Term
HARDWARE What is Moore's Law? |
|
Definition
A doubling in the number of transistors per circuit every 18 to 24 months. |
|
|
Term
HARDWARE Can you add two binary numbers 0011 and 1010? |
|
Definition
|
|
Term
HARDWARE What is the difference between a bit and a byte? |
|
Definition
Bit is smallest element of date. May have 0 or 1. A byte consists of 8 bits and represents one character of data. |
|
|
Term
HARDWARE What does a harddrive do? |
|
Definition
|
|
Term
HARDWARE What storage medium has the highest storage capacity and the slowest speed? |
|
Definition
|
|
Term
HARDWARE What are the four basic computer categories? |
|
Definition
Mainframes, midrange computers, micro computers, smartphones. |
|
|
Term
DATABASE What are the four operations of a Database? |
|
Definition
Create, Read, Update, Destroy. |
|
|
Term
DATABASE What is the Hierarchy data? |
|
Definition
(Smallest to largest) Field, record, table, database, data warehouse. |
|
|
Term
DATABASE What is a primary key? |
|
Definition
Unique identifiers or records. (numberic, alphabetic, alphanumeric) |
|
|
Term
DATABASE What is referential integrity? |
|
Definition
Enforces relations between different data elements. |
|
|
Term
DATABASE What are the four parts of a database? |
|
Definition
Tables, Queries, Forms, and Reports. |
|
|
Term
ERP What is the main focus of ERP vs CRM/SCM? |
|
Definition
ERP- Core business processes. CRM/SCM-Customer/supplier |
|
|
Term
ERP What is the largest of cost implementing ERP? |
|
Definition
|
|
Term
ERP What are some ERP benefits? |
|
Definition
Lower costs, decision support, quality and efficiency. |
|
|
Term
|
Definition
Customer Relations Management (CRM) |
|
|
Term
|
Definition
Supply Chain Management (SCM) |
|
|
Term
INTERNET OF THINGS What are some other names for UbiComp? |
|
Definition
Non-traditional computers that connect to the internet. (i.e, wearable computing, energy management) |
|
|
Term
INTERNET OF THINGS What are the three classes of UbiComp devices? |
|
Definition
Dust- Miniature devices Skin- Flexible fabrics uses as display surfaces. Clay- 3D objects |
|
|
Term
What are some of the major issues with current internet of things (loT) devices? |
|
Definition
Privacy, secrecy, permissions. |
|
|
Term
SOFTWARE What is an operating system? |
|
Definition
The language of the computer that controls application interface (API), user interfaces, peripherals( like printers), memory, storage, and processors. |
|
|
Term
SOFTWARE What are major functions of an OS? |
|
Definition
CPU time-sharing, resource allocation, memory management, device drivers, application interface. |
|
|
Term
SOFTWARE How do corporations purchase software? |
|
Definition
Site Licenses or Application Service Provider (ASP) |
|
|
Term
SOFTWARE What is vertical market software? |
|
Definition
Written for a particular type of business. Such as a dentists office, or accounting software. |
|
|
Term
SOFTWARE What is the Software development lifecycle? |
|
Definition
Analysis, Design, Construction, Testing, Implementation. |
|
|
Term
What computer language can almost every other computer language trace their ancestry to? |
|
Definition
|
|
Term
NETWORK What networking topology do we use today and what are it's features? |
|
Definition
Star: Allows for multiple computer conversations, easy to add workstations, and centralized control. |
|
|
Term
|
Definition
Small electronic messages that contain a header(where its going and where it came from) and data(actual payload). |
|
|
Term
NETWORK What is a hub, switch and router? |
|
Definition
Hub: Connects at the physical layer. Makes a physical hardwired connection. Only one computer can talk at a time.
Switch: Connect at the link level. Recognizes MAC addresses. Has internal data table listing which computer is at which port for faster switching. From internal circuits between machines, uses in star architectures.
Router:Connect at the network layer. Recognizes IP addresses and network domains. Acts as an international border guard. Checks packet destinations, keeps internal packets in and ROUTES external packets. |
|
|
Term
NETWORK What four steps are needed in the HTTP protocol? |
|
Definition
|
|
Term
NETWORK How is DSL physically different from cable or fiber? |
|
Definition
DSL needs to use the telephone lines so a phone is needed. Cable is being used with the cable line so no phone is needed, yet, a cable modem is needed. Fiber uses light modified light to transmit data. |
|
|
Term
SECURITY What are exploits? |
|
Definition
Code that takes advantage of a software bug, glitch or computer vulnerability. System security is compromised. |
|
|
Term
SECURITY What is a difference between a worm and virus? |
|
Definition
Worm: a self-replicating computer program that sends copies of itself to other systems. Worms can destroy files, turn your computer into a Botnet zombie, open up your computer for illegal file sharing, make your computer send span emails and use your computer as a platform to hack into other systems.
