WGU C724 Study Test Bank

Page 1

WGU C724 Study Test Bank Data - ✔Symbols or signals that are input, stored, and processed by a computer for output as usable information. Hardware - ✔the physical equipment and devices that make up a computer system and are connected by networks. Includes input, output, and storage devices. People - ✔are the information system professionals and users who use computers Software - ✔Made up of programs and instructions to run your computer and network. Network - ✔a system of computers joined together so they can communicate and share resources. Processes - ✔Processes and procedures provide a structured sequence of activities to govern the use, operation, and maintenance of IS. Executive Information System (EIS) - ✔This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify longterm trends. Decision-Support Systems (DSS) - ✔focus on supporting all phases of specific decisionmaking processes and procedures for arriving at a solution. The Four Components of Decision-Support Systems (DSS) - ✔data, model, knowledge, and user interface management. Management Information Systems (MIS) - ✔represent a category of information systems that serve low or first level managers and are usually focused on short- to medium-term business decisions. The Five Components of Management Information Systems (MIS) - ✔hardware, software, database, network, and people. Transaction processing systems (TPS) - ✔collect, store, update, and retrieve transaction data within an organization and is used by middle management. Key Performance Indicators (KPI) - ✔are used by executive and upper management to see how the organization is performing in certain areas.


Executive Support Systems (ESS) - ✔use internal and external data to help executives make unstructured decisions. The Four Components of the Executive Support Systems (ESS) - ✔hardware, software, user interface, and telecommunications. Information Systems - ✔an integrated network of components that provide managerial and operational support to businesses by collecting and processing data into useful information as well as providing for storage, retrieval, and security of data and the information it's transformed into. Information Technology - ✔refers to the hardware and software required to manage and deliver information. Information - ✔is the meaningful organization of data so that statements can be made about them. Major Reasons Firms Invest in Information Systems - ✔1. achieve operational excellence 2. develop new products and services 3. attain customer intimacy and service 4. improve decision making 5. promote competitive advantage 6. ensure long-term survival 7. develop strong relationships with suppliers An information system can provide solutions to problems and economic value to a business. Information Management - ✔is concerned with collecting, managing, manipulating, organizing and reorganizing, and distributing information from a variety of sources to a variety of audiences in an organization. Data Cleansing - ✔ensuring data accuracy and integrity by correcting inaccurate information and deleting erroneous or duplicate data. Information Technology Management - ✔is concerned with the management of resources that facilitate access to information. Major Business Functions Provided by Information Systems - ✔accounting and finance Human Resources Production and Operations Sales and Marketing


Strategic Information Systems - ✔provide tools used by an organization to accomplish specific tasks in order to gain a competitive advantage in the marketplace. Porter's 5 Forces Model - ✔that helps companies develop competitive strategies using Information Systems. Includes new entrants, substitute products or services, bargaining power of customers and suppliers, and competitive rivalry. Value Chain - ✔a set of inputs used by a strategic information system and put into meaningful outputs to help a company gain a competitive advantage in the marketplace Network Economics - ✔the cost of adding another business participant to a business venture is small, the potential gain is great. Virtual Company Model - ✔Networks of people and resources join together to provide a service or create a product without the traditional storefront boundaries. Business Ecosystems - ✔A network of businesses, such as suppliers and distributors, that are involved in providing delivery of a service or product through cooperation. Network-Based Strategies - ✔create mutually beneficial partnerships between businesses. Product Differentiation Strategy - ✔this strategy can include offering a higher quality product or service. a) A core competency is an activity for which a business is a marketplace leader. b) Synergy is the cooperation between several businesses to produce a better product or service than would be possible if each business worked independently. Companies must clearly understand their strengths and weaknesses and join forces with other companies to create positive synergy. Growth Strategy - ✔can include adding new products or new enhancements to existing products and can also include acquisition, where one business purchases another. Enterprise Resource Planning (ERP) - ✔systems tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive IT system to allow for more focused system wide decisions. Customer Relationship Management (CRM) Systems - ✔uses technology to merge marketing with business processes to strengthen customer relationships and organize customer information (likes, dislikes, and previous purchase history). Supply Chain - ✔is the sequence of processes involved in getting raw materials for a product all the way to the production and distribution of a product into the hands of the customer.


Supply Chain Management (SCM) System - ✔works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer. Knowledge Management Systems (KMS) - ✔uses technology such as the Internet, collaboration software tools, and databases, to facilitate the capturing of corporate data and helps companies deal with personnel turnovers and rapid changes. Chief Executive Officer (CEO) - ✔is responsible for the success or failure of the company, creating the company culture, and setting strategy and vision. Chief Operating Officer (COO) - ✔oversees the daily operations in a business and communicates the organization's mission statement to employees. Chief Financial Officer (CFO) - ✔manages the company finances. Chief Information Officer (CIO) - ✔is the company's top technology leader and focuses on the people and technology needed to run a company and serves as the technology infrastructure manager for the company and oversees information systems matters. Chief Technology Officer (CTO) - ✔has the responsibility for implementing technology strategies. Chief Security Officer (CSO) - ✔is concerned with overall security functions for a business. Network and Computer System Administrators - ✔install and repair computer systems, as well as identify and fix network issues. Information Security Analysts - ✔are responsible for the security of a company's network, data, and information. Database Administrators (DBA) - ✔build databases to store data to meet business needs and are responsible for all three functions including focusing on security and access requirements, designing, and performing testing to ensure performance. Database Technical Specialist - ✔must know how to capture and use the company's data. Web Developers - ✔are responsible for creating and maintaining a company's website. Computer Programmers - ✔Someone who writes code to instruct computers to perform certain tasks.


Software Engineer - ✔is a higher level computer programmer. Someone in this position not only writes the code but is responsible for designing a new application, developing specifications, overseeing the implementation, and supporting users after implementation. Computer Support Specialist - ✔provides technical support to customers and employees through direct interaction or telecommunications. The support could be through training or troubleshooting technical issues. Computer Systems Analyst - ✔their job is to analyze a user's needs and determine the most efficient and effective solution and they combine their business knowledge with technical expertise. IT Managers, Project Managers, and Architects - ✔organize, direct, coordinate, and plan IT-related activities, people, and projects within an organization. Internet of Things (IoT) - ✔is the network of products (or things) that can be connected through the internet, communicate with each other and with the environment, and transfer data over a network. Platform as a Service (PaaS) - ✔is the capability provided to the consumer to deploy onto the infrastructure consumer-related or acquired applications created using programming languages, libraries, services, and tools supported by the provider. Infrastructure as a Service (IaaS) - ✔is the capability provided to the consumer to provision processing, storage, networks, and other fundamental computing resources. Software as a Service (SaaS) - ✔is the capability provided to the consumer to use the provider's applications running on this kind of infrastructure. Information Technology Infrastructure Library (ITIL) - ✔is a common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change. Agile Software Development Methodology - ✔is an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software. Relationship with Business Strategy - ✔The adoption or construction of an information system must be aligned with the organization's goals. Value Creation Through Technology Use - ✔Today's computer technologies, such as wireless sensor networks and cloud computing, allow organizations to create added value in nearly every industry and profession. As a result, several industries have been


