WGU C724 Study Sets The evolution of software has produced the ability to manage large databases of information, known as - ✔database management systems (DBMS) was the first computer software language for business applications - ✔Common Business Oriented Language (COBOL) is a programming environment that provides tools to developers to write code. ✔Integrated Development Environment (IDE) components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners. - ✔Input which is the brain of the computer. Historically, this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components. - ✔Central Processing Unit (CPU) components include primary temporary storage and secondary long-term storage devices. - ✔Storage is temporary or short-term storage used by the processor. - ✔Random Access Memory (RAM) components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output). - ✔Output which is the medium through which communications between the input, processor, storage, and output occur. - ✔System Bus or similarly the backplane, of a system is the device that contains the system bus and connects the various input and output devices that compose any given computer system. - ✔Motherboard tracking barcodes and wireless sensor networks, some used in supply chain operations. - ✔radio frequency identification (RFID) A person interacts with digital data through a physical environment. - ✔Tangible User Interface (TUI)
is the most advanced integrated circuit and holds millions of integrated circuits in a semiconductor chip. They are programmable devices that process instructions and incorporate the four functions of a computer central processing unit (CPU), which includes fetch, decode, execute and store. - ✔Microprocessor A chip with multiple CPUs is called a ........ This typically provides more computing power for they can run multiple instructions in parallel. - ✔Multicore processor coined by the co-founder of Intel, described that components in integrated circuits or microchips will double every two years. - ✔Moore's Law otherwise known as CPU cache and random access memory (RAM), are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed. - ✔Primary Storage is accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies. On the other hand, costs per byte for ........... have historically been quite a bit less than primary storage technologies. Examples of ............. include magnetic hard disk drives, which are spinning magnetic disks with moving read and write heads, as well as newer, more modern solid state nonvolatile flash storage. ............. also includes removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives. - ✔Secondary Storage Small systems are used on an individual basis (i.e., one-person use) and include traditional multicomponent desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers. - ✔Personal Computer (PC) A more powerful system used by individuals in order to run more resource-intensive applications. - ✔Workstation A system used to provide services to other systems. Servers need not be powerful computers. Server operating systems may be used on personal computers, including desktops or laptops, though usually servers are built on more resilient and reliable components. - ✔Server A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data. - ✔Mainframe This term merely implies the fastest category of computer available. Supercomputers are purpose built to handle vast amounts of information very quickly. Examples of supercomputer applications include simulating global weather patterns, decoding genome structures, or simulating the human mind. - ✔Supercomputer A form of supercomputer constructed from many smaller systems that have been connected together. - ✔Grid computing
A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance. - ✔Virtual computing is software whose source-code is freely available to developers and users. .............. is developed not by single users or companies, but by communities of connected users and groups. - ✔Open Source Software is a system used to convert plain-text document into one optimized for viewing as a Web page, integrating colors, graphics, fonts, and links. - ✔Hyper Text Markup Language (HTML) A computer language similar to HTML, XML makes it easier to exchange, validate, store, and interpret data between a variety of applications and systems. - ✔Extensible markup language (XML) Many graphical and traditional text based HTML editors exist and range from the unsophisticated text editors to feature rich graphical WYSIWIG (What You See Is What You Get) interfaces. Modern popular examples include Adobe's Dreamweaver and Microsoft's Visual Studio. - ✔Web design tools Graphics, video, animations, and interactive multimedia are popular elements in Web pages. Popular tools used to create these elements include Adobe's Photoshop, Flash, and Premier products. - ✔Graphics tools Tools that allow webmasters and developers to achieve better rankings from search engines, implying that traffic would better route to a site as a result. - ✔Search engine optimization Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization. - ✔On Premises (private cloud) Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a Web browser. Examples include Salesforce.com's CRM (Customer Relationship Management) application or Google Apps. - ✔Software as a service (SAAS A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services. - ✔Platform as a service (PAAS)
A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Benefits include dynamic scaling and may include geographic distribution. An example would be Windows Azure or Rackspace. - ✔Infrastructure as a service (IAAS) ensures that only authorized personnel are admitted access. - ✔Confidentiality ensures that data is produced and modified in the correct way. - ✔Integrity ensures that access to resources is unimpeded. - ✔Availability The potential for loss, commonly associated with the monetary and non-monetary impact to such a ,,,,,,,,,,, as well as the probability of occurrence. - ✔Risks A weakness in the technology, process and procedure, or people involved with any given information asset. Such ,,,,,,,,,,,,,,, may include weaknesses in the technologies used, including their configurations, and the security policies that are enforced or not within an organization. - ✔Vulnerabilities The identified and unidentified actors that have the potential for attacking the information assets. Such actors may include elements both internal and external to the organization. - ✔Threats The damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence. - ✔Attacks a loss of access created by cut cables or power services, malware, hoaxes, bots and botnets (i.e. a computer or groups of hijacked computers to attack others, often without notice to their owners), smurf attacks, SYN floods, DNS poisoning, or outright hijacking and/or redirection of services. - ✔Denial of service malicious software applications - ✔Malware One high-profile example of a malware threat is SQL Injection, which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information. Malware is spread through a variety of methods, direct download (intentional or not), as a part of another application or utility - ✔Trojan Horse website visit (e.g. drive-by download), or merely by being connected to the Internet or affected network - ✔worm
In some cases, internal attackers, such as disgruntled employees, may introduce malware - ✔logic bomb One high-profile example of a malware threat is.................... which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information. ✔SQL Injection a threat or attack that exploits known or unknown vulnerabilities in software. Software developers quickly patch vulnerabilities once known, though identifying these vulnerabilities takes time. Once found and fixed, developers must send patches to all affected or potentially affected users, which, unfortunately, does not occur consistently. In other cases, the public release of patches is used as a tool for malware authors to reverse engineer and easily attack those who have not updated their systems in time. ✔Zero Day Attack normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo. - ✔Social Engineering an authorized and ethical computer hacker**, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies. - ✔White Hat a computer hacker** with skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or sold to the highest bidder. - ✔Grey Hat a computer hacker** with criminal intent. - ✔Black Hat an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose. - ✔Hacktivist an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime. - ✔Cyber Criminal government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures. - ✔Nation state A low tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information. An example might be an intentionally dropped USB drive left openly in a busy parking lot. A victim, through greed or curiosity might take such a device and plug it into a corporate computer, perhaps attempting to identify or return it
