IS FINAL Flashcards

1
Q

What is a transaction? + 3 examples

A

any business event that generates data worthy of being captured and stored in a data- base. Examples of transactions are a product manufactured, a service sold, a person hired, and a payroll cheque generated. In another example, when you are checking out of Walmart, each time the cashier swipes an item across the bar code reader is one transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a transaction processing system (TPS) do?

A

supports the monitoring, collection, storage, and processing of data from the organization’s basic business transactions, each of which generates data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the modern business world, TPSs are ________ for the ___________ ____ information systems and ________ __________systems, as well as business operations such as customer relationship management, knowledge management, and e-commerce

A

Inputs, functional area, business intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do transaction processing systems manage data?

A
  1. Business event/transaction
  2. TPS
    2a. Detailed reports
  3. Organization’s database, where FAIS, DSS, BI, Dashboards, and ES occur
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When more than one person or application program can access the database at the same time, the database has to be protected from errors resulting from overlapping updates. The most common error is…

A

Losing the results of one of the updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TPS handle the complexities if transactional data by…

A

•Protect database from errors resulting from overlapping updates

•Protection against inconsistencies arising from a failure of any component at any time. Does this ATM communicate with other connected devices in the bank?)

•System must be able to reverse or make corrections or adjustments to transactions

•All transactions plus corrections, reversals or adjustments need to have an audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 2 ways to process data in TPS?

A

Batch processing and online processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is batch processing?

A

The firm collects data from transactions as they occur, placing them in groups orbatches. The system then prepares and processes the batches periodically (say, every night).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is online transaction processing?

A

business transactions are processed online as soon as they occur. For example, when you pay for an item at a store, the system records the sale by reducing the inventory on hand by one unit, increasing sales figures for the item by one unit, and increasing the store’s cash position by the amount you paid. The system performs these tasks in real time by means of online technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a functional area information systems?

A

Functional Area Information Systems (FAIS) provide support for the various functional areas in an organization by increasing each area’s internal efficiency and effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where do fais get data?

A

Corporate databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Thw 2 Problems of inventory management are

A

Excessive inventory

Insufficient inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Economic solution for inventory management is

A

Economic order quantity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Technological solution for managing inventory

A

VMI (vendor managed),

Its real time and AI powered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Inventory systems that use an EOQ approach are designed for items that are _________ _____

A

Completely independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why does HR need IS and how can they solve those problems?

A
  • electronic transfer of money to employees’ account
  • payroll prep
    Can use FAIS to automate this routine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why can fais be ineffective?

A

Lack of communication between departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does an ERP do?

A

An ERP corrects a lack of communication among the functional area ISs. ERP systems resolve this problem by tightly integrating the functional area IS via a common database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two main objectives of the ERP systems

A

Tightly integrate the functional areas of the organization and to enable information to flow seamlessly across them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are ERP II systems?

A

Interorganizational systems that are Capable of providing web-enabled links between a company’s key business systems and its customers, suppliers,distributors, and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the 3 core ERP Modules

A

Accounting and finance, Manufacturing and production, human resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the four extended Erp II modules

A

Supply chain management, business intelligence, E business, customers relationship management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the major benefits of ERP systems

A

Organizational flexibility and agility
Decision support
Quality and efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the major limitations of ERP systems

A
  • Business process and ERP often pre-defined by the best practises that the ERP vendor has developed
  • Complex, expensive, time consuming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the major causes of ERP implementation failure?

A
  • Failure to involve affected employees in the planning and development phases and in change management processes
  • Trying to accomplish too much too fast in the conversion process
  • Insufficient training in the new work tasks required by the ERP system
  • Failure to perform proper data conversion and testing for the new system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the 3 strategic approaches to implementing an on premise eps system

A

Vanilla approach
Custom approach
Best of breed approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the vanilla approach?

Pros and cons

A

approach, a company implements a standard ERP package, using the package’s built-in configuration options. When the system is implemented in this way, it will deviate only minimally from the package’s standardized settings. The vanilla approach can enable the company to perform the implementation more quickly. However, the extent to which the software is adapted to the organization’s specific processes is lim- ited. Fortunately, a vanilla implementation provides general functions that can support the firm’s common business processes with relative ease, even if they are not a perfect fit for those processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the custom approach?

Pros and cons

A

In this approach, a company implements a more customized ERP system by developing new ERP functions designed specifically for that firm. Decisions con- cerning the ERP’s degree of customization are specific to each organization. To use the custom approach, the organization must carefully analyze its existing business processes to develop a system that conforms to the organization’s particular characteristics and pro- cesses. Customization is also expensive and risky because computer code must be written and updated every time a new version of the ERP software is released. Going further, if the customization does not perfectly match the organization’s needs, then the system can be very difficult to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the best of breed approach?

Pros and cons

A

Modify vanilla approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is SAAS ERP?