Virus(virii): Requires a host to attach itself. Could be a file or in your BIOS. A virus can only spread from computer to another when its host is taken to the uninfected computer. |
|
|
Term
|
Definition
Distributed Denial of Service- when multiple computers are working together to knock an opposing computer offline. Usually this is a coordinated effort by a botnet army. |
|
|
Term
|
Definition
Malware is a general class of software that damages computer systems without consent. Has a variety of hostile, intrusive or annoying software. Bases on the perceived intent of the creator. |
|
|
Term
SECURITY What is the difference between black and white hats? |
|
Definition
Two major classes of hackers. White hat: intending to improve security. Black hat: someone violating computer or internet security and do illegal activity. |
|
|
Term
SECURITY What are the three elements to two-factor authentication? |
|
Definition
Something you have, something you are, something you know. |
|
|
Term
SECURITY What is spoofing? |
|
Definition
Someone imitates your computer to gain access. |
|
|
Term
SECURITY What is a zero-day exploit? |
|
Definition
Exploits that do not have patches yet. |
|
|
Term
SECURITY What is a firewall? |
|
Definition
Can be hardware of software based. Designed to set up barriers to external worms, virii and hackers. |
|
|
Term
SECURITY What is a honeypot? |
|
Definition
Decoy detection equipment. |
|
|
Term
BUSINESS CONTINUITY What is business continuity? |
|
Definition
The ability to continue business in the face of disaster. |
|
|
Term
BUSINESS CONTINUITY What are the three approaches to handling risk? |
|
Definition
Monitor, manage and implement. |
|
|
Term
BUSINESS CONTINUITY How is each facet of the IT triad impacted by risk? |
|
Definition
People: Risk of losing people, or having people who with bad intentions. Cost to keep and maintain.
Technology:Risk of failure or shutdown. Risk of changing technology and not being able to keep up.
Process: Risk of process not being implemented or falling short of expectations. |
|
|
Term
BUSINESS CONTINUITY What steps should businesses take to prepare for disasters? |
|
Definition
Monitoring and managing the risk. Then having a plan an implementing is. Making sure the plan has been through tests of course. |
|
|
Term
ecommerce What is the difference between eBusiness and ecommerce? |
|
Definition
All business activity on a network (usually using internet technology and standards)->More than just buying and selling.
ecommerce: Buying, selling, service. |
|
|
Term
ecommerce What are the three dimensions of ecommerce? |
|
Definition
Physical(traditional), Mix of physical and online(Hybrid), and All online(pure electronic). |
|
|
Term
ecommerce? Define in-house, joint venture, and spin off? |
|
Definition
In-house: complete integration, share info.
Joint venture/partnerships: Independent companies share syneries.
Spin-off: Complete separation. Such as brick and Mortar...this is the most common in early days of ecommerce. |
|
|
Term
|
Definition
Founded by Steve Jobs in 1976 with Steve Wozniak and Ronald Wayne. Apple builds hardware, software and consumer electronics. |
|
|
Term
|
Definition
Jeff Bezos founded 1994. Wrote business plan on a drive between New York and Seattle. |
|
|
Term
|
Definition
Founded by Len Bosack and Sandy Lerner at Stanford. Current CEO is John Chambers. |
|
|
Term
|
Definition
Founded by current CEO Michael Dell. Steady feud with Apple. |
|
|
Term
|
Definition
Founded by Pierre Omidyar. Current CEO is John Donahoe. |
|
|
Term
|
Definition
|
|
Term
|
Definition
CEO Terry Gou. Famous for labor camps. Makes iAnything, Xbox, playstation, kindle, Wii U. |
|
|
Term
|
Definition
CEO Larry Page. Founded by Page and Sergey Brin |
|
|
Term
|
Definition
Found by Bill Hewlett and David Packard. Current CEO is Meg Whitman |
|
|
Term
|
Definition
Founded in 1898 by Herman Hollerith. CEO is Virginia Rometty. She was in charge of jeopardy game before IBM. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Founded in 1975. CEO is Satya Nadella. Founded by Bill Gates and Paul Allen. |
|
|
Term
|
Definition
CEO Larry Ellison. Steve Jobs was his photographer in his 4th wedding. Ellison also founded company in 1977. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
IT Strategy Name some competitive strategies? |
|
Definition
Cost focus, cost leadership, differentiation, innovation, growth, alliances, focus/niche |
|
|
Term
IT Strategy What are the five forces in Porter's Competitive Forces Model? |