to its owner or merely to obtain the value of the materials contained, but receive malicious code. - ✔Baiting Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information. Even innocuous information tied with other innocuous information may, when combined, paint an attractive picture for identity thieves. - ✔Dumpster Diving Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password. However, it can also take the form of a misleading and/or masked hyperlink that directs a victim to an official looking website (i.e. a pharming page) that asks for sensitive information. - ✔Phishing creating a believable scenario (e.g. whether innocuous or serious) for the purpose of obtaining information. For example, a user receives an official looking email that alerts them to recent successful phishing attacks, and asks them to respond with their credentials in order to ensure their validity. - ✔Pretexting An exchange of something of value for information. For example, the gift of a T-Shirt in exchange for personally identifiable information. - ✔Quid Pro Quo A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen. - ✔Shoulder Surfing A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point. Organization entry points are often protected by electronic badge access, which may be circumvented by not allowing a door to close properly, or authorized personnel who are not observant, are ignorant of or not properly trained in information security, intentionally or unintentionally allowing an unauthorized person to enter an otherwise locked door. - ✔Tailgating A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information such as names, addresses, phone numbers, usernames and passwords, and security questions and answers. One particularly insidious example of pharming is DNS poisoning, which changes the DNS record for a specific site to redirect all requests and web access to another specific site, even without providing the user with a fraudulent phishing message. - ✔Pharming of 1996, which requires organizations and individuals who handle medical information to adhere to rules and procedures for billing and information transfer. - ✔Health Insurance Portability and Accountability Act (HIPAA)
of 1999, which requires organizations and individuals to adhere to rules and procedures for storing and transferring financial information. - ✔Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 2002, which requires organizations to adhere to rules and procedures to ensure the accuracy, integrity, and security of financial information that leads to the creation and storage of financial statements. - ✔Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 1974, which requires educational institutions receiving certain federal funding to protect the information and privacy of certain aspects of a student record. - ✔Family Education Rights and Privacy Act (FERPA) is an important decision point for a business to implement controls or security for any risk, because managers need to evaluate the benefits versus the financial cost for implementing these controls. - ✔cost-benefit analysis (aka strategic level) frameworks are documents that establish the security program, define specific or general risks that it will be responsible for handling, and specify its purpose, extent, objectives, responsibilities (including the command structure within the security department), and enforcement. - ✔Program/Charter level policy address specific issues or concerns that a security policy is needed, or even controversial areas where the company takes a given position on an issue. Examples include policies for: - ✔Issue specific policies which requires each individual in an organization to be appropriately identified and authenticated at specific entry points to an organization and its information systems, and which help with the enforcement of access control, with the appropriate authorizations pre-selected for them. - ✔Identity management which specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets. - ✔Acceptable use is a process by which a business identifies its critical processes, or those areas of its business that must occur without failure lest the business will also fail. Such planning defines specific lengths of time for acceptable outages, responsible parties, contact information, and partners that have assumed the risk of supporting emergency continuity services. - ✔Business continuity planning is that which is primed for discharge in the case that a disastrous event occurs and business operations need recovery. Such measures include the creation and execution of processes, and the assignment of certain people to help to restore a business to an operational state. - ✔Disaster recovery planning
is a control known by quite a number of divisions and departments within an organization. to an accounting department implies that an impartial and independent third party will determine if policies and procedures have been followed, and whether fraud exists within the organization's finances. - ✔Auditing are actions by which individuals may help to avoid data theft, but that may have little to do with the computer-based actions mentioned below. - ✔Behavioral actions include those actions that require the use of a computer to apply. Several tactics and strategies exist, though each is derived from behavioral actions, strategies, and tactics. Awareness, understanding threats, minimizing or eliminating risks of loss, and acting to ensure fraud and abuse is limited or eliminated will reduce the potential for impact from computer-related sources. - ✔Computer based actions is a process by which data is encoded so that only persons with a decryption code may unlock and retrieve stored messages. - ✔Encryption Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days. - ✔Cold sites Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days. - ✔Warm sites Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours. - ✔Hot sites Offsite facilities shared with other organizations for the purpose of disaster recovery, requiring only adequate or prioritized staffing, but at a cost shared with another organization. An obvious disadvantage and risk is that multiple tenants affected by a common event may cause a conflict. - ✔Shared hot sites are moral principles and concepts, rules of behavior, and often the underpinning of codes of conduct based on accepted standards of right and wrong. - ✔Ethics is a perceived, moral, or legal duty that someone possesses to control or handle a specific or general task. - ✔Responsibility is the application of responsibility or an obligation to accept responsibility. An example might be the person who has agreed to pay for a meal that she or someone else has consumed. - ✔Accountability is the legal state of being responsible. An example would be the CEO and CFO who have certified the accuracy and validity of financial documentation and who would be legally penalized should errors be found. - ✔Liability
Issues created by barriers to access, implying that some should have access while others should not. - ✔Accessibility issues Issues created by the trustworthiness, accuracy, and legitimacy of information. ✔Accuracy issues Issues created by the collection, storage, distribution, or mere availability of potentially sensitive information. - ✔Privacy issues Issues created by the association of rights of property ownership to tangible and intangible goods and information. - ✔Property issues says that computing power and storage capacity will continue to increase or double approximately every two years. - ✔Moores Law With the increasing use of computer-based information systems, an ocean of data has been collected, stored, and made available for a wide array of analyses. These analyses may be general or specific, potentially very intricate, and may expose information or nonobvious relationships and connections, leading to breaches of privacy and trust. - ✔Advanced Data Analysis Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it. Although the availability of information on a wide basis is generally a positive attribute, property rights and the propriety of information sharing may cause and perpetuate conflict. - ✔Advanced networking With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places. This availability of information allows benefits, such as localization and personalization, but direct and specific invasions of privacy require faster reputation management and for information controls in more places. - ✔Mobile Information Availability This big picture approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position. - ✔Common good approach This approach values individual moral rationality, otherwise referred to as the Golden Rule, or "do unto others as you would have them do unto you," asks society to reflect on the consistent treatment of others based on the desires of how an individual expects to be treated. - ✔Fairness approach
