Term
Know the difference between Off shoring and Outsourcing |
|
Definition
Outsourcing is subtracting with another company for a particular function.
Off shoring is for the bigger picture |
|
|
Term
Know what Content-Filtering software, Spam Filtering, and Surveillance Software are. |
|
Definition
Content filtering deals with the level of maturity content is presented,
spam filtering deals with pop ups,
surveillance software deals with cameras and videos |
|
|
Term
. What is the study of Ethics? |
|
Definition
|
|
Term
|
Definition
the process enabling financial and investment markets to operate internationally, largely as a result of deregulation and improved communications |
|
|
Term
what are blogs, v-logs, and podcasts are medias. |
|
Definition
|
|
Term
What is a Zombie Computer? |
|
Definition
|
|
Term
Know these terms: Virus, firewall, Spyware, and Worm. |
|
Definition
Spyware collects data w/o users knowledge,
worm replicates itself A virus is a program that attaches itself to a file, spreads to other files, and delivers a destructive action called a payload. ¡There are many types of viruses
A firewall is network hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous. ¡All Windows users should protect their network connection with a firewall. ~demo |
|
|
Term
|
Definition
asks for personal information |
|
|
Term
Know the difference between a firewall , popup blocker, and spy ware |
|
Definition
Firewall blocks unauthorized access of programs but also allows communication of authorized programs
Spyware is software installed on a computer without the user’s knowledge to either monitor the user or allow an outside party to control the computer. |
|
|
Term
What security levels are available on wifi networks and what the default settings are? |
|
Definition
ssid, In 2004, the IEEE ratified the full IEEE 802.11i (WPA2) encryption standards. If used with a 802.1X server or in pre-shared key mode with a strong and uncommon passphrase WPA2 is still considered[by whom?] secure, as of 2009[update]. |
|
|
Term
What is “War Driving” in reference to wireless networks? |
|
Definition
Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer or PDA. |
|
|
Term
Know routine safeguards for protection against data destroyed by malicious software and hacking attempts. |
|
Definition
|
|
Term
|
Definition
encoding: the activity of converting data or information into code |
|
|
Term
. How does biometrics work and how can they be used to secure computers. |
|
Definition
use for idenitificaiton of a person- finger scanner is an example |
|
|
Term
How to select a safe password. |
|
Definition
¡strong by including words that are unrelated to your interests, and include upper and lowercase letters, numbers, and symbols ¡unique – don’t use the same password for your bank account as you do for your email account ¡changed regularly – change your password twice a year |
|
|
Term
Ethics and laws concerning sharing of MP3 and other copyright material. |
|
Definition
|
|
Term
Read about Security Holes, Software Patches, and Cryptography |
|
Definition
Security hole-In computer security, the term vulnerability is a weakness which allows an attacker
Software patches- A patch is a piece of software designed to fix problems with, or update a computer program or its supporting data
Cryptography security hole- flaw when hiding information by encrypting |
|
|
Term
What is considered intellectual property? |
|
Definition
intangible property that is the result of creativity |
|
|
Term
. Know about identity theft and internet fraud. |
|
Definition
Identity theft is the criminal act of using stolen information about a person to assume that person’s identity, typically for financial gain.
Internet fraud is the crime of deliberately deceiving a person over the Internet in order to damage them and to obtain property or services from him or her unjustly. |
|
|
Term
. What is Total Information Security |
|
Definition
Total Information Security involves securing all components of the global digital information infrastructure. Personal Computers Business Computer Systems Government Systems International Systems Participation by EVERYONE is important and difficult to gain! |
|
|
Term
Five steps of new information systems development |
|
Definition
planning, gathering info for analysis, design, build or coding, testing |
|
|
Term
Study Group Decision Support systems... Know the good and bad points. |
|
Definition
A GDSS is flexible, supports anonymous input, and reduces negative group dynamics |
|
|
Term
|
Definition
(TPS), is an information system that supports and records transactions.
(MIS), A MIS sheds light on a wide-range of common, day-to-day business decisions. An information system designed to provide routine information to managers and decision makers
(DSS) A DSS supports decision making for specific unique and difficult decisions. An information system used to support problem-specific decision making. |
|
|
Term
what is scheduled reports, demand reports, exception reports, |
|
Definition
Scheduled Reports, are produced periodically on a schedule; daily, weekly, monthly, quarterly, annualy, ect.
Demand Reports, are developed to get certain information at a person’s request.
Exception Reports, are automatically produced when a situation is unusual or requires action. |
|
|
Term
what are e-commerce and m-commerce systems |
|
Definition
E-Commercerefers to systems that support electronically executed business transactions. Although e-commerce covers all forms of electronic transactions, it is typically used in reference to Internet-based transactions
M-commerce systems a form of e-commerce that takes place over wireless mobile devices such as handheld computers and cell phones. |
|
|
Term
Know what a proximity payment system is. |
|
Definition
make use of Infrared, Near Field Communication (NFC), or RFID technologies to support contactless payments using a cell phone. |
|
|
Term
Know what B2B, C2C, and C2B systems are. |
|
Definition
Types of E-commerce: Business-to-consumer (B2C) Business-to-business (B2B) Consumer-to-consumer (C2C) |
|
|
Term
Database Topics: DBMS, Distributed Database, Relational Database, Data Mining, SQL, and Object Oriented |
|
Definition
A DBMS consists of a group of programs that manipulate the database and provide an interface between the database and the user or the database and application programs.
In a relational database, tables are linked (related) through common fields. One-to-many ¡Most typical ¡Makes use of primary key One-to-one Many-to-many
Structured Query Language (SQL): The most popular DML.
Data Mining: the process of extracting information from a data warehouse. ¡“Connecting the dots”
Distributed Database: The Web is frequently used as the Front End of DBMS’s. Visual, audio, and unstructured database systems organize non-textual data. |
|
|