created, along with many professions, jobs, and fortunes. Technology tools have evolved over the years to create value for business by facilitating calculations, documents creation, and graphs. Political and Legal Pressures - ✔response is to enact policies, complying to standards, and allying with experienced partners. Cultural Pressures - ✔response is by using ethical business practices, building strong cultural ties with stake holders, socially responsible, enacting sustainable business policies and practices. Technological Pressures - ✔response to these pressures by planning for improvements to reduce or manage complexity, creating faster and more accurate models to make better decisions, and innovating to sustain competitive advantages, to keep up with competitors, or to enter new markets. Economic Pressures - ✔response to these pressures by realizing the need to plan for or react to a changing workforce, powerful suppliers, customers, and/or competitors. Project Management - ✔is the application of planning, organizing, time management, leadership, communication, and problem-solving skills to accomplish an objective and deliverable on time and on budget. Major Components of a Project - ✔Time, Scope, Resources (cost), and Quality Risk Management - ✔involves determining the vulnerability, assessing the impact that risk would have if event occurred, evaluating cost/benefit analysis to avoid or transfer the risk, and implementing the plan. Analyze Risk - ✔first determine the impact to the business should that risk occur and the likelihood that this risk will actually occur. Acceptance Testing Process - ✔involves end user evaluation and review of the system in order to demonstrate that the system is ready to be rolled out. Risk Mitigation Planning - ✔where these are planned to be avoided, reduced, accepted, or transferred. Strategies for Managing Project Risk - ✔1. Risk Acceptance - Accepting that a risk will occur and doing nothing to avoid or prevent it. 2. Risk Avoidance - Developing an alternative plan for achieving objectives by avoiding a specific risk or risk category. 3. Risk Sharing - partnering with groups of individuals who have more experience and who will accept or absorb some of all of the risk involved.


4. Risk Reduction - Acting to reduce the potential for a risk to occur or affect damage to the project. 5. Risk Transference - Shifting risk to another party. Advantages and Disadvantages of Information Management - ✔1. failures and problems can be spotted before they become too expensive to handle 2. more information can be sorted, summarized, analyzed, and digested for decision making by fewer people. 3. the use of accurate reports and analytical data, both time and money can be saved by better selecting or reworking projects so that they have the best chance for success. 4. organizations must rely on experienced and expensive human and technological resources to create them or on the companies that supply them. 5. integrations into the various sources of data, as well as the data themselves, must be accurate, reliable, and be able to be maintained. Advantages and Disadvantages of Information Technology Management - ✔1. Brings order to chaos by providing structure, standards, policies, and protocols. 2. an organization can do a better job at competing within its markets, and effectively communicating with its stakeholders. 3. Once information technology (computers, peripherals, etc.) is implemented, support for these must be managed to minimize the risk of failure or obsolescence and to ensure that they are being properly used, managed, secured, and maintained by the people that know them. Global Exporting - ✔all services from the organization's home location means not changing the centralized structure and requiring all but production to stem from the centralized domestic location, including systems and data storage. Multinational Organization - ✔means that organizational divisions would be headquartered in different locations, whether partially with an international organization or completely with a transnational organization. Multinational franchising, licensing, joint venture, or foreign direct investment, or similarly branded, semi-independent organizations - ✔are controlled locally but coordinated (perhaps loosely) through the centralized organizations' structure. Information systems and data storage in this model is typically decentralized at each foreign location, or at strategic location(s) in the local region. Challenges to Global Information Systems - ✔1. Laws that limit information transfer, including trans border privacy and data transfer laws and other regulations. 2. Social and cultural norms. 3. Cultural particularism, which are societal norms instilled in populations that tie them emotionally to local brands or habits.


In developing information systems, organizations generally accommodate non-domestic developers by changing the structure of operations in these different ways - ✔1. Decentralized development, where developers in different locations develop their own solutions independently. 2. Duplicated systems development, where developers in the centralized location develop information systems and tools, which are then intended to be operated on similar systems at each of the international locations (Laudon & Laudon, 2012). 3. Networked development, where development and operations are planned, combined, and coordinated between international locations Global Information Systems Business Strategies - ✔Is any information system which attempts to deliver the totality of measurable data worldwide within a defined context. ENIAC - ✔30-ton 1,800 ft2 (sometimes called the "Great Brain"), the first generalpurpose electronic, digital computer used to calculate artillery ranges UNIVAC - ✔(room sized) and lighter (15-ton) derivative descendent of ENIAC, this is the first commercially available mainframe Evolution of Computers (Hardware) - ✔The earliest commercially available electronic, digital computer occupied a 20 foot by 40 foot room and consisted of 18,000 vacuum tubes. Vacuum tubes were replaced by transistors that were replaced by integrated circuits. a) First Generation: Vacuum tubes (1940 - 1956) b) Second Generation Transistors (1956-1963) c) Third Generation Integrated Circuits (1964 - 1971) d) Fourth Generation: Microprocessor (1971-Present) e) Fifth Generation: Artificial Intelligence (Present and Beyond) are bringing us capabilities such as voice recognition Floating Operations Per Second (FLOPS) - ✔Computing power is increasing as clock speeds get faster and more operations can be performed per second. Evolution of Software - ✔Before the late 1940s, reprogramming a computer with different instructions consisted of changing manual switches (as in on or off switches), wiring, or using punched cards to reconfigure mechanical components within them. a) From the first numerically based computer languages, such as FORTRAN in the 1940s and 1950s. FORTRAN stands for Formula Translation/Translator and is used for math, engineering, and scientific calculations b) English-like programming languages, such as COBOL in the 1960s. COBOL stands for Common Business Oriented Language and was the first computer software language for business applications. c) Java and C++ are examples of contemporary programming languages, with Java enabling online game development.


d) Integrated Development Environment (IDE) is a programming environment that provides tools, like compilers and debuggers, for developers to write code. e) Pseudocode is an informal high-level description of the operating principle of a computer program or other algorithm. It uses the structural conventions of a normal programming language, but is intended for human reading rather than machine reading. Pseudocode typically omits details that are essential for machine understanding of the algorithm, such as variable declarations, system-specific code and some subroutines. Input Components - ✔include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners. Processing Components - ✔include the central processing unit (CPU), which is the brain of the computer. Historically this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components. Modern CPUs have merged these components into an integrated design. Today, multiple-core processors can be used in tandem for a single computer, tablet, or smartphone. Supercomputers exist today that have the equivalent of millions of processors. Storage Components - ✔include primary temporary storage and secondary long-term storage devices. Random access memory (RAM) is temporary or short-term storage used by the processor. A hard drive is long-term storage that acts as a reserve aide for short-term storage or to store output data. Other storage includes peripheral devices such as external hard drives and removable media (floppy disks, optical discs, and flash drives). Output Components - ✔include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output). System Bus - ✔which is the medium through which communications between the input, processor, storage, and output occur. Motherboard - ✔is the device that contains the system bus and connects the various input and output devices that compose any given computer system. Network Interface Cards - ✔allow computers to connect to networks. Server - ✔manages network resources and services Handheld Scanner - ✔is one that is moved by hand over the material being captured (barcode scanner). Input Devices - ✔included now-archaic punch cards or magnetic readers and contemporary input, such as analog audio (e.g., voice recognition), keyboard input,


