RAID (redundant array of independent disks; originally redundant array of inexpensive disks) - ✔Provides a way of storing the same data in different places (thus, redundantly) on multiple hard disks Service-oriented architecture (SOA) - ✔Architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network Rolling code (hopping code) - ✔Used in keyless entry systems to prevent replay attacks, where an eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock'. Such systems are typical in garage door openers and keyless car entry systems Anti-Malware - ✔Detect and remove malware that even the most well known anti-virus and anti-malware applications fail to detect Digital Signature - ✔Term used for marking or signing an electronic document, by a process meant to be analogous to paper signatures, but which makes use of a technology known as public-key cryptograph Privacy Goals - ✔Confidentiality, integrity, Availablity
Cold Sites - ✔Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days Warm Sites - ✔Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days Hot Sites - ✔Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours Shared hot sites - ✔Offsite facilities shared with other organizations for the purpose of disaster recovery, requiring only adequate or prioritized staffing, but at a cost shared with another organization Character shifting (Ceasar cipher) - ✔Substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence. Word substitution - ✔Method of encoding by which units of plaintext are replaced with ciphertext Private Industrial Networks - ✔Web networks allowing 360 to collaborate Net Marketplace - ✔Online platform host where transactions may take place between a seller and a buyer e-Tailers - ✔Provide access for the sale of physical goods, which are then shipped to their customers Freemium - ✔Offering of product samples and trial versions Public Exchanges - ✔Trading venues open to all interested parties (many sellers and many buyers) that use a common technology platform Private Exchanges - ✔Marketplaces of health insurance and other related products. Employers and then their employees can choose a health plan from those supplied by participating payors Micropayment - ✔Small payment made each time a user accesses an Internet page or service