A

Lease ERP software that is cloud-based normally using the vanilla approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are 3 prominent examples of cross-departmental processes

A
  • procurement (need to buy -> send payment
  • fulfillment process (customer request to buy -> recieve payment)
  • production process (need to produce -> recieve finished goods)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In what departments does the procurement process occur?

A

Warehouse, Purchasing, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the 3 main departments of the order fullfillment process?

A

Sales, warehouse, accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Does the production occur in all companies?

A

No, because not all companies produce physical goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What do SCM and CRM processes do?

A

Help multiple firms in an industry coordinate activities such as the production-to-scale of goods and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What do ERP SCM systems do?

A

Have the capability to place automatic requests to buy fresh perishable products from suppliers in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What do ERP CRM systems do?

A

Generate forcasting analyses of product consumption based on critical variables such as geographical area, season, day of the week, and type of customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are Ad hoc reports

A

Ad hoc (or on-demand) reports: Nonroutine reports that often contain special information that is not included in routine reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are comparative reports?

A

Reports that compare performances of different business units or times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is an enterprise application integration (EAI) system?

A

A system that integrates existing systems by providing layers of software that connect applications together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are comparative reports?

A

Reports that compare performances of different business units or times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are drill-down reports?

A

Reports that show a greater level of details than is included in routine reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are exception reports

A

Reports that include only information that exceeds certain threshold standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are key indicator reports?

A

Reports that summarize the performance of critical activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the order fulfillment process?

A

A cross-functional business process that originates when the company receives a customer order, and it concludes when it receives a payment from the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a procurement process?

A

A cross-functional business process that originates when a company needs to acquire goods or services from external sources, and it concludes when the company receives and pays for them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a production process?

A

A cross-functional business process in which a company produces physical goods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Today, supply chain management is an integral part of all organizations and can improve _______ _____ and reduce ______ ______

A

Customer service, oprtating costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is customer relationship management (CRM)

A

a customer-focused and customer-driven organizational strategy. That is, organizations concentrate on assessing customers’ require- ments for products and services and then provide a high-quality, responsive customer experi- ence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The CRM process begins with

A

marketing efforts, through which the organization solicits prospects from a target population of potential customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

An organization’s overall goal is to maximize the ________ ______ of a customer, which is that customer’s potential revenue stream over a number of years.

A

Lifetime Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Over time all organizations inevitably lose a certain percentage of customers, a process called…

A

Customer churn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Although CRM varies according to circumstances, all successful CRM policies share two basic elements:

A

(1) The company must identify the many types of customer touch points, and (2) it needs to consolidate data about each customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Who use low-end crm systems?

A

Enterprises with many small customers (i.e. amazon)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Who uses high-end crm systems

A

Enterprises with a few large customers i.e. bentley

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are customer touch points?

A

Diverse interactions organizations have with their customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a reason customer touch points can lead to channel conflicts?

A

All touch points may not be in sync

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is omni-channel marketing?

A

an approach to customers that creates a seamless experience regardless of the chan- nel (or device) used to “touch” the business. Many businesses are now creating omni-channel strategies to drive this cohesive experience for their customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are Collaborative CRM systems? And what leads to them?

A

•Info. sharing leads to collaborative CRM.

•Collaborative CRM systems provide effective and efficient interactive communication with the customer throughout the entire organization.

•Collab. CRM integrate communications between the organization and its customers in all aspects of marketing, sales, and customer support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Customer-related data is available to every unit of the business because of….

A

Modern interconnected systems built around a data watehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A complete data set on each customer is called…

A

A 360 degree view of that customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

2 reasons having a 360 degree view is good for the company

A

•A360°view enhances company’s relationship with its customers and ultimately make more productive and profitable decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are operational CRM systems?

A

The component
of CRM that supports the front-office business processes that directly interact with customers (i.e., sales, marketing, and service).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What 3 benefits do operational crm systems provide?

A
  • Efficient, personalized marketing, sales, and service
  • A 360o view of each customer
  • The ability of sales and service employees to access a complete history of customer inter- action with the organization, regardless of the touch point
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What objectives can be accomplished with CRM tools (5)?

A
  • Improve sales and account management by optimizing the information shared by mul- tiple employees and by streamlining existing processes (e.g., taking orders using mobile devices)
  • Form individualized relationships with customers, with the aim of improving customer sat- isfaction and maximizing profits
  • Identify the most profitable customers, and provide them with the highest level of service
  • Provide employees with the information and processes necessary to know their customers
  • Understand and identify customer needs, and effectively build relationships among the company, its customer base, and its distribution partners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is a customer-facing CRM application?