touch sensitive screens, biometric scanners (e.g., fingerprint, hand, or eye scanners), motion detection, optical character recognition (OCR) (e.g., from a document scanner), and image capture (e.g. from cameras or other imaging equipment). Output Devices - ✔includes document printers, audio output devices (i.e., speakers), visual output (e.g., monitors and televisions), and computer-aided design equipment. Central Processing Unit (CPU) - ✔contains the circuitry necessary to interpret and execute program instructions that allow a computer to function. Primary Storage - ✔are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed. Includes RAM, Cache Memory, and ROM, that is directly accessible to the CPU. DRAM - ✔the most common type of RAM and is used as system memory, when large amounts of RAM are needed. SRAM - ✔is used as cache memory, to access the most frequently used instructions and data more quickly. Secondary Storage - ✔is accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies. Tertiary Storage - ✔usually consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs. With the intention of storing unchanging data, regular and frequent snapshots or backups of data are placed on magnetic or optical media and then stored and/or removed from the automated system and archived. Personal Computers (PC) - ✔Small systems are used on an individual basis (i.e., oneperson use) and include traditional multi-component desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers. Workstation - ✔A more powerful system used by individuals in order to run more resource-intensive applications. Mainframe - ✔A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data. Supercomputer - ✔This term merely implies the fastest category of computer available and are built to handle vast amounts of information very quickly. Grid Computing - ✔A form of supercomputer constructed from many smaller systems that have been connected together.


Virtual Computing - ✔A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance. Proprietary Software - ✔is software where the source-code and development are controlled by the developer or a licensee. Examples include Microsoft Windows, Apple's Mac OS X, and the many forms of UNIX. Open-source software, however, is software whose source-code is freely available to developers and users. Microsoft, Apple, Unix Open-Source Software - ✔is developed not by single users or companies, but by communities of connected users and groups. Examples include the many forms of Linux, including Red Hat and Ubuntu and Android. Programming Languages - ✔1. First Generation - Machine Languages (1GL) specific to manufacturer (switches, punch cards, etc.) 2. Second Generation - Assembly Languages (2GL) specific processor or environment 3. Third Generation - High-Level programming Languages (Fortran, Cobol, C, Java, C++, and C#) 4. Fourth Generation (4GL) - software tools that help reduce the amount of procedural knowledge (Perl, Python, Ruby, SQL, Crystal Reports, Peoplesoft, and mySAP ERP. Web Programming Languages - ✔HTML - Hyper Text Markup Language - converts plain-text document into one optimized for viewing as a web page. HTML5 allows developers to better embed multimedia without special add-ons. XML - Extensible Markup Language - similar to HTML, but easier to exchange and interpret data between a variety of applications and systems. Web Design Tools - WYSIWYG (Dream Weaver, Visual studio). Graphic Tools - interactive multimedia are popular in web pages. Photoshop, flash, and premier. SEO - tools that allow webmasters to achieve better rankings. Software Development Life Cycle (SDLC) - ✔requirements obtained from stakeholders to develop their software. and includes analysis, design, implementation, and testing. Radio Frequency Identification (RFID) - ✔enables a company to track merchandise or inventory by radio frequency signals (electronic tags placed on objects or smart labels). Cloud Computing - ✔provides shared resources and applications remotely as a shared service over the internet. Cloud Services - ✔offer scalability, allowing users to store data and use software applications as needed at any given time. Infrastructure, platform, and software are the three categories of services provided.


Mashups - ✔is a software application that allows users to mix and match software components in order to create a customized application. On premises - ✔Services are provided in-house on servers or in a data center owned, managed, and administered by the organization. Database - ✔is a set or collection of data that is centrally located in an electronic format, organized in tables, and easily searchable. Database Management System (DBMS) - ✔is a software program that allows an organization to organize, manage, and provide multiple users with access to data used to perform administrative tasks to databases. Schema - ✔is a planned design structure of the database and involves creating the definitions behind the tables and data constraints. Tuples - ✔are ordered lists of values and are used for grouping and organizing data and can be used to represent related data that belong together, such as student records, and are used in database relational models. Entity - ✔In the relational database model, a person, item, event, etc., for which an organization collects data. Field - ✔An attribute of an entity, such as name, address, or student ID. Record - ✔A set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer. Table - ✔A collection of related records. For example, a set of customer records would all be contained in one table. Primary Key (PK) - ✔A field that uniquely identifies a record, such as customer ID or student ID. Foreign Key (FK) - ✔A common field that exists in multiple tables that is used to form a relationship. For example, a customer might be assigned a specific sales representative. The customer's record might contain a sales rep ID that would link to the Sales Rep table. Static Data - ✔is a fixed data set that does not change after being recorded. Dynamic Data - ✔may change after it is recorded, and has to be continually updated.


Attributes - ✔are properties of entities, such as the address or phone number of a person or business. Variable (referencing a data type) - ✔In computer science and computer programming, a data type or simply type is a classification of data which tells the compiler or interpreter how the programmer intends to use the data. Most programming languages support various types of data, for example: real, integer or Boolean. A Data type provides a set of values from which an expression (i.e. variable, function...) may take its values. The type defines the operations that can be done on the data, the meaning of the data, and the way values of that type can be stored. Database Server - ✔is a powerful computer that stores the databases and DBMS to access and administer the database. Object - ✔such as forms, queries, and reports, allow the user to locate, display, and print data in different formats. Relational Database Model - ✔are one of the most common database models in use today and are based upon the relational model of data, which is a method of structuring data using relationships (or primary keys), in rows and columns. This is a centralized database. Object-Oriented Database Model - ✔are used when media or other types of files are required because multimedia files and diagrams or blueprints such as those generated by computer aided design (CAD) are more complex and not easily sorted by columns and rows. This is a centralized database. Referential Integrity - ✔is a set of rules that prevent or limit incorrect data being entered int he database and establishes relationships between objects in different tables. Entity Integrity - ✔is a basic constraint of database relational model (abbreviated RM) that refers to the morphology of the primary key. Online Analytical Processing (OLAP) - ✔and are analytical, fixed databases that enable users to analyze data in order to make management decisions. Online Transaction Processing (OLTP) - ✔is an operational database and is used for browsing and manipulating business transaction activity to enable real time business analysis of records to help in business decision making. Flat File - ✔is a type of database model that resembles file cabinet functionality. Hierarchical Database - ✔is a type of database that connects tables in a master/slave, leader/follower, or primary/replica format and is a tree-like structure.