This approach values rights specified by society, which may be largely based on the analysis of other ethical approaches, and allows individuals to weigh decision choices based on legal or legislative precedent. - ✔Rights approach This approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual. - ✔Utilitarian approach This approach values human behaviors that allow us to act in aspirational ways, including compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, obedience, and many more. - ✔Virtue approach Schema is a planned design of the data organization. - ✔What is a database schema? Online transaction processing - ✔What does OLTP stand for? database applications enable businesses to store and analyze essential sales data ✔How can database applications help managers respond to changing market conditions? conceptual, logical, and physical - ✔Data models used when mapping business processes, relationships, and data requirements flexibility, consistency, and organization - ✔Benefits of database normalization structured query language - ✔What computer language is used with relational database applications? petabytes - ✔What is the typical data size of big data? improves decision making, delivers business intelligence - ✔Benefits of data warehousing to businesses getting data from data sources - ✔What is the definition of data extraction? dividing database for manageability - ✔What is the definition of a partition in database concepts? analyzing data to gain insight or intelligence - ✔Describe the process of data mining consolidation, slicing and dicing, and drilling down - ✔What are the basic analytical operations?
DBMS (database management system) - ✔What application does one use to query and administer databases? object-oriented are designed to store audio or mixed media, while relational links tables of records - ✔What is the difference between and object-oriented database model and a relational model? data access - ✔What is the best reason to implement a database for a growing business? pointers (or linked lines) - ✔What is used to show the relationship between data fields and tables in entity-relationship models? the process of building relationships between tables based on keys. - ✔Describe referential integrity one-to-one, one-to-many - ✔Types of relationships in a relational database model new drug discovery - ✔What is an example of big data analytics applications? data warehouse analysis leads to business intelligence - ✔What is the relationship between business intelligence and a data warehouse? direct-move - ✔What is the process of transferring data that does not need to be transformed to the data warehouse? data manageability - ✔What are the benefits of partitioning when maintaining a data warehouse database? knowledge discovery - ✔What is another term used to describe data mining? lengthy ETL load phase - ✔OLAP databases are multidimensional, that is, data sets are referred to as cubic. What is a disadvantage of a multidimensional database? businesses use databases to store employee, customer, and product data to help them automate processes and get useful information for quicker decision making. Can also lead to business intelligence when combined with market, economics, and other government regulations. - ✔Businesses uses databases for many reasons, so it is important to understand their basic fundamentals such as... primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables. - ✔What is the difference between a primary key and a foreign key in a relational database?
clickstream - ✔What is a series of human or user Web visitor page requests? Master data are objects shared across the enterprise. - ✔What is meant by master data in entity-relationship modeling? normalization - ✔What involves correctly defining keys, tables, columns, and relationships? allow easy access to information - ✔What is a key benefit to business organizations for using a relational database? algorithms - ✔What are used in most cases to look for relationships, patterns, and trends. a data warehouse subset focused on a single area or function - ✔What is a data mart? data cleansing - ✔What occurs during the transformation step in ETL? ETL load phase - ✔What are pitfalls when maintaining a data warehouse database? Data mining is used to analyze business databases, while big data analyzes big data sets. - ✔Describe the difference between data mining and big data? historical data - ✔What does predictive analytics use to better understand customers and other business entities in order to define areas of opportunities or areas of risks? information systems - ✔What accepts data as input? EIS executive information systems is at the top of the hierarchy. - ✔There are different types of information systems based on the different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies? technology - ✔Businesses face difficult decisions regarding their hardware needs. Constant changes in ___________________________ can lead to obsolescence. communication - ✔One reason IT is important is because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefit is this an example? online banking - ✔Information technology is used everywhere; where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what?
data - ✔One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida below the poverty line is an example of environment - ✔Internal and external elements that effect various parts of an organization, for instance the government, competitors, customers, and suppliers, are examples of what organizational feature? manufacturing and production - ✔Most large corporations have several information systems to support their functional business areas. The system that processes raw metal into car frame is... differentiating products, customer lock-in, and barrier to competitors - ✔Business strategy is how a business achieves its goals and outperforms its competitors. Strategic Information Systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include: new market entrants, substitute products, customers, suppliers, competitive rivalry ✔What are examples of competitive forces? a collection of loosely coupled, interdependent industries that provide related services and products across many industries. - ✔What is a business ecosystem? the cooperation of two or more companies to gain efficiency and growth - ✔Define synergy standardized business procedures that allow for more consistency within the business and remove redundancy. Typically uses one database to store all information needed by various business units and increases operational efficiency. Implementing this system and automate tasks so employees could do their jobs more efficiently. - ✔ERP (enterprise resource planning) focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs. For a new business, to collect customer information online and at the register and to consolidate and merge the information to better serve customers. Your boss asks you to collect zip codes for every customer who purchases something in your store and then generate a report to show where they all come from so he can market to the low zip code areas. - ✔CRM (customer relationship management Network of businesses that are connected to provide products and services more efficiently to customers, accommodate rapid growth, and meet requirements of retailers and distributors. Lower costs, improve collaboration, reduce cycle times, respond to conflict, forecast demand, and manage product flow. Diane's Designer clothing wants to be the price leader in the industry by cutting out the middleman, renting warehouse
space, producing easier clothing designs, and bringing products to market in less than 3 weeks. - ✔SCM (supply chain management) supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets. Employees sharing of their expertise and best practices across business units. - ✔KM (knowledge management) provide vision and leadership for IT initiatives - ✔What is the key role of the CIO code software to solve problems or perform tasks - ✔What does a software engineer do? network of physical devices exchanging data in real-time with embedded chips to communicate performance over the internet. - ✔the IoT (internet of things) is a growing topic in business and a hot IT career field. What best describes IoT? allow for distribution of information with external business entities, allow mobile and external resources to access information which allows for better communication with business partners and a good use of information technology - ✔How does the use of internet-based technologies help businesses? scope - ✔What is included or defined in a project, including goals, deliverables, costs, and deadlines? customer satisfaction - ✔What is an intangible benefit when evaluating information systems cost and benefits? information management - ✔What is the application of management techniques to collect, communicate, and process information in order to make better management decisions? easy access to information - ✔What is both an advantage and disadvantage to information management? architecture - ✔The _________________ of a global information system is the basic structure of the information required to coordinate international business activities. standards - ✔Global business challenges are typically no worse than domestic business challenges except for the distance. What problem can be alleviated by knowing the challenges up front? transnational, multinational, franchisers, domestic exporter - ✔What are the for main global business strategies that form a global firm's organizational and information systems structure?