A

In customer-facing CRM applications, an organization’s sales, field service, and customer interaction centre representatives interact directly with customers. These applications include customer service and support, salesforce automation, marketing, and campaign management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What are 7 types of customer touching applications

A
Search and comparison 
Technical information and services
Customized products and services
Personalized webpages
FAQs
Email and automated response
Loyalty programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What are the four types of customer facing applications

A

Customer service and support
Sales (salesforce automation)
Marketing
Campaign management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is salesforce automation

A

Salesforce automation (SFA) is the component of an oper- ational CRM system that automatically records all of the components in a sales transaction process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is cross-selling

A

the marketing of additional related products to customers based on a pre- vious purchase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is bundling

A

Bundling is a form of cross-selling in which your business sells a group of products or services together at a lower price and their combined individual prices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What do campaign management applications do

A

Campaign management applications help organizations plan campaigns that send the right messages to the right people through the right channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What are analytical CRM systems?

A

Analytical CRM systems provide business intelligence by analyzing customer behaviour and perceptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What are some reasons why analytical CRM systems analyze consumer data?

A
  • Designing and executing targeted marketing campaigns
  • Increasing customer acquisition, cross-selling, and upselling
  • Providing input into decisions relating to products and services (e.g., pricing and product development)
  • Providing financial forecasting and customer profitability analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is the relationship between operational CRM’s and analytical CRM

A

Need Operational for analytical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is a supply chain?

A

The flow of materials, information, money, and services from raw material suppliers, through factories and warehouses, to the end customers. A supply chain also includes the organizations and processes that create and deliver products, information, and services to the end customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is supply chain visibility?

A

Supply chain visibility refers to the ability of all organizations within a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers’ production processes and transportation networks to their receiving docks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What were the three segments of the supply chain

A

Upstream
Internal
Downstream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is the upstream segment of a supply chain?

A

Soucing/procurement from external suppliers occurs
Supply chain managers select suppliers to deliver things company needs to produce the final good or service
supply chain managers develop the pricing, delivery, and payment processes between a company and its suppliers. Included here are processes for managing inventory, receiving and verifying shipments, transferring goods to manufacturing facilities, and authorizing payments to suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is the internal segment of a supply chain?

A

Packaging, assembly, or manufacturing takes place
 Supply chain managers schedule the activities necessary for production, testing, packaging, and preparing goods for delivery. They also monitor quality levels, production output, and worker productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is the downstream segment of a supply chain?

A

Distribution takes place, frequently by external distributors

In this segment, supply chain managers coordinate the receipt of orders from custom- ers, develop a network of warehouses, select carriers to deliver products to customers, and implement invoicing systems to receive payments from customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is the tier of suppliers?

A

Tier 3: basic i.e. glass, rubber
Tier 2: windshields, tires
Tier 1: dashboards, cars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What are the 3 types of flows in a supply chain?

A

Material, information, financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is the function of supply chain management?

A

To improve the processes a company uses to acquire the raw materials it needs to produce a product or service and then deliver that product or service to its customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What are the five basic components of SCM supply chain management

A
Plan
Source
Make
Deliver
Return
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What is the push model?

A

Also known as made-to-stock
Starts with a forecast of customer demand
Company thenproduces the number of products in the forecast, typically by using mass production, and sells, or “pushes,” those products to consumers.
Usually incorrect!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the pull model?

A

Also known as make to order
Begins with an order then is produced
Not all companies can use the pull model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What are the 3 main sources of problems along the supply chain?

A

Uncertainties
The need to coordinate multiple activities, internal units, and business partners
Bullwhip effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What is the bullwhip effect?

A

erratic shifts in orders up and down the supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

2 problems that occur with the bullwhip effect

A

Hoarding

Stockpiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is vertical integraton?

A

a business strategy in which a company purchases its upstream suppliers to ensure that its essential supplies are available as soon as the company needs them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is just in time inventory system?

A

Getting inventory right when you need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is vendor managed inventory?

A

supplier, rather than the retailer, manages the entire inventory process for a particular product or group of products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What 3 technologies provide support for supply chain management/IOSs

A

Electronic data interchange
Extranets
Portals and exchanges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is electronic data interchange (edi)?

A

Electronic data interchange (EDI) is a communication standard that enables business partners to exchange routine documents, such as purchasing orders, electronically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

How does EDI provide benefits?

A

Minimizes data entry errors, shorter length of message, message security, reduce the cycle time, increases productivity, enhances customer service, minimizes paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Disadvantages of EDI

A

Business processes and sometimes be restricted to fit idiot requirements, many EDI standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What are extranets?

A

They link business partners over the Internet by providing them access to certain areas of each other’s corporate Intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Extranets use_____to make communication over the Internet more secure

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What are the two basic types of corporate portals

A

Procurement portals and distribution portals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is a procurement portal

A

Automate the business processes involved in purchasing or procuring products between a single buyer and multiple sellers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What is a Distribution portal

A

Automate The business process involved in selling or distributing products from a single supplier to multiple buyers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What is a computer network?