Centralized Database - ✔is located, stored, and maintained in a single location Distributed Database - ✔may be stored in multiple computers Master Data - ✔are business objects or values possessing a unique value and are shared across the entire enterprise. Can be used in all types of databases, are not sorted into tables, and are key to accurate business reporting analysis. Entity-Relationship Diagrams (ERDs) - ✔is a data modeling technique that helps graphically illustrate business processes and can also be used as the foundation for a relational database. The data components (known as entities) have various properties (known as attributes), and relate to each other in various ways (known as relationships). Database Normalization - ✔they must go through this in the design process to simplify complexity where possible and remove redundancy between elements. Big Data - ✔This is a very large data set (structured or unstructured) that are too complex or voluminous for traditional data processing systems to manage and they can be mined or analyzed to find new trends or relationships for business intelligence. Three factors to consider: Volume, Variety, and Velocity. Data Warehouses - ✔a large centralized collection of digital data gathered from one or more sources and organized by subject to support business analysis and decision making tasks. Think of Epic Data Mart - ✔is a smaller subset database from a data warehouse typically focused on a single area or function. Think of ASAP as a part of Epic Extraction, Transformation, and Loading (ETL) - ✔is the process used to gather data from multiple sources (such as enterprise resource planning [ERP] systems, customer relationship management [CRM] systems, and line of business units [LOB]) and transforms the data to store in one data warehouse. Data Mining - ✔is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior. Text Mining - ✔performs big data analysis on unstructured data such as emails, survey questions, and memos to reveal consistent patterns and relationships. Data Preprocessing - ✔is a data mining technique that involves transforming raw data into an understandable format.


Multidimensional Databases - ✔are typically relational databases that store data in a cube, which contains aggregated data related to all dimensions and allow businesses to visualize data assets in multidimensions to see what is happening in real time. Predictive Analytics - ✔is a process in data mining in which statistics, historical data, and data mining produce models and forecasts about potential customer behavior and future business trends. Data Dictionary - ✔defines and manages the data types and structures that dictate how the database is organized. Data Management - ✔the creation, update, and deletion of the data within the database. Data Retrieval - ✔using queries, data is retrieved and combined. Data Administration - ✔(including maintaining data integrity) recovering corrupted information, and managing users and group access to the data. Data Redundancy - ✔is when the same piece of information is stored in more than one location. Data Integrity - ✔refers to the accuracy and consistency of the data stored in a DBMS. By assigning security permissions, you can limit the risks to destruction of the data by allowing users to add, but not delete, data from the customer database. Data Inconsistnecy - ✔happens when the same attribute has different values when the data is stored in more than one location. Data Quality Audit - ✔is a process to determine the reliability, completeness, and accuracy of the data in a database. Business Intelligence - ✔is the term used to describe the infrastructure, data, and software tools that help to analyze, organize, and control access to data in order to enable managers and others in the enterprise to make better and more informed decisions. Hadoop - ✔a Java based open (i.e., non-proprietary) programming framework that supports big data collection, processing, and analytics of a distributed computing environment. In-Memory Computing - ✔is the storage of information in the main random access memory (RAM) of dedicated servers rather than in complicated relational databases operating on comparatively slow disk drives.


Analytical Platforms - ✔Purpose-built appliance systems that are designed to process and analyze enormous amounts of data quickly. Data Governance - ✔is concerned with the management of data, including maximizing quality through effective utilization, availability, integrity, and protection. Data Consistency - ✔Inputting consistently by using the same descriptions, standards, units of measurement, and formats can mean the difference between success and failure. Data Scrubbing - ✔checks for data consistency; it will check, fix corrupted records, and remove bad records from the database. Clickstream Applications - ✔are those that track and analyze an application's activity, including how it is used and where a user clicks. Sentiment Analysis - ✔(aka: Opinion Mining) is a software tool that businesses can use on the Internet to examine and obtain opinionated information collected from social media websites. Web Mining - ✔creates databases which are mined to understand customer behavior and improve customer intimacy. Health Analytics Tools - ✔are usually apps created for smartphones or portable devices to keep track of the device owner's health and exercising stats, and they have limited capabilities. Textual Databases - ✔contain text resources, such as social media messages and email, and are mined for sentiment analysis. Energy Management Systems - ✔transforms energy data into information so businesses can understand energy consumption and patterns. Geographic Information Systems (GIS) - ✔Using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environmental and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations (e.g. poverty, crime, or disease outbreaks) and quite a number of other important and factual indicators. Part of Business Intelligence application. Telecommunication - ✔is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.


Public Switch Telephone Network (PSTN) - ✔is the total circuit switch-based telephone network that uses technology invented by Alexander Graham Bell. Telecommunication Networks - ✔transmit information in the form of data, voice, or video, and are carried by a medium such as light or electrical signals. The telephone and internet are two examples. Wireless Communications - ✔is a type of telecommunication network that uses radio waves to send and receive signals over the radio spectrum. Satellite Communications - ✔are used to link telecommunications networks over long distances. Computer Network - ✔is a collection of interlinked computers that can exchange information over links in the form of digital packets. Digital Packets - ✔is simply a unit of data forwarded by a network. 802.1 - ✔wireless communication protocol used to connect devices in a LAN environment. 802.3 - ✔is an ethernet standard and defines the LAN connections. Local Area Network (LAN) - ✔typically connects computer systems of an organization or a floor of a building. Wide Area Network (WAN) - ✔typically connects business campuses consisting of computer systems across large distances. Voice over Internet Protocol (VoIP) - ✔is a modern telecommunications technology that offers convergence between voice and data networks. Quality of Service (QoS) - ✔is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted. Network Protocol - ✔is a set of rules, at different levels in the connection that communication devices use to ensure quality of signal transmission and reception. Transmission Control Protocol/Internet Protocol (TCP/IP) - ✔is the standard communication rule of the Internet and governs Internet data network rules. Post Office Protocol (POP) - ✔is used to retrieve email from a mail server.


File Transfer Protocol (FTP) - ✔is an unsecure method used to transfer files from one computer to another. Point-to-Point Protocol (PPP) - ✔Encryption is used to ensure the privacy of the content being communicated. Packet Switched Networks - ✔group data in packets and are transmitted in multiple simultaneous communication sessions. Asynchronous Transfer Mode (ATM) - ✔a virtual circuit protocol that was designed to provide quality of data of voice and video via circuit switching. Network Host - ✔is a computer connected to a network and is also known as data terminal equipment in computer networking hardware and is a physical node with an IP address. Internet Service Providers (ISPs) - ✔provides internet connectivity. Packet Analyzer or Network Sniffer - ✔is used to monitor or log traffic on a network for troubleshooting or analysis. Can be used by hackers to hack a network. Hub - ✔is a networking device that connects computer devices together in a LAN, sending data traffic to all networked components. Firewall - ✔is a software application or hardware appliance that filters and blocks malicious content from one network to another. Bufferbloat - ✔is high latency in packet-switched networks caused by excess buffering of packets. Jitter - ✔bufferboat can cause packet delay variation Router - ✔is a networking device used to pass packets to the next network node until the packets reach the ultimate destination. Core Routers - ✔is used to connect the enterprise to the Internet in the backbone in order to handle large amounts of data traffic. Edge (boundary) Router - ✔transfers data packets between one or more LANs and an asynchronous transfer mode (ATM) network. Network Bridge - ✔is a computer networking device that creates a single aggregate network from multiple communication networks or network segments.