|
Definition
Threat of new competitors, bargaining power of suppliers, bargaining power of customers, threat of substitute products or services, rivalry among existing firms. |
|
|
Term
IT Strategy What is the focus of the value chain? |
|
Definition
Views an organization as a series, chain, or network of activities that add value to its products and services. |
|
|
Term
IT Strategy Can you identify each part of a PEST analysis? |
|
Definition
Political Economic Social Technological |
|
|
Term
IT Strategy What are some IT considerations when expanding your business? |
|
Definition
Local- How to hold data, cost-savings by eliminating duplication National- Different state laws, Tax considerations. Global- Same as all the above, standards, privacy and sharing laws, currency controls. |
|
|
Term
IT Planning What are the reasons for planning? |
|
Definition
Structure, framework, set of procedures, content, assumptions. The future can be anticipated??? |
|
|
Term
IT Planning what are the five organizational styles? |
|
Definition
Navigator, Evangelist, Conductor, Scientist, Gorilla. |
|
|
Term
IT Planning Can you identify the impact and the difficulty associated with each are of the IT triad? |
|
Definition
Processes, people and technology. People are the most difficult. |
|
|
Term
IT Planning What are the three organizational decision-making levels and what are their responsibilities? |
|
Definition
Executive/Strategic, Managerial/Tactical, Operational/Functional |
|
|
Term
IT Laws What are intellectual property, copyright and patents? |
|
Definition
Patents protect ideas for specific time, 20 yrs, depends on industry.
Copyright: exclusive right. Life +70 years.
Intellectual: original idea, work of art. |
|
|
Term
IT Laws What is the Fair Use Doctrine? |
|
Definition
Legal concept of limitations to copyright infringement You may make copies of copyrighted material for the purposes of Criticism, comment, news reporting, teaching, scholarship, research or personal use Under the Fair Use Doctrine, you can make backup copies of copyrighted material (CDs, DVDs) provided they are for your own use |
|
|
Term
|
Definition
Digital Millennium Copyright Act |
|
|
Term
|
Definition
Viacom vs, YouTube (2013 Federal Appeals ruling) † YouTube was found with tens of thousands of TV shows YouTube is not liable for infringing tv shows, provided they comply with takedown notices (Safe Harbor provision) MPAA vs. RealNetworks (2009 Federal District ruling) RealNetworks built a software to backup DVDs Programs engaging in Fair Use cannot circumvent DMCA access control measures
Vernor vs. AutoDesk (2010 Federal Appeals ruling, Final) Vernor found an unopened copy of AutoCad at a garage sale and attempted to sell it on eBay Licenses can forbid and severely restrict transfer or resale Conflict??? Kirtsaeng vs. Wiley (2013 Supreme Court)??? UsedSoft vs Oracle (2012 EU High Court)??? Lenz vs. Universal (2010 Federal District ruling) † Video of a baby dancing to Prince music Rights holders must consider Fair Use before issuing takedowns |
|
|
Term
IT Laws What is an IP Troll? |
|
Definition
Businesses whose only function is to profit from IP lawsuits. |
|
|
Term
|
Definition
FISA – Foreign Intelligence Surveillance Act (1978) Establishes standards and procedures to collect intelligence on foreign entities within the United States Disallows domestic spying without special warrants HIPAA – Health Insurance Portability and Accountability Act (1996) Hierarchies of access control to healthcare information Data backups of 100% reliability Forms and releases must be scanned, saved and available SOX – Sarbanes-Oxley Act (2002) All business records, including electronic business records and electronic messages, must be saved for not less than 5 years Phone calls, emails, IMs, work files, memos, letters, everything Patient Protection & Affordable Care Act (2010) Healthcare Information Technology (HIT) requirements All medical records are held electronically All scripts must be ePrescriptions All patient records are available to health insurers |
|
|
Term
IT Ethics What are the categories of Ethical Failure? |
|
Definition
Abuse of position, conflicts of interest, credit card abuse, gambling, gift violations, misuse of resources, morale-welfare and recreation problems, statutory crimes(fraud), knowing about an activity and not reporting it |
|
|
Term
IT Ethics What are the four main issues in ethics? |
|
Definition
PAPA Privacy Accuracy Property Accessibility |
|
|