A

A system that connects computers and other devices via communications media so that data and information can be transmitted among them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What are front offuce processes

A

front-office processes Processes that directly interact with customers; that is, sales, marketing, and service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is bandwidth

A

The transmission capacity of a network, stated in bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is broadband

A

The transmission capacity of a communications medium that is faster than 25 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is a domain name system (dns)

A

The system administered by the Internet Corporation for Assigned Names and Numbers (ICANN) that assigns names to each site on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What is a domain name

A

The name assigned to an Internet site, which consists of multiple parts, separated by dots, that are translated from right to left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is an extranet

A

network that connects parts of the intranets of different organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is a fibre optic cable

A

A communications medium consisting of thousands of very thin filaments of glass fibres, surrounded by cladding, that transmit information through pulses of light generated by lasers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is an intranet

A

A private network that uses Internet software and TCP/IP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is a local area. Etwork (LAN)

A

A network
that connects communications devices in
a limited geographic region, such as a building, so that every user device on the network can communicate with every other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What are network access points (naps)

A

Computers that act as exchange points for Internet traffic and determine how traffic is routed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is peer to peer processing

A

A type of client/server distributed processing that allows two or more computers to pool their resources, making each computer both a client and a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What is a protocol

A

The set of rules and procedures that govern transmission across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What is a router

A

A communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a wide area network such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What is Transmission Control Protocol/Internet Protocol (TCP/IP)

A

A file transfer protocol that can send large files of information across sometimes unreliable networks with the assurance that the data will arrive uncorrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What is Hypertext Transport Protocol (HTTP)

A

The communications standard used to transfer pages across the WWW portion of the Internet; it defines how messages are formulated and transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

MAN

A

MANs are relatively large networks that cover a metropolitan area. MANs fall between LANs and WANs in size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Types of computer networks small to large

A
PAN 
LAN
MAN
WAN
Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Although it is not required, many LANs have a…

A

File server or network server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

WAN

A

A wide area network (WAN) is a network that covers a large geographical area. WANs typically connect multiple LANs. They are generally provided by common carriers such as tele- phone companies and the international networks of global communications services providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

WANs contain

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Enterprise network

A

Interconnected networks with multiple lans and wans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Backbone networks

A

Are high-speed central networks to which multiple smaller networks (such as LANs and smaller WANs) connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What is a communications channel

A

A pathway to communicate data. It is made up of two types of media: cable (twisted- pair wire, coaxial cable, or fibre-optic cable) and broadcast (microwave, satellite, radio, or infrared).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What is wireline/cable media

A

Wireline media or cable media use physical wires or cables to transmit data and infor- mation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Twisted pair wire

A

most prevalent form of communications wiring— twisted-pair wire—is used for almost all business telephone wiring. As the name suggests, it consists of strands of copper wire twisted in pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

3 basic functionS of TCP

A

(1) It manages the movement of data packets (see further on) between computers by establishing a connection between the computers,
(2) it sequences the transfer of packets, and
(3) it acknowledges the packets that have been transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Function of internet protocol IP

A

The Internet Protocol (IP) is responsible for disassembling, delivering, and reassembling the data during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Before data are transmitted over the Internet, they are divided into small, fixed bundles called

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What are the 4 layers of the TCP/IP reference model?

A

Application
Transport
Internet
Network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

The transmission technology that breaks up blocks of text into packets is called

A

Packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Why do organizations use packet switching?

A

The main reason is to achieve reliable end-to- end message transmission over sometimes-unreliable networks that may have short-acting or long-acting problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Application layer TCP/IP + example

A

application layer enables client application programs to access the other lay- ers, and it defines the protocols that applications use to exchange data. One of these application protocols is the Hypertext Transfer Protocol (HTTP), which defines how messages are formulated and how they are interpreted by their receivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Transport layer of TCP/IP and one protocol in it

A

transport layer provides the application layer with communication and packet services. This layer includes TCP and other protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Internet layer and one protocol in it

A

Internet layer is responsible for addressing, rout- ing, and packaging data packets. The IP is one of the protocols in this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Network interface layer TCP/IP

A

the network interface layer places packets on, and receives them from, the network medium, which can be any networking technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

T or F: Two computers using TCP/IP can communicate even if they use different hardware and software.

A

T

140
Q

Distributed processing + common type of it

A
  • divides work processing work among 2 or more computers
  • enables computers in different locations to communicate w/ one another through telecommunication links
  • Common type is client/server computer
141
Q

Client/server computing + 2 types of clients

A

Client/server computing links two or more computers in an arrangement in which some machines, called servers, provide computing services for user PCs, called clients

  • Fat Client: Large storage + Processing power
  • Thin Client: No local storage + Limited processing power ( of little value when network not functioning)
142
Q

3 types of peer to peer processing

A
  1. Accesses unused CPU power among network computers (open source projects)
  2. Real-time, person to person collab (google docs)
  3. Advanced search and file sharing (like bit torrent)
143
Q

What is the internet

A

The Internet (“the Net”) is a global WAN that connects approximately 1 million organizational computer networks in more than 200 countries on all continents.