Bridging - ✔allows multiple different networks to communicate independently while remaining separate. The Four Types of Network Bridging - ✔Simple bridging, multiport bridging, learning or transparent bridging, and source route bridging. Peer-to-Peer Networks - ✔offer a faster connection between nodes, because information is stored locally on each individual computer and not one central server. Mesh Network - ✔is a network topology in which each node relays data for the network. Network Management Application - ✔is a computer software tool that gathers traffic data from the network to ensure network performance is optimized. Software-Defined Networking (SDN) - ✔is an approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces and abstraction of lower-level functionality. Hypervisor - ✔is an expensive virtual machine monitoring application used by large organizations to improve computer network performance without having to physically change the network. Next-Generation Firewall (NGFW) - ✔is an integrated network platform that is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Transmission Control Protocol (TCP Protocol) - ✔consists of four abstraction layers: application, transport, Internet, and network access. Application Layer - ✔is where applications create and communicate user data to other applications on the same or another host. Open System Interconnection (OSI) - ✔is the foundation for data communication protocols and is an international standard that governs the development of data communication protocols (consists of seven layers). The Seven Layers of OSI - ✔application, presentation, session, transport, network, data link, and physical. Data Packet Switching - ✔these are sent out and travel across the Internet in random order.


Circuit Switching - ✔the path is decided before the transmission occurs. ideal for communications that require data to be transmitted in real-time; a constant connection is required before transmission begins. used for VoIP, video conferencing, video, and multimedia communications. Data Packets - ✔have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails. Convergence - ✔The ability for a telecommunication network to carry voice, data, and video. Frame Relay - ✔is a packet switching network protocol used to establish circuit switching for voice or video. Converged Network - ✔is one in which voice, data, and video are all carried on the same network, with the business no longer using a traditional telephone network. Multiplexing - ✔is the process in which multiple signals are combined into one signal, which is then transmitted over a shared medium. Analog Signals - ✔are continuous electrical waveform signals. Digital Signals - ✔discrete, binary, noncontinuous electrical waveforms. Near Field Communication (NFC) - ✔is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other. Electronic Communication - ✔Email, instant messaging, audio and video communications, and unified communications. Web Page, File Storage, and Hosting - ✔Repositories of information, storage for retrieval or archival of documents, programs, applications, and consumables such as audio and video. Portals and Connections - ✔Applications, protocols, and other technology that allow protected and unprotected connections from one computer to another. Standard - ✔is an accepted model from which independent parties or governing bodies agree as a basic concept from which to operate. Protocol - ✔is an official procedure that stems from the standard in question.


Hypertext Transfer Protocol (HTTP) - ✔is the communications protocol at the foundation of all communication of the world wide web. Hypertext Transfer Protocol Secure (HTTPS) - ✔uses technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and web server. Secure File Transfer Protocol (SFTP) - ✔Much like HTTPS, this uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer. Dynamic Host Configuration Protocol (DHCP) - ✔a server or appropriately configured router automatically and temporarily assigns IP addresses to these enabled systems on the network. Simple Mail Transfer Protocol (SMTP) - ✔One of several popular email protocols in use today (others include IMAP and POP3). Simple Network Management Protocol (SNMP) - ✔Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status. TELNET - ✔An early and insecure remote access protocol used to allow a user to log on to a remote system. Domain Name Service (DNS) - ✔Server-based service that translates human language web address or URL into an IP address, which is used. Lightweight Directory Access Protocol (LDAP) - ✔Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Uniform Resource Locator (URL) - ✔is a protocol used by a client computer to request a website from a server via HTTP or HTTPS. Telnet - ✔is a very old and insecure method of accessing a remote network. End Users and Content Providers - ✔The various users and organizations that ultimately pay for the Internet. Service Providers - ✔The telecommunications companies that build networks to support their customers (e.g., Time Warner, Cox Cable, and CenturyLink).


Standards Organizations - ✔The organizations that help with continuity of communications, including the Internet Architecture Board (IAB), the International Electronics and Electrical Engineers (IEEE), Internet Corporation for Assigned Names and Numbers (ICANN), Internet Engineering Task Force (IETF), and World Wide Web Consortium (W3C). Governing Agencies - ✔The government and quasi-government regulators that help to enact and enforce legislation, including the Federal Communications Commission (FCC) in the United States, that somewhat affect what is and is not acceptable on the Internet. Virtual Private Network (VPN) - ✔is a secure tunnel through the Internet using a public network infrastructure. Smartphone - ✔is a converged device that combines a cellular phone device with a mobile computer platform. Electronic Data Interchange (EDI) - ✔which is the electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention. This is most commonly used to exchange reports, purchase orders, or view invoices. Frequency - ✔is the wavelength or position on the radio frequency spectrum in which the signals are exchanged and measured in cycles per second or hertz. Global System for Mobile (GSM) - ✔was the protocol for the first generation of cellular networks. Code Division Multiple Access (CDMA) - ✔was developed as the protocol during the second generation cellular networks. Long-Term Evolution (LTE) - ✔offer data transmission speeds of 5 to 12 Mbps in the UHF band. Bluetooth - ✔is wireless technology used to exchange data over short distances, such as between a cell phone and an earpiece or a car stereo system. Sniffing - ✔is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network. Spoofing - ✔is penetrating a network by disguising intruding data packets. This leads to more packet encapsulation information as the network responds by sending useful information back to the hacker, which enables the hacker to gain further access to the system by identifying network access information contained within the responses.


Denial-of-Service Attack - ✔is a means to disrupt, interrupt, or suspend services of an Internet host computer (not a wireless network). These do not turn off the host, but instead overwhelm the host with queries, rendering the website unavailable. Wi-Fi Protected Access (WPA) - ✔is a newer, more secure encryption protocol for wireless networks. Radio Frequency (RF) Site Survey - ✔is a newer, more secure encryption protocol for wireless networks to ensure optimal performance. Scalability - ✔is the ability to grow the user base and data services such as multimedia. Expandability - ✔is the ability to reach further or expand network coverage. Wardriving - ✔is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA). Wireless Sensor Networks (WSN) - ✔are location or spatially distributed sensors that emit wireless signals with specific information and are used to monitor physical or environmental conditions. And are able to transmit and receive signals via built-in antennas. Waterfall Model - ✔(is part of the SDLC) is the traditional systems development method, so named because each stage must be completed before moving on to the next stage. Uses the following steps: systems analysis, system design, programming, testing, conversion, and production and maintenance. SDLC - Strengths - ✔Cost evaluation, capability, documentation, user input, ease of maintenance, and ability to survive IS staff changes. SDLC - Weaknesses - ✔increased development time and cost, necessity for upfront system definition, rigidity, difficulty of cost estimation, and occasional limited user input. SDLC - Advantages - ✔clear project objectives, strict approval requirements, progress measurement, and requirement stability. SDLC - Disadvantages - ✔Difficulty in responding to change, time intensity, limited iteration, and inability to easily return to an earlier stage. Prototyping - ✔is a four step process that develops software module quickly and inexpensively for user evaluation.