data - ✔Information systems accept _______________ as input. DSS - ✔Which system helps support business decision making activities by manipulating and building upon the information from the systems below it in the hierarchy? software - ✔Various types of _____________________ enable companies to utilize their information systems hardware and networks more effectively. cost effectiveness - ✔IT is important because it helps businesses streamline processes that increase productivity and profits. What IT benefit does this exemplify? social networking - ✔Allowing people to connect and express themselves, from the comfort of their computers, when otherwise they may have been too shy or introverted to do so, is an example of what? information - ✔The number of people in Florida with incomes below the poverty line increased in the city of Tampa between 2010 and 2015 is an example of _______________________ . culture - ✔Values and behaviors that contribute to the social and psychological wellbeing of an organization are examples of what organizational feature? accounting and finance - ✔What is the system that tracks and processes company revenues, purchases, and payroll? serve organizational goals - ✔To be a strategic information system, an information system must ______________________ . new market entrants, substitute products, customers, suppliers, and competitive rivalry ✔Porter's 5 competitive forces include associate with other companies, without being physically tied to them - ✔One networkbased strategy is that of virtual companies that can do what? - ✔Teamwork is used in business to motivate employees to work harder and be more productive. This is an example of a _______________ where employees show commitment to team goals and work effectively, collaboratively, and cooperatively with others to reach desired outcomes. maintaining corporate security, both physically and digitally - ✔What is the main role of the chief security officer (CSO)?
analyze and modify software systems, implement and test programs, and document software requirements - ✔What is the main role of the software analyst? information security analyst - ✔Who is responsible for the risk and vulnerability assessment to prevent security breaches of company or government data? enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer - ✔Who does good IT planning help an enterprise achieve a competitive advantage? delivering quality systems on time, managing the budget, and planning for the unexpected - ✔Why is project management essential for managing information technology? all aspects of cost from the inception to decommissioning, along with associated maintenance, upgrades, support, and training. - ✔Total cost of ownership (TCO) is a useful strategy when evaluating information systems costs and benefits. What does TCO entail? keep passwords private, be alert to impersonators trying to get your information, and read privacy policies. - ✔What is a good management technique for securing information? college computers, logins, network access, help desk support, and keeping the technology maintained, upgraded and secure - ✔What is information technology management responsible for in a college setting? - ✔Developing international networks has a few problems today because of the variation in global computing ___________________ . Only some of the core systems should be shared initially, and then gradually share some of the other systems, but only if they share key elements. - ✔What is one management solution to overcome global information system challenges? the internet - ✔What is the biggest impact to global business? Information - ✔Data is input in a computer and then processed into _______________. MIS (management information systems) - ✔Which system helps managers manage their departments more efficiently? facilities - ✔What are needed for information systems infrastructure? hardware and software - ✔What are two examples of information technology?
product development - ✔IT is important because it helps ensure new, quality products reach the market faster and to more customers and suppliers. This is an example which IT benefit? online learning - ✔Learning and research with a computer and the internet from anywhere, anytime is an example of what? knowledge - ✔Understanding why the poverty line increased in the city of Tampa is an example of politics - ✔Pursuing individual interests or agendas in an organization without regard for company goals is an example of what organizational feature? human resources - ✔What is the system that helps improve employee productivity by managing the workforce? perform a strategic analysis - ✔When determining business benefits from implementing a strategic information system, several factors need to be considered. Businesses need to consider their business objectives, look at who their customers are, create justification for the project and then seek support. What would be the first step in determining benefits? new market entrants, substitute products, customers, suppliers, and competitive rivalry ✔Porters 5 competitive forces include consequential - ✔What does network economics see the cost of adding new members as? network based thinking, pooling resources, and expanding contracts to be more successful and competitive - ✔What does network strategies involve? - ✔13. The idea behind ___________________ is that the output from one area is used to create input for another, thereby lowering costs and generating more profit. typically second in command, also known as the vice president of operations. Reports to the CEO or president and makes sure all company operations run smoothly. - ✔CIO (chief information officer) make team assessments and evaluations, demonstrate leadership and have good communication skills, establish project milestone and deliverables - ✔What are the responsibilities of a project manager?