144
Q

What are the 6 internet connection methods

A
Dial-up
DSL (broadband through phone company)
Cable modem (cable tv)
Satellite (radio wave satellite network)
Wireless (WIFI)
Fibre to the home (broadband via fibre optic)
145
Q

What is a network access point

A

Exchange points for internet traffic that determine how it’s routed

146
Q

2 IP addressing schemes

A

IPv4: most widely used, 32 bits (135.32.456.74)
IPv6: developed cause we ran out of IPv4. 32 bits.

147
Q

NAPs are replaced by

A

IXP

148
Q

Www, McGill, and ca in www.Mcgill.ca

A

Www = sub-domain
McGill = second-level domain
Ca - top level domain

149
Q

T or F: the world wide web is the internet

A

False

150
Q

Www.microsoft.com is an example of a

A

Url

151
Q

Ex of a search engine

A

Google

152
Q

Unified communicayions

A

Unified communications (UC) simplifies and integrates all forms of communications— voice, voice mail, fax, chat, email, instant messaging, short message service, presence (location) services, and videoconferencing—on a common hardware and software platform

153
Q

Crowdsourcing

A

One type of collaboration is crowdsourcing, in which an organization outsources a task to an undefined, generally large group of people in the form of an open call

154
Q

Benefits of crowdsourcing

A
  • fast and low cost to explore probs
  • wider range of talent
  • firsthand insight into customers
  • looks into global world of ideas
155
Q

Advantages of microwave trans

A

High bandwidth

Relatively inexpensive

156
Q

Wireless devices provide three major advantages to users:

A
  1. They are small enough to easily carry or wear.
  2. They have sufficient computing power to perform productive tasks.
  3. They can communicate wirelessly with the Internet and other devices.
157
Q

3 major types of wireless media

A

Microwave
Sattelite
Radio

158
Q

Micowave transmission + 3 criteria for use

A

Microwave transmission systems transmit data through electromagnetic waves. These systems are used for high-volume, long-distance, line-of-sight communication. Line-of-sight means that the transmitter and receiver are in view of each other.

159
Q

Disadvantages of microwave trans

A

Unobstructed line of sught

Susceptible to environmental interference

160
Q

Advantages of sattelite

A

High bandwidth

Large coverage area

161
Q

Disadvantages of sattelite

A

Expensive
Must have clear line of sight
Signals experience propagation delay
Must use encryption for security

162
Q

Advantages of radio trans

A

High bandwidth

Signals pass through walls Inexpensive and easy to install

163
Q

Disadvantages of radio trans

A

Creates electrical interference problems Susceptible to snooping unless encrypted

164
Q

Sattelite communication and 3 types

A

Satellite transmission systems make use of communication satellites. Currently, there are three types of satellites circling Earth: geostationary-earth-orbit (GEO), medium-earth-orbit (MEO), and low-earth-orbit (LEO). Each type has a different orbit, with GEO being farthest from Earth and LEO being the closest

165
Q

Geo sattelite use + Characteristics

A

TV SIGNAL

Satellites stationary relative to point on Earth Few satellites needed for global coverage
Transmission delay (approximately 0.25 second)
Most expensive to build and launch
Longest orbital life (many years)

166
Q

MEO satellite use and characteristics

A

GPS

Satellites move relative to point on Earth Moderate number needed for global coverage Requires medium-powered transmitters Negligible transmission delay
Less expensive to build and launch
Moderate orbital life (6 to 12 years)

167
Q

LEO satellite use and characteristics

A

TELEPHONE
Satellites move rapidly relative to point on Earth
Large number needed for global coverage Requires only low-power transmitters
Negligible transmission delay
Least expensive to build and launch Shortest orbital life (as low as 5 years) Satellites move rapidly relative to point on Earth
Large number needed for global coverage Requires only low-power transmitters
Negligible transmission delay
Least expensive to build and launch
Shortest orbital life (as low as 5 years)

168
Q

If the satellite is higher, its footprint is…

A

Bigger

169
Q

Radio transmission

A

It uses radio wave frequencies (longest wavelengths) to send data directly between transmitters and receivers, can travel through walls

170
Q

Do we need to know wireless security 8.1

A
171
Q

3 basic short range networks

A

Bluetooth
Ultra wideband (UWB)
Near field communications (NFC)

172
Q

Bluetooth

A

industry specification used to cre- ate small personal area networks. A personal area network is a computer network used for communication among computer devices (e.g., telephones, personal digital assistants, smart- phones) located close to one person. Bluetooth uses low-power, radio-based communication.