Scrum - ✔is an incremental form of agile software development with emphasis on planning. Rapid Application Developement (RAD) - ✔is an iterative alternative to the conventional waterfall model of software development. focuses on the development's process, with limited emphasis on the planning process. Agile Model - ✔is an iterative development model and encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change. uses collaborative, self organized, and cross functional teams. End-User Development - ✔is a largely informal method of solutions development by end users, made possible by the availability of fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists. Feasibility Study - ✔is performed to determine whether the proposed system is a good investment, whether the necessary technology is available, whether the user's information specialists can manage the system, and whether the organization can adapt to the changes introduced by the new system. Critical Path Method (CPM) - ✔is a step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems. Work Breakdown Structure (WBS) - ✔is a broken down list of all deliverables showing what the customer will get at the end of a project. Logical Model - ✔provides an image or diagram of the users, inputs, outputs, and processes of the system Unified Modeling Language (UML) - ✔is a general-purpose modeling language designed to provide a standard method to represent the design of a system. Scope Creep - ✔occurs when the project continues to grow in scope, or uncontrolled changes occur during the course of the project. Direct Implementation - ✔the old system is replaced by the new system without any rollout or overlap. Parallel Adoption - ✔is a method of system transfer in which the old system continues to operate for a period of time while the new system is implemented. Input - ✔is the act of capturing or collecting data from an organization or environment.


Output - ✔is the act of transferring processed information to the appropriate users. Optical Character Recognition (OCR) - ✔is a system that uses a scanner to read characters, automatically inputting them into the system in digital form. Intelligent Character Recognition (ICR) - ✔is an advanced form of OCR that enables the computer to learn several different fonts and handwriting styles in order to improve accuracy and recognition. Three Types of System Evaluation - ✔System-oriented, function-oriented, and strategyoriented. System-Oriented Evaluation - ✔is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant. This enables management to make informed decisions about the future mission. Function-Oriented Evaluation - ✔examines the performance of data, hardware, software, networks, and human resources. Strategic-Oriented Evaluation - ✔is the determination of whether the information system outputs enable management to make strategic decisions that will help develop and achieve the future mission and vision of the organization. Six Methods to Increase User Adoption - ✔Benchmarking, usability testing, user communication, forming an internal user group, planning, and leveraging existing resources. Benchmarking - ✔is used to evaluate business processes and performance by comparing them to industry standards and determining how well a company is performing. Usability Testing - ✔requires a formal meeting with several users which includes an interview and observation or screen-sharing. Information obtained during this process will assist with the development of additional training or system customization. User Communication - ✔allows users to provide input through various communications methods, including meetings. This communication allows users to share best practices, experiences, and tips that may help other users. Forming an Internal User Group - ✔consisting of users who support and resist the system can provide the implementation team and management with feedback that may help increase user adoption.


Planning - ✔involves identifying and preparing for future needs in order to prepare and budget for future upgrades and modifications. Leveraging Existing Resources - ✔such as instruction manuals, white papers, and Internet forums, additional documentation and training can be developed with limited time and expense. The Five Criteria for Providing Access to a File or System - ✔are roles, groups, time, transaction type, and location. System-Level Security - ✔consists of the architecture, policy, and processes that establish the security on computer systems. The Three Levels of Risk for System Security - ✔low, moderate, and high. Low-Level Risk - ✔are moderately serious and would have a noticeable impact on the organization, resulting in a negative outcome and possible damage. Moderate-Level Risk - ✔is very serious and would result in severe impairment, major damage, and would adversely impact the organization's operations. High-Level Risk - ✔would result in complete loss of capabilities, posing a catastrophic threat to the organization, including possible loss of life. Elements of Risk Management - ✔identification, qualitative analysis, quantitative analysis, and response planning. Risk Identification - ✔involves determining which risk might affect the characteristics of the project and/or documents. Qualitative Risk Analysis - ✔involves performing an analysis of the risks and conditions in order to prioritize the effects on a project. Quantitative Risk Analysis - ✔analysis involves the measurement of the probability and consequences of risks and estimating the implications for the project. Risk Response Planning - ✔involves the development of procedures and techniques that enhance opportunities and reduce threats to the project or system. Risk Management Strategies - ✔include promoting project leadership skills, learning from previous projects and experience, sharing knowledge, and creating a project management culture within the IS organization.


Computer-Aided Software Engineering (CASE) - ✔is the use of computer methods to organize and manage software development in information systems. The Three Categories of CASE - ✔tools, workbenches, and environments. The Two Categories of Tools - ✔Upper CASE and Lower CASE. Upper CASE Tools - ✔support system analysis and modeling Lower CASE Tools - ✔support development activities such as design, testing, debugging, and maintenance. Workbenches - ✔combine several tools for software development to achieve a simple, consistent interface, and a seamless integration of data and control. Environments - ✔combine multiple tools or workbenches to support the complete software cycle. Web 2.0 - ✔refers to the Internet sites that emphasize usability, interoperability, and user-generated content. Decision-Making Process - ✔is the process of identifying and selecting an alternative based upon the values and preferences of the decision maker. And is one of the primary functions of management and is supported and reliant upon information technology. The Three Types of Decision-Making Process - ✔unstructured, semi-structured, and structured. Unstructured Decisions - ✔require the decision maker to provide the necessary insight, judgement, and evaluation to reach a decision. Individuals in senior management frequently make unstructured decisions. Semi-Structured Decisions - ✔are used when only a portion of the problem can be solved via an established procedure. Middle managers more commonly make semistructured decisions. Structured Decisions - ✔involve an established procedure, are repetitive and routine, and therefore can be handled in the same manner each time. Line-level managers and non-management employees typically make these types of decisions. Name the Steps in the Decision-Making Process - ✔define the problem, identify any limiting factors, develop potential alternatives and solutions, analyze the alternatives, select the most desirable alternative, implement the decision.