manage company workflows, identify and fix network issues, and maintain equipment and software - ✔What is the role of the computer systems administrator? processes and employees - ✔What are the key factors to consider when planning and organizing information technology in business? quality - ✔What is the variable in project management that must be monitored when managing information technology to ensure it is completed on time, within budget, according to specs, and with high quality and low risk? risk transference- shifting the risk to someone or something else. - ✔Purchasing homeowner's insurance in case of a fire or hurricane is an example of what? the management of resources that facilitate access to information - ✔What is information technology management concerned with? the ability to collect, organize and process data from internal and external sources and distribute the resulting information to support decision making and business processes. - ✔What is an advantage of information management? management and coordination, production, operation, supply, distribution, global customers, and global marketing - ✔What are the major contributions or factors that drive global systems and the internationalization of business? introducing business process changes slowly will make the transition to the new system less disruptive, and there will be less resistance to the change - ✔What is a management solution when developing global systems? - ✔What is the first step before establishing global information system strategies? synergy - ✔The output from area is used to create input for another, thereby lowering costs and generating more profit is what? one record or data set in a row. A record in a row or table - ✔What are tuples and how are they used in databases? single table database - ✔What is the description of a flat file database? data is accurate and consistent through its use and application time - ✔What is data integrity? ERD (entity relationship model) describes the data and map processes to data requirements - ✔A database schema can be represented by which model?
normalization - ✔What takes place during the database design process to eliminate data redundancy? they are simpler table relationships than hierarchical databases - ✔Why did relational database models replace hierarchical database models in business applications? petabyte - ✔What size is big data database considered? they can be mined or analyzed for trends or patterns - ✔Why are data warehouses beneficial to business managers? a process to ensure data is not corrupted - ✔What is the definition of data integrity? reduce - ✔It is a good practice to _________________ data that is backed up on a regular basis. analytics would affect the database performance - ✔Why is it not good practice to perform analytics on an online transaction processing database? predictive analysis - ✔What can be used to predict future outcomes or trends, but it does not tell you what will happen in the future? data dictionary - ✔Where would metadata about customer and product tables be stored? what happens when the same attribute has different values because the data is stored in more than one location - ✔What is data inconsistency looks for patterns that indicate customers' shopping behavior in order to target marketing efforts - ✔What does classification do? confidentiality, integrity, and availability - ✔What do the letters CIA stand for? corrupted data - ✔What data should be scrubbed so that they are consistent with the design of the database? channels and analyzes to assist executives in making orders, pricing, and inventory decision. - ✔What is supply chain management software used for? energy usage and reduces the operating costs in an organization - ✔What does EMS (energy management system) manage? Query language - ✔What is used to retrieve specific data from a database?
reporting- generate reports that have information or business intelligence - ✔What are OLAP databases used for? records where a user clicks on a web page - ✔What is the definition of clickstream? - ✔What is the definition of an entity in a database? eliminates data redundancy, reduces data complexity - ✔What are reasons to normalize a database? hierarchical - ✔What kind of database is a tree-like structure? volume, velocity, variety - ✔What are the 3 V's used to describe big data? Used to analyze a business unit, or a single unit - ✔What is a data mart business application? presentation and staging - ✔What are two key elements that make up the data warehouse? - ✔What is the difference between data mining and analytics? data mining, predictive analytics, OLAP - ✔What are the categories of business intelligence? Product ID - ✔You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. What would be an appropriate field to sort the data? field- describes one piece of information for each record. - ✔Sarah is a sales associate at a major bookstore. A customer calls the store to order a book, but he could only remember part of the book title. So, Sarah logs into the bookstore's DBMS and searches the book title _______________ for a listing of the book database integrity - ✔Companies must maintain _______________ by keeping their data safe from unauthorized changes. data administrator - ✔Who is in charge of determining and monitoring the employees' access to the company's DBMS? database administrator - ✔Who is responsible for checking on an employees' access to the company's database?
data governance - ✔What defines the policies and processes to manage and maintain the data integrity and security of a government agency? information management - ✔What is the application of management techniques to collect, communicate, and process information in order to make better management decisions? Data cleansing and normalization - ✔For the DBMS of a financial institution to function properly, ____________ should be performed after a data quality audit on tables that are merged or imported. Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the internet. - ✔What is the difference between data mining and web mining? redirect/redistribute funds, build schools, approve commercial sites, demographic analysis to predict sales - ✔What can a GIS (Geographic Information System) be used for? schema - ✔A _____________ is a planned design structure database databases that contain multimedia files or executable code in records or fields. - ✔What is an object oriented database? mobile devices or laptops - ✔How does web-based databases allow users to access information? logical, physical and analytical - ✔What data models are used by businesses to map processes to data requirements? 1NF, 2NF, and 3NF - ✔What are the 3 norms in normalization? single table with no structured relationships - ✔What is a flat file database? the speed required to process or analyze big data - ✔What does velocity mean when describing big data? data warehouse - ✔What enables analytics of operational data from various sources? ETL (extraction, transfer, and load) - ✔What is the process associated with data warehouse updates and backup? partitioning is done to improve performance - ✔Why is partitioning done when administering relational database systems?
a multidimensional database that is used for analyzing business data to discover and gather business intelligence - ✔What is OLAP (online analytic processing) turns raw data into meaningful information based on the criteria specified by the user. ✔What does the query function do? They display data in a structured format - ✔Why are DBMS reports a valuable database tool in helping managers make business decisions? analyzes a series of values in order to predict or forecast the value of other variables. ✔What does forecasting software do? making sure that all data values are correct, accurate, and consistent - ✔Define data integrity - ✔Who is responsible for acquiring, organizing, and distributing information for the organization? retrieve - ✔Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access can __________________ data from the server corrects or removes duplicated, incomplete, or inaccurate data - ✔What does data cleansing do? breaks a big table into several smaller tables, which will in turn modify the structure of the existing or any new tables - ✔What does data normalization do? Non-relational database - ✔What are used to handle large amounts of data in a database, and the databases can be stored in multiple locations? relational database - ✔What data is stored in related tables that can be accessed and joined in many different ways without having to reorganize the tables? traffic, locations, taxes - ✔Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which data is most useful in a GIS to help fight crimes? By providing information about the company's vision, mission, and community efforts. ✔How does the internet help to improve a company's reputation? social e-commerce allows customers to shop and buy products online. - ✔Social ecommerce has become an important internet tool for businesses to connect with their
customers. Which of the following is not a benefit for companies to use social ecommerce as a business tool? Buying digital goods online makes the buyer more prone to online fraud. - ✔What is a disadvantage of buying digital goods online? mobile phone apps and games, free product samples and trial versions offered to users, product quality and available features can be tightly controlled - ✔Freemium is not a new concept in doing business. What is true of freemium? It is a single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations - ✔Definition of a private industrial network small in comparison to private industrial networks, online platform host where transactions may take place between a seller and a buyer, provide more of a focus on individual transactions versus lasting relationships - ✔What are characteristics of a net marketplace buyer profiles, behaviors, and demographics - ✔What is considered when determining the target audience of e-commerce? corporations - ✔What business structure is an individual not help personally accountable for any liabilities, risks, and debts from business operations? Caseficio Scalabrini - ✔What is a successful business that uses big data to find flaws, boost production, and rootlet counterfeiters? internet and databases - ✔What factors help e-business accurately target individual customers? connect - ✔The first internet social media site was Six Degrees in 1997. Six Degrees was a social network site that allowed users to develop an online profile to __________________ with other users. real time - ✔Social media has enhanced customer relationship management by enabling companies to best educate customers about new and existing products and services in ____________________. a social media communication strategy - ✔Despite security risks, businesses must implement what? employment and occupation related - ✔LinkedIn posts and profile information is typically about what?
Job recruiters - ✔_________________ have mentioned that inappropriate or provocative photos or information and evidence of alcohol and drug abuse, by the job seeker revealed during social media search can negatively impact employment opportunities promote and market their organizations - ✔Businesses, news networks, government agencies,and nonprofit organizations are all actively using social media to primarily do what? viral - ✔How does social media enable distribution of information? trend analysis - ✔What reveals the patterns of behavior, such as currency fluctuations, which can affect a stock or an entire industry or market? facebook - ✔Instagram, Pinterest, and Snapchat have experienced significant user growth, but still trail _________________ in number of users and user management. to entice potential customers to shop, to educate stakeholders on product status, specifications, features and capabilities, and to inform customers of upcoming sales and events - ✔What are reasons for providing company information on the internet? create direct channel for doing business, advertise through product or brand marketing using integrated applications, and develop salable mobile applications - ✔How can mobile e-commerce help businesses actively market to their customers? they are very difficult to return - ✔What is a disadvantage for purchasing digital goods? provide a venue for the sale of physical goods, can be traditional brick-and-mortar retailers - ✔What are e-Tailers? a major corporation in the industry that can provide leadership and resources to the smaller counterparts. - ✔What is a private industrial network? provides more focus on individual transactions versus lasting relationships - ✔What is a characteristic of a Net marketplace? corporations - ✔What business structure is a legal entity that can encompass a big number of shareholders? Google - ✔What business earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses? competitors' public pricing information - ✔Besides customer attributes, what factor can be used by an e-business to accurately price goods?
targeting - ✔Social media benefits to businesses are made possible because social media offers both location specific and time time specific ____________________ . A method used by hackers to develop a relationship to trick employees into revealing confidential information or passwords. - ✔What is social engineering? A database of possible employees or candidates - ✔What is LinkedIn? internet search and social media sources - ✔What do hiring managers use to identify inconsistencies in a candidate's background? usually hold a bachelor's degree, have digital marketing experience, and excellent communication skills - ✔Traits of a social media marketing manager participate, share, shape, and influence discussions - ✔What are discussion actions that social media users can perform while immersed in an activity or current event? speed is the ability to share information in seconds, and amplification is the re-posting news in a community. - ✔What is meant by speed and amplification in social media? to educate stakeholders on the company's mission and vision, production information, and community efforts - ✔What is the primary purpose for publishing company information on the internet? by employees who travel a lot for business - ✔How are portable decision support systems utilized? they can be purchased and downloaded instantly, they do not have a physical presence to acquire - ✔Digital goods provide several benefits for e-commerce. What is a benefit achieved from digital goods? digital pricing strategies - ✔Freemium involves what? operational efficiencies - ✔What helps e-businesses respond and react quickly to changes within the business environment, more than their traditional brick and mortar counterparts? to find flaws, fix processes, and boost efficiency of its production - ✔How does FedEx use big data? age - ✔What customer attribute is not helpful for accurately pricing goods to increase profit margins?
social media - ✔What do you call the web-based applications that allow user content to be created and shared over the internet? product marketing - ✔What can be disseminated to millions of consumers through social media, reducing marketing costs compared to traditional print, radio, and television advertising? social engineering - ✔What is the method used by hackers to develop a relationship with users in order to extract information? the entire recruitment community - ✔Who does the the LinkedIn model benefit? Any post or activity that represents discriminatory behavior - ✔What social media activity should be avoided by job seekers? people can use this medium to influence reserved bystanders - ✔How do social media platforms play an increasing role in shaping events? 65 years and older - ✔Although teen usage of social media exceeds that of adults, what adult demographic is experiencing an increased use of social media, with 31% of members of that age group reportedly using social media? system development life cycle - ✔The six formal steps that need to be followed to develop an information system is known as what? automation, rationalization, process redesign, and paradigm - ✔What are the four categories of an organizational change? end user development - ✔What method uses 4th generation computer languages? system design, programming, testing, conversion, and production and maintenance ✔What are the stages in the waterfall model? technical and economic - ✔What is a component of a feasibility study? have the most experienced workers complete tasks on the critical path - ✔ABC playground company has been asked to build new playground at a local elementary school. The project must be completed before the first day of school. What steps would increase the likelihood of finishing the project on time? a general purpose modeling language (unified modeling language) - ✔What is UML economic, compatibility, limitations - ✔What is a key factor to consider when evaluating system alternative?