173
Q

Ultra-Wideband (UWB)

A

high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps

174
Q

Near-field communication (NFC)

A

has the smallest range of any short-range wireless network. It is designed to be embedded in mobile devices such as cell phones and credit cards. I.E. Tap, apple pay

175
Q

4 types of med. range wireless networks, and what type of LAN are they

A
They are WLANs
Wi-Fi
Wifi-Direct (hotspot)
MiFi (portable router)
LiFi (plane)
176
Q

2 Types of wide area networks

A
Cellular radio
Wireless broadband (wimax)
177
Q

1-4G describe

A

1st Generation of networks (voice only – using analog signals)
2nd Generation (digital signals – voice communications + data – text and smiles)
3G (digital + video, web, instant messaging, higher bandwidth) uses packet switching
4G is the 4th Generation of broadband cellular network technology
Secure mobile broadband, gaming services, high-definition mobile TV, video conferencing,… basically a hand-held computer

178
Q

Key differences between 4 and 5 g

A
  • peak capacity of 5G UWB sector is in gbps compared to 4G in mbps
  • latency, or the time that passes from the moment information is sent from a device until it is used by a receiver, will be greatly reduced on 5G networks, allowing for faster upload and download speeds.
  • bandwidth size: 5G should be able to support many more devices of the future, in addition to the network demands of connected vehicles and other devices in the Internet of Things.
179
Q

Wireless Broadband (WiMAX)

A

Worldwide Interoperability for Microwave Access, popularly known as WiMAX
• has a wireless access range of up to 50 kilometres, compared with 100 metres for Wi-Fi
• has a data-transfer rate of up to 75 Mbps
• a secure system, offers features such as voice and video
• antennas can transmit broadband Internet connections to antennas on homes and businesses several kilometres away
• provides long-distance broadband wireless access to rural areas and other locations that are not currently being served

180
Q

Define and list the 5 threats to wireless networks

A
  1. Rogue access point: unauthorized access point to a WLAN
  2. Evil twin attack: an imposter with a computer connects to your computer, pretending to be your normal (or other) access point
  3. War driving : walking around to find unsecure WLANs to connect to
  4. Eavesdropping: efforts by unauthorized users to try to access data traveling over wireless networks.
  5. RF (Radio frequency) jamming: a person or a device intentionally or unintentionally interferes with your wireless network transmissions.
181
Q

Information security

A

information security refers to all of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction

182
Q

Define security

A

Security can be defined as the degree of protection against criminal activity, danger, damage, or loss.

183
Q

Threat definition

A

A threat to an information resource is any danger to which a system may be exposed.

184
Q

Exposure definition

A

The exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.

185
Q

Vulnerability definition

A

An information resource’s vulnerability is the possibility that a threat will harm that resource.

186
Q

5 key factors that are contributing to increasing vulnerability

A
  1. Today’s interconnected, interdependent, wirelessly networked business environment
  2. Smaller, faster, inexpensive computers and storage devices
  3. Decreasing skills necessary to be a computer hacker
  4. International organized crime taking over cybercrime
  5. Lack of management support
187
Q

What are the 2 major categories of threats

A

Unintentional and deliberate

188
Q

T or F: the higher the level of employee, the greater the threat they pose to informa- tion security

A

T

189
Q

Human mistakes examples:

A
  • Carelessness with laptops and other computing devices
  • Opening questionable e-mails
  • Careless Internet surfing
  • Poor password selection and use
  • Carelessness with one’s office
  • Carelessness using unmanaged devices
  • Carelessness with discarded equipment
  • Careless monitoring of environmental hazards
190
Q

Social engineering

A

Social engineering is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. The most common example of social engineering occurs when the attacker impersonates someone else on the telephone, such as a company manager or an IS employee

191
Q

3 social engineering techniques

A

Impersonation
Tailgating
Shoulder surfing

192
Q

Name 4 deliberate threats to IS

A
  1. Espionage/trespass
  2. Theft of equipment/info
  3. Identity theft
  4. Software attacks
193
Q

When does espionage/trespass occur

A

Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information.

194
Q

2 categories of espionage/trespass

A
  1. Competitive intelligence: legal info gathering techniques (i.e. studying a company’s Web site > Hiring page > new projects)
  2. Industrial espionage: crosses legal boundary (i.e. theft of confidential data)
195
Q

Remote attacks requiring user action and their descriptions

A
  1. Virus: Segment code that performs malicious actions by attaching to another computer program.
  2. Worm: Segment of code that performs malicious actions and will replicate by itself (without requiring another computer program).
  3. Phishing attack: Uses deception to acquire sensitive personal information by masquerading as official looking emails or instant messages.
  4. Spear phishing
    Targets large groups of people. The perpetrators find out as much information as they can about an individual, tailoring their phishing attacks to improve the chances that they will obtain sensitive, personal information.
196
Q

remote attacks needing no user action

A
  1. Denial-of-service attack
    An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (ceases to function).
  2. Distributed denial-of-service attack
    An attacker first takes over many computers, typ- ically by using malicious software. These com- puters are called zombies or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated stream of information requests to a target computer, causing it to crash.
197
Q

Attacks by a programmer developing a system + descriptions

A
  1. Trojan horse
    Software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.
  2. Back door
    Typically a password, known only to the attacker, that allows them to access a computer system at will, without having to go through any security procedures (also called a trap door).
  3. Logic bomb
    A segment of computer code that is embedded within an organization’s existing computer pro- grams and is designed to activate and perform a destructive action under specific conditions, such as at a certain time or date.
198
Q

Ransom ware

A

Malicious software that blocks access to a computer system or encrypts an
org.’s data until the organization pays a sum of money.

199
Q

Potential target for ransom ware

A

Any internet-connected device

200
Q

Ransom ware-as-a-service

A

Some ransomware developers distribute ransomware to any hacker who wants to use it. This process
is called ransomware-as-a-service.
the original creators publish the software on the Dark Web, allowing other criminals to use the
code in return for receiving 40-50% of each ransom paid.

201
Q

Cyberterrorism/cyber fare

A

Cyberterrorism and cyberwarfare refer to malicious acts in which attackers use a target’s computer systems, particularly via the Internet, to cause physical real-world harm or sever disruption, usually to carry out a political agenda

202
Q

3 processes of risk management

A

risk analysis, risk mitigation, and controls evaluation.

203
Q

What is the goal of risk management

A

The goal of risk management is to identify, control, and minimize the impact of threats. In other words, risk management seeks to reduce risk to acceptable levels

204
Q

3 steps of risk analysis

A

Risk analysis involves three steps: (1) assessing the value of each asset being protected, (2) estimating the probability that each asset will be compromised, and (3) comparing the prob- able costs of the asset’s being compromised with the costs of protecting that asset. The organi- zation then considers how to mitigate the risk.

205
Q

2 functions of risk mitigation (+ risk. MIT. Definition)

A

In risk mitigation, the organization takes concrete actions against risks. Risk mitigation has two functions: (1) implementing controls to prevent identified threats from occurring, and (2) developing a means of recovery if the threat becomes a reality

206
Q

3 most common risk-mitigation strategies and what they mean

A
  1. Risk acceptance: Accept the potential risk, continue operating with no controls, and absorb any damages that occur.
  2. Risk limitation: Limit the risk by implementing controls that minimize the impact of the threat.
  3. Risk transference: Transfer the risk by using other means to compensate for the loss, such as by purchasing insurance.
207
Q

Controls evaluation

A

in controls evaluation, the organization identifies security deficiencies and calcu- lates the costs of implementing adequate control measures to compare against the value of those control measures. If the costs of implementing a control are greater than the value of the asset being protected, the control is not cost effective.

208
Q

Purpose of controls

A

The purpose of controls or defence mechanisms (also called countermeasures) is to safe- guard assets, optimize the use of the organization’s resources, and prevent or detect errors or fraud.

209
Q

Physical Controls:

A

Physical controls: Stop unauthorized individuals from accessing company
facilities. (doors, locks, badges, guards, alarm systems, pressure sensors, and motion detectors.)

210
Q

General controls and example

A

General controls apply to more than one functional area. For example, passwords are general controls.

211
Q

Application controls

A

Controls specific to one application, such as payroll, are application controls.

212
Q

3 categories of general controls

A

Physical
Access
Communications

213
Q

A guard, or building door, is a

A

Physical control

214
Q

Access controls + 2 types

A

Access controls restrict unauthorized individuals from using information resources. Access controls can be physical controls or logical controls.

215
Q

Logical controls and example

A

Logical controls are implemented by software. For example, access control programs limit users to acceptable login times and acceptable login locations.

216
Q

Name and describe the 2 major functions of access controls

A
  1. Authentication: confirms the identity of the person requiring access. After the person is authenticated (identified), the next step is authorization. 2. Authorization determines which actions, rights, or privileges the person has, based on their verified identity. Good control systems limit authoriza- tion to tasks needed to accomplish a person’s job.
217
Q

Communications controls + examples

A

Communication/network controls: can data securely move across your network?

A system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company’s network.

firewalls, anti-malware systems, whitelisting and blacklisting, encryption, VPNs, transport layer security (TLS), and employee monitoring systems.

218
Q

An ID card system is what type of control

A

Physical and access

219
Q

What is encryption

A

Encryption is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

220
Q

All encryption systems use a …

A

key, which is the code that scrambles and then decodes the messages.

221
Q

Symmetric key algorithms

A

Encryption algorithms which use the same key for both encryption and decryption

222
Q

Asymmetric key algorithms

A

use a pair of keys (keypair) a public key and a private key.
Public keys are used for encryption or signature verification;
Private keys decrypt and sign.

223
Q

Organization firewall system

A

Internet-> external firewall -> servers (demilitarized zone) -> internal firewall -> corporate LAN intranet

224
Q

firewall system for a home computer

A

Internet -> internet service provider -> broadband connection (dsl, cable modem, 4g, 5G) -> home computer (software firewall)

225
Q

In public-key/asymmetric cryptography, it starts with the ____

A

Receiver:

1. 2.
3.
4. 5.
Harrison creates the pair of keys
Harrison sends the public key to Hannah
Hannah uses the Public key to encrypt the message and sends it over
Harrison uses his private key to decrypt the message
It STARTS with the receiver.
226
Q

Digital certificate

A

A digital certificate is an electronic document attached to a file that cer- tifies that the file is from the organization it claims to be from and has not been modified from its original format

227
Q

Role of certificate authority

A

issues digital certificates

verifies the integrity of the certificates.

228
Q

3 types of application controls

A

Input controls: to edit input data for errors]
Processing controls: to monitor operation of an application.
Output controls: to edit output data for errors and that output goes to the intended

229
Q

Business continuity planning or disaster recovery plan

A

The chain of events linking planning to protection to recovery.

230
Q

Business continuity planning or disaster recovery plan objectives

A

To provide guidance to people who keep the business operating after a disaster happen To restore the business to normal operations as quickly as possible after an attack.
To ensure that business functions continue

231
Q

4 strategies in case a major disaster happens:

A

hot sites: a fully-configured computer facility… a duplication of key resources,
warm sites: It includes computing equipment (e.g., servers) but not all actual applications
and user workstations.
cold sites: only rudimentary services and facilities like a building or a room
off-site data and program storage: a duplicate of company data and its software programs
to be transferred to another computer elsewhere

232
Q

What is cloud computing

A

type of computing that delivers convenient, on-demand, pay-as-you-go access for multiple customers to a shared pool of configurable computing resources (e.g., servers, networks, storage, applications, and services) that can be rapidly and easily accessed over the Internet

233
Q

What is on premise computing

A

they own their IT infrastructure (their software, hard- ware, networks, and data management) and maintain it in their data centres.

234
Q

Cons of on premise computing

A

New needs, new investment in new systems.
On-premise computing can actually inhibit an organization’s ability to respond quickly and appropriately to today’s rapidly changing business environments.

235
Q

Organizations infrastructure consists of…

A

IT components and IT services

236
Q

IT Components

A

Hardware software database network

237
Q

IT services

A

developing information systems, managing security and risk, and managing data

238
Q

Stages of evolution of infrastructure (tg 3.1?)

A
239
Q

Cloud computing characteristics

A

Cloud Computing Provides On-Demand Self- Service (access needed computing resources automatically: elasticity and flexibility)
Cloud Computing Encompasses the Characteristics of Grid Computing
Cloud Computing Encompasses the Characteristics of Utility Computing
Cloud Computing Uses Broad Network Access
Cloud Computing Pools Computing Resources
Cloud Computing Often Occurs on Virtualized Servers

240
Q

Grid computing

A

Grid computing pools various hardware and software components to create a single IT envi- ronment with shared resources. Grid computing shares the processing resources of many geo- graphically dispersed computers across a network.

241
Q

Benefits of grid computing

A

Grid computing enables organizations to use their computing resources more efficiently.
Grid computing provides fault tolerance and redundancy, meaning that there is no single point of failure, so the failure of one computer will not stop an application from executing.
Grid computing makes it easy to scale up—that is, to access increased computing resources (i.e., add more servers)—to meet the processing demands of complex applications.
Grid computing makes it easy to scale down (remove computers) if extensive processing is not needed.

242
Q

What is utility computing

A

A service provider makes computing resources and infrastructure management available to a customer as needed.
The provider then charges the customer for its specific usage rather than a flat rate.
Utility computing enables companies to efficiently meet fluctuating demands for computing power by lowering the costs of owning the hardware infrastructure.

243
Q

Server virtualization

A

Server virtualization uses software-based partitions to create multiple virtual servers— called virtual machines—on a single physical server

244
Q

Major benefit of server virtualization

A

each server no longer has to be dedicated to a particular task

245
Q

How does server virtualization increase server usage

A

First, they do not have to buy additional servers to meet peak demand. •Second, they reduce their utility costs because they are using less energy.

246
Q

Cloud types

A

Public
Private
Hybrid

247
Q

Public cloud

A

Public clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and organizations).
Public cloud vendors provide applications, storage, and other computing resources as services over the Internet.
These services may be free or offered on a pay-per-usage model.

248
Q

Private cloud

A

Private clouds/internal clouds/corporate clouds
IT infrastructures that can be accessed only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all of the business units within a single organization.
Private clouds provide IT activities and applications as a service over an intranet within an enterprise.
Enterprises adopt private clouds to ensure system and data security. For this reason, these systems are implemented behind the
corporate firewall.

249
Q

Hybrid clouds

A

Hybrid clouds are composed of public and private clouds that remain unique entities, but are nevertheless tightly integrated.

250
Q

Arrangement of hybrid clouds offers users benefits of

A

Multiple deployment models

251
Q

Hybrid clouds deliver services based on

A

security requirements, the mission-critical nature of the applications, and other company-established policies.

252
Q

Why would a customer choose a hybrid cloud

A

customers may need to maintain some of their data in a private cloud for security and privacy reasons while storing other, less-sensitive data in a public cloud because it is less expensive.

253
Q

Vertical cloud

A

A vertical cloud is a set of cloud computing services optimized for use in a particular industry.

254
Q

3 industries where vertical clouds are used

A

Construction business, •finance, or

•insurance businesses.

255
Q

Cloud computing services are based on three models

A

infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS).

256