The Two Models of Management in the Decision-Making Process - ✔classical and behavioral models Classical Model of Management - ✔focuses on rules and procedures to maximize productivity. Social needs of employees are not considered; instead, the focus is on centralized decision making and profit maximization. Behavioral Model of Management - ✔focuses more on the individuals in the workplace, with less emphasis on the rules, procedures, and production. And supports worker satisfaction and positive working conditions. The Four Phases of the Decision-Making Process - ✔intelligence, design, choice, and implementation. Intelligence Phase - ✔consists of the discovery, identification, and understanding of the problem. During this phase, a problem may be classified or broken down into subproblems. Design Phase - ✔consists of the identification and exploration of alternatives and solutions to the problem. Also includes the construction of a model of the problem and the evaluation of the alternatives for feasibility. Choice Phase - ✔consists of the selection of an appropriate solution from the available alternatives. Specific values may be assigned to the decision components during this phase. Implementation Phase - ✔consists of the execution of the alternative and continual performance monitoring. Because this frequently requires the introduction of change, resistance may occur, necessitating the importance of user adoption and management support. Business Intelligence (BI) - ✔consists of databases, data warehouses, and analytical platforms that analyze a company's raw data and play a major role in strategic planning. enable managers and others in the enterprise to make better and more informed decisions. Six Elements of Business Intelligence - ✔business environment data, business intelligence infrastructure, business analytics tool set, managerial users and methods, delivery platform, and user interface. The Six Analytical Functions used by Business Intelligence - ✔production reports, parameterized reports, dashboards and scorecards, ad hoc report creation, drill down capabilities, forecasts, models, and scenarios.


Business Analytics (BA) - ✔consists of tools and techniques used for the analysis and understanding of data. Includes: data mining, modeling, statistics, and OLAP Big Data Analytics - ✔enables a business to recommend products or services to customers based upon analysis of customer preferences, purchase history, and Internet search history. Visual and Geographic Analyses - ✔enable data to be analyzed based on patterns, relationships, or geographic data. Knowledge Management - ✔handles information and resources within an organization by capturing, distributing, and effectively using knowledge. Business Performance Management (BPM) - ✔is the collection of analytic and management processes that enable organizational performance management in order to achieve goals or objectives. The Three Primary Activities in Business Performance Management - ✔goal selection, consolidation of information for the measurement of goal attainment, and management intervention for goal achievement and performance optimization. Balanced Scorecard - ✔is used for strategic planning and management to help align business activities with organizational strategy. It helps improve communications and monitors performance. The Four Organizational Dimensions of the Balanced Scorecard - ✔Financial, Business Process, Customer, and Learning and Growth. Decision Analysis - ✔is the process of dividing a complicated decision into components, determining alternative solutions, and applying mathematical formulas to determine estimated payoffs for each alternative. Rich Site Summary (RSS) - ✔is a web feed format used by publishers for the periodic dissemination of information including news, blog entries, summaries, or full text of interest to subscribers. The Five Basic Steps in the Decision Analysis Process - ✔• Create a model or diagram of the decision. • List all potential alternatives in the model. • Assign numerical or monetary values to the probability of each outcome. • Analyze the expected return for each outcome and combinations of outcomes. • Analyze the return in conjunction with outcome sensitivity, probable utility for the organization, and organizational or user risk tolerance.


Decision Tree - ✔is a popular decision analysis tool that uses a tree-like graph to model decisions in order to identify the most appropriate strategy to reach a goal. Think of a Visio. Advantages of Decision Trees - ✔• They are simple to understand and interpret. • They contain value with limited, detailed data. • Important insights can be generated based on the description of a situation, the alternatives, probabilities, and costs. • They enable the addition of new scenarios. • They help determine best, worst, and expected values for each scenario. • They can be combined with other decision analysis tools and techniques. Group Decision Support Systems (GDSS) - ✔provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools. Three Primary Components of Group Decision Support Systems (GDSS) - ✔are hardware (including networking and display equipment), software (including web-based conferencing applications), and the people who are collaborating in the decision-making process. Cost-Benefit Analysis (CBA) - ✔is an analysis of the pros and cons of a given situation or course of action to determine how the downsides compare to the upsides. Encryption - ✔is a process by which data are encoded so that only persons with a decryption code may unlock and retrieve stored messages. Disaster Recovery Plan (DRP) - ✔is one that depicts the process involved with returning operations to their appropriate function in case an emergency or disaster halts them. The Three Goals of Information Security for Data - ✔Confidentiality, Integrity, and Availability Zero-Day Attack - ✔a threat or attack that exploits known or unknown vulnerabilities in software. Social Engineering - ✔normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. White Hat - ✔an authorized and ethical computer hacker*, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.


Grey Hat - ✔a computer hacker with the skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or can be sold to the highest bidder. Black Hat - ✔a computer hacker with criminal intent. Hacktivist - ✔an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose. Cyber Criminal - ✔an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime. Nation State - ✔government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures. Baiting - ✔A low-tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information. An example might be an intentionally dropped USB drive left openly in a busy parking lot. Dumpster Diving - ✔Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information. Phishing - ✔Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password. Pretexting - ✔creating a believable scenario (whether innocuous or serious) for the purpose of obtaining information (email, etc.) Quid Pro Quo - ✔An exchange of something of value for information. Shoulder Surfing - ✔A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen. Tailgating - ✔A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point. Pharming - ✔A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information, such as names, addresses, phone numbers, usernames and passwords, and security questions and answers.


The Three Risk Factors that Contribute to Vulnerability of IS - ✔information loss from the environment, organizational, and technological sources. Environmental Risk - ✔these are inevitable such as weather, fire, flooding, etc. Organizational Risk - ✔hierarchies, policies, and procedures. These factors naturally allow organizations to operate as successful businesses, but also help to define categories risks, vulnerabilities, and threats, and create targets for criminals. Technological Risk - ✔stem from computer systems, equipment, and wiring that allow employees to collaborate and produce goods and services. Risks that originate from these factors include obsolete, broken, misused, or inadequate technology or services that might cause an organization to lose money. ISO 9000 - ✔which deals with quality management ISO 27001 - ✔which deals with information security management ITIL and COBIT - ✔which deal with the management of an information technology infrastructure. Ethics - ✔are moral principles and concepts, rules of behavior, and often the underpinning of codes of conduct based on accepted standards of right and wrong. The Ethics Rules of Behavior - ✔Responsibility, accountability, and liability Categories of Generalized Ethical Issues in IT - ✔Accessibility, accuracy, privacy, and property. Accessibility Issue - ✔Issues created by barriers to access, implying that some should have access while others should not. Accuracy Issue - ✔Issues created by the trustworthiness, accuracy, and legitimacy of information. Privacy Issue - ✔Issues created by the collection, storage, distribution, or mere availability of potentially sensitive information. Property Issue - ✔Issues created by the association of rights of property ownership to tangible and intangible goods and information.


Moore's Law - ✔First postulated by Intel co-founder Gordon Moore in 1965, Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years. Advanced Data Analysis - ✔data has been collected, stored, and made available for a wide array of analyses. These analyses may be general or specific, potentially very intricate, and may expose information or non obvious relationships and connections, leading to breaches of privacy and trust. Advanced Networking - ✔Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it. Mobile Information Availability - ✔With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places. Common Good Approach - ✔This big picture approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position. Fairness Approach - ✔This approach values individual moral rationality—otherwise referred to as the Golden Rule, or "do unto others as you would have them do unto you"—asks society to reflect on the consistent treatment of others based on the desires of how an individual expects to be treated. Rights Approach - ✔This approach values rights specified by society, which may be largely based on the analysis of other ethical approaches, and allows individuals to weigh decision choices based on legal or legislative precedent. Utilitarian Approach - ✔This approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual. Virtue Approach - ✔allow us to act in aspirational ways, including compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, obedience, and many more. Privacy - ✔is the state of being free or left alone and every individual has the right to privacy and to be left alone from individuals, organizations, and the state. The Principles of Business Owners who Collect Data - ✔collect justly, maintain data for quality, collect transparently, keep data confidential, keep data secure, collect openly, provide for validation, are accountable.