resistance to change, user, technical ability - ✔What are the factors that must be considered when implementing anew information system? ICR (intelligent character recognition) is an intelligent or advanced form of OCR. (optical character recognition - ✔What is the difference between ICR and OCR? fix bugs, are expensive and time consuming - ✔What are software patches? A company's general evaluation of their MIS is to analyze the system performance against outlined objectives. - ✔What is the purpose of a general MIS evaluation? employees - ✔There is a higher chance of failure in information system projects if ________________ do not use and leverage the system on behalf of their organization. it is characterized by noticeable impact to the organization - ✔What is considered to be low level security risk during system post implementation? business - ✔A systems analyst should try to have an understanding of _________________ processes. they must be able to communicate system capacities and benefits. - ✔Why must a systems analyst be a good communicator? action specific verbs - ✔Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication? workbenches - ✔What category of CASE does Microsoft Visual Basic fall under? internet - ✔Which of the following is a great, free, and ubiquitous source of information for systems analysts? public, private, and hybrid - ✔What are the classifications of cloud computing? define problem, develop alternatives - ✔What are steps in the decision-making process? discovery - ✔The intelligence phase in the decision making process consists of the ____________________, identification, and understanding of the problem. transactional processing systems - ✔What type of management information systems do operational and middle management use for structured decisions?
databases, data warehouses, and analytics - ✔Business intelligence consists of what? it serves as the depository of all extracted data for the load function of the data warehouse - ✔What is the function of the data integration service in business intelligence? it provides automated data collection and reporting reducing labor cost - ✔How does a corporation benefit from a business intelligence program? business process - ✔When using the balanced scorecard method, quality would fall under what measurement? the consequences of an event - ✔What is the meaning of outcomes in decision theory? it provides high level information in KPI format for executive level monitoring and decision making. - ✔How does executive management use executive support systems (ESS)? Group decision support systems (GDSS) - ✔Executive management,who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision support system? production and maintenance - ✔System development life cycle (SDLC) consists of 6 stages. What is the last stage? detailed staged process, ability to monitor large projects - ✔What are benefits of using SDLC when implementing an information system program? 4- user basic requirements, development of prototype, using prototype, and revising prototype - ✔How many steps are in the prototyping software development method? identify user system and software requirements - ✔What is the objective of the systems analysis stage in the waterfall method? a study to determine economic feasibility - ✔What is the total cost of ownership? (TCO) helps the CPM visualize the activity diagrams that define the critical path - ✔What does WBS (work breakdown structure) do? a type of data diagram - ✔What is the definition of a systems analysis logical model? a modeling language used to help model systems - ✔What is UML?
modular design, decision tables, decision trees - ✔What are process description tools? communication and training - ✔How are user expectations best managed during system implementation? manual or automated - ✔How are methods of data capture categorized? conversion, development, testing - ✔What are the systems implementation phases? functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, user satisfaction - ✔What are factors that influence the success of an information system? budgets are reduced, and the implementation team takes on new tasks. - ✔Why is providing user support after system production a challenge? The process of identifying, analyzing, and responding to risk - ✔What is risk management in system security? analysis, design, and implementation - ✔What is the overall job function of the systems analyst? the user knowledge and background of target audience - ✔When communicating, what is important for IT professionals to understand during the system development process? when conveying documentation - ✔When should oral communication be avoided? the integrated environments type of CASE tools - ✔What is the most common SDLC analysis? audio files that contain educational content - ✔What are podcasts, and why are they a good source of information for systems analysts? systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams - ✔What does Microsoft Visio enable? decision making - ✔What is the primary role of information systems managers? the classical management model supports planning and controlling - ✔What best describes the classical model in management decision making? ESS (executive support systems) - ✔What systems do upper management use for decision making?
data mining, modeling, statistics, OLAP - ✔What tools and techniques does business analytics consist of? benchmarking and metrics - ✔The measurement function of business intelligence creates a hierarchy of what? help align the organization with business objectives - ✔What must an effective business intelligence platform accomplish? goal selection, attainment measurement, and achievement intervention - ✔What are the 3 primary activities associated with business performance management? levels - ✔A decision tree tool is not viable when data contains a different number of internal enterprise data, as well as external data from financial, industry, and trade databases - ✔What type of data is included in executive support systems? (ESS) Group decision support system (GDSS) - ✔What system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making? methodical and process oriented - ✔In systems modeling and design, the structured systems model is _________________ allowing users to experiment with the system during development. - ✔What is one way to define user requirements? scrum - ✔What method can address unexpected changes or challenges that cannot be addressed effectively with SDLC? software development, proving, and integration - ✔What does the programming stage in the waterfall method of software development focus on? an analysis to determine if a proposed system is possible, evaluates cost, return on investments, and the likelihood of project success. - ✔What is the relationship of a feasibility study to an information system development project? a comprehensive list of all activities needed to complete a project. - ✔What is the work breakdown structure (WBS)? 1st. collect information about the proposed system, 2nd. development of functional flow diagrams, functional specifications, and a flow dictionary, 3rd. functional flow diagram
presented to customer, user input obtained, model is revised, and user approval is obtained - ✔What are the steps in building a logical model of a system? brainstorming - ✔What is an alternative tool that requires a group of users to collectively review and analyze the alternative, prior to making a decision. project structure, size, and team technical background - ✔What are 3 levels of risks associated with system design and implementation? input - ✔In information systems, what is the act of capturing data for processing called? documentation - ✔What step in system implementation documents all system specifications to evaluate the quality and functionality of information and output - ✔What is the focus of a functional evaluation of a management information system? Lack of training or acceptance for new system - ✔Why do users fail to adopt new information systems? the measurement of probability and consequences of risks - ✔What is qualitative risk analysis? arbitrator and consultant - ✔What is a primary role of a systems analyst? communication style - ✔North americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in what? jargon and terminology - ✔What should be avoided in effective written communication? CASE (computer aided software engineering) - ✔What combines multiple tools or workbenches to support the complete software cycle? webbed formats used by publishers - ✔What is a rich site summary (RSS)? enabling collaboration and interaction among users - ✔How does Web 2.0 sites create a virtual online community? structured - ✔What kind of decisions involve an established procedure, are repetitive and routine, and can be handled in the same manner each time? the unpredictable and less systematic aspects of decision-making - ✔What does the behavioral model hope to a accomplish in management decision making?
interpersonal roles, decisional roles, informational roles - ✔What are the categories from Henry Mintzberg's management behavior roles? A method or algorithm that uses statistics and data mining to forecast models. ✔Describe predictive analytics. common functionalities of business intelligence - ✔What are measurement, analytics, reporting, collaboration, and knowledge management? provides real-time, relevant, and user customized information that is easily shared ✔How does business intelligence make information actionable? a tool used by management to track and monitor staff and organizational activities ✔Balanced scorecards are often used in business. What is a balanced scorecard? fiber optics, ethernet, radio frequency - ✔What is the required mediums for communications TCP/IP - ✔What is a universal telecommunication network protocol that most operating systems can recognize? - ✔A router connects data links from a single network and transmits data packets between An expensive application used by large businesses to improve computer network performance without having to physically change the network. It is not necessary for small businesses - ✔What is a hypervisor? packet transmission and TCP/IP protocol - ✔What are 2 fundamental protocols that can describe modern telecom networks? transmit discrete, parsed data in small packets - ✔Packet switching refers to a computer networks ability to do what? to capture this new community of users and to address issues of social care - ✔Why is it imperative that modern businesses have a social media marketing strategy? client/server configuration - ✔What configuration does the server control the traffic going back and forth the network, thereby maximizing the traffic on the network. SMTP (simple mail transfer protocol) the popular mail protocols include IMAP and POP3 - ✔Electronic communications has predominantly become the primary form of communications in first world countries. What protocol is used to mange and monitor the massive amount of emails that we receive every day?
To increase the number of unique IP addresses - ✔The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose? VPN (virtual private network) - ✔What is a secure tunnel through the internet using a public infrastructure? a secure platform for internal use - ✔A reliable intranet connection provides organizations and their suppliers and vendors with __________________________________ telegraph technology - ✔What led to the innovation of the telephone? because users have more flexibility than they do with VPN - ✔Why has cloud computing become more popular? 100,000 kbps - ✔What is the typical broadband data speed of a 4G network? A hacker attempt to tie up network host resources making them unavailable - ✔What is a denial of service attack? 1G enabled mobile voice telecommunication while 4G offers voice, data and video ✔What is the primary difference between a 1G cellular network and the current 4G network? a signal strength detection process to identify the best wireless access point locations. ✔What is a radio frequency survey? it is a tunneling encryption protocol that secures wireless data transmissions - ✔Why is WPA critical to wireless networks? Wireless Sensor Networks - ✔What does WSN stand for? radio waves over the radio spectrum - ✔What does wireless communication use to send and receive signals? circuit switch - ✔When streaming data or voice, which type of switched network is used? data terminal equipment - ✔What is another name for a network host? connect each user in a network directly - ✔What are peer-to-peer network topologies? 7- physical, data, network, transport, session, presentation, application - ✔How many layers are in the standard OSI model?
they carried continuous electronic waveforms - ✔What is a characteristic of a legacy or old analog network? all devices connected to the internet with sensors to be automatically re-filled or serviced when needed - ✔What is the IoT (internet of things) banking transactions must be encrypted to be safely communicated over the internet ✔For an individual or a business, data can be uploaded to the internet in many forms. What data should not be communicated on the internet? URL (uniform resource locator) - ✔A web browser is required to surf the internet. What other protocol is needed by a client computer to request a web site via HTTP or HTTPs? 25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP - ✔Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network? smartphone - ✔What portable device combines the functionality of the phone technology with the computing of a desktop or laptop? interact with suppliers, often via an SCM - ✔What is a benefit of an extranet? web enabled storefront - ✔What application provided by the internet allows an online retailer to conduct business? more complexity due to the need for more systems and better improvements in their processing capabilities. - ✔The internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what? cellular wireless standards - ✔The term "generations" is used to describe changes in which type of technology? passwords and Login ID's - ✔What information can be gained by sniffing a wireless network? packet switched data networks - ✔What does PSDN stand for? more scalable than wired networks. - ✔Wireless LAN networks are _____________ it allows visitors to access the internet - ✔What is an advantage of a wireless LAN?
RFID - ✔What technology is used to track inventory and can be read hundreds at a time, even if the tag is covered? copper building wire - ✔What is not practical for telecommunications, especially with the advent of wireless? used to measure performance of data communications - ✔What is QoS? monitor network traffic - ✔What is the purpose of a network sniffer? connect large business to backbone of internet - ✔What is the definition of a core router? application, presentation, session, transport, network, data link, physical - ✔What are the 7 layers of the OSI model? a discrete, non continuous electrical waveform - ✔What is the definition of a digital signal? smart phones - ✔What will soon surpass desktop computers accessing the internet? instant message - ✔While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which internet application? IOS (International organization for standardization), ARPANET (creator of the original internet in 1967), IETF (internet engineering task force) - ✔Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. What are the 3 governing bodies that recommend and decide communications standards? 142 and 212 - ✔Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider? internet - ✔Among all the connections- internet, intranet, and extranet- which is the most widely used channel for business? (EDI) Electronic Data Interchange - ✔What application provided by the internet allows a business to transfer documents automatically without human intervention? secured access - ✔May businesses require their employees use VPN to gain remote access to the corporate network. What is an advantage of VPN?
2.4Ghz - ✔Bluetooth is a wireless protocol that connects nearby devices with peripherals at what spectrum band? denial of service - ✔What is the act of bringing a network host down? scalability - ✔What is the ability of a network to grow user and services without forklift upgrades? productive - ✔RFID technology helps companies to be more ______________ with inventory management because they eliminate the need for physical handling of materials during cycle counting.