Cookie Management Software - ✔Cookies are tidbits of information stored on your computer. They require a secure browser that uses industry security standards to encrypt your purchase information. Look for the padlock symbol to the left of the URL, along with the https: at the beginning of the URL. Self-Regulation of Industry - ✔Along with several U.S. and EU laws that require the protection of privacy for their customers, each society provides an expectation for its businesses to establish their own protocols for protecting the interest of their many stakeholders. Information Security Training - ✔With the knowledge of potential risks and threats to privacy, citizens may help themselves understand the value of their information assets. This can help individuals guard against high-tech and low-tech methods of loss, including social engineering and malware. Technological Measures - ✔Several software and hardware applications exist to aid individuals in protecting their privacy. From a defensive perspective, these include antimalware applications and intrusion protection. From a proactive perspective, these include the encryption of email and sensitive web traffic, and implementation of devices to aid in identity and approved equipment verification. Additional options include privacy policies and automated settings that configure a web browser's security, which can then compare them to the privacy policy published on specifically configured websites. E-Commerce - ✔was born out of the connection and facilitation of the trade of goods and services between buyers and sellers via computer networks, or the Internet. The Operational and Functional Benefits of E-Commerce - ✔Selling wares, improving its reputation and creating efficiencies. Creating Efficiencies - ✔allows the customers to have a closer connection with the company through email or social media. Social media allows businesses to close the feedback loop. Localized and Personalized E-Commerce - ✔Businesses that understand their customer patterns and desires, and can quickly provide them with what they need in the areas where they live, with a tolerable adjustment in quality, will help to gain their trust and respect. Leads to more sales. Mobile E-Commerce (mCommerce) - ✔Smartphones and tablets are very popular communication devices, personal and professional organizers, and portable decision support systems. Businesses that actively market to their customers via these devices, either as a direct channel for doing business, through product or brand marketing through placement in the integrated applications, or in developing salable mobile applications, have an important avenue for gaining and keeping their customers.


Social E-Commerce - ✔A form of electronic commerce which uses social networks to assist in the buying of selling of products. This type of commerce utilizes user ratings, referrals, online communities and social advertising to facilitate online shopping. Omni-Channel - ✔refers to e-commerce facilitated by e-business connections, dynamic variability, and inherent scalability. Warehouses filled with inventory become distribution centers, physical retail storefronts become hybrid warehouse, distribution, and direct customer interaction nodes focused on a seamless online/offline customer experience. As a result, inventory volume is reduced and operations become leaner and better able to react to changes in demand. What Areas is E-Commerce Expansion Going - ✔localized and personalized, mobile, and social Digital Market - ✔to sell goods and services, as well as the creation and sale of goods that were completely digital. The flexibility and efficiency provided by digital markets allow for diminished search costs, costs for changing prices, and a better ability to change prices for different types or categories of customers or sellers, or as market conditions change. Digital Goods - ✔Goods that may be purchased and downloaded, versus requiring physical delivery to acquire, or shipment from a retailer's physical or electronic storefront. Such goods have a delivery-on-demand nature, a miniscule inventory footprint, and a near zero cost per unit to produce more. Products with these characteristics include music, video, traditionally printed material (e.g. newspapers and magazines), and, given trends in 3D printing, eventually more tangible products, too. The General Types of Business Models in E-Commerce - ✔business-to-business (B2B), business-to-consumer (B2C), and consumer-to-consumer (C2C). Business-to-Government (B2G) - ✔the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web. Advertising - ✔through direct marketing such as popup and email advertising, in application advertising, and affiliate advertising programs, helping a business to grow their customer base. Community Provider - ✔Online communities provide a space which individuals, families, and groups might meet and share content and communications. Examples of online community providers include Facebook, Google+, and LinkedIn. Content Provider - ✔As with traditional newspapers, cinemas, and video stores, online content providers rent or sell online access to digital content, such as music, news, video, and images. Examples include iTunes, Shutterstock, and Netflix.


Direct Marketing - ✔Both manufacturers and retailers may sell directly to their customers using a disintermediated online marketing strategy, perhaps in addition to others. E-Tailer - ✔As with traditional retailers of goods, groceries, and other physical products, they provide access for the sale of physical goods, which are then shipped to their customers. Examples include pure-play firms such as Amazon, as well as traditional brick-and-mortar organizations such as Best Buy and Walmart. Freemium - ✔the core service might be free, but additional features and services may be available for a charge. Mobile phone apps and games are an example of this concept, where limited versions of software are available for free, but often charge a fee for full versions, additional features, or related digital goods. Market Creator - ✔functions like a traditional bazaar or shopping mall, bringing together buyers and sellers through the Internet and collects a fee for helping to create the opportunity. Examples include Amazon's Marketplace and eBay. Portal - ✔online portal provides gateway access to information, entertainment, and business. With an enormous number of websites, storefronts, and encyclopedias, several portals exist and serve as the starting point for many on the Internet. Examples include Google, Yahoo, and Bing. Service Provider - ✔where Amazon offers goods that are purchased and shipped, and digital services such as Amazon Web Services, where online storage space and processing power is rented, or paid as an ongoing subscription. Other examples include the many options and utilities provided by Google Apps. Private Industrial Networks - ✔this means that a single organization controls the construction and maintenance of relationships for and between a relatively small numbers of other organizations. For example, Ford Motor Corp's private industrial network allows Ford, as well as a variety of other suppliers and distributors associated with Ford, to communicate, collaborate, and conduct business. Net Marketplaces - ✔bring together potentially thousands of businesses in combined consortium networks for similar purposes: creating efficiencies and synergies between and among member businesses. Net marketplaces often, but not always, provide more of a focus on individual transactions versus lasting relationships. Gated-Access Approach - ✔in which a member can only contact another member if the two members have an existing relationship, or are referred by a mutual contact. Dynamically Optimized Pricing - ✔this tactic is used to set prices according to market pressures, including locality, demand level, competitors pricing, the time of the day,


week, or year, and a customer's willingness to pay. E-commerce and the aid of modern big data analytical tools allow businesses to dial in for tighter control of their prices in order to gain improved profit margins. The Benefits Delivered by Social Media to Businesses and Organizations - ✔• detailed marketing research • company-to-customer and user-generated communication • relationship development through customer • loyalty programs • increased use of e-commerce • targeted sales promotions • Long-tail marketing Long-Tail Marketing - ✔is collective use of social media sites for marketing. Social Media - ✔refers to a collection of web-based applications that allow the creation and transfer of user-generated content over the Internet. Non-Relational Database - ✔uses a flexible model in which data are distributed among several machines, often in a cloud-computing format. Least expensive option because no central server is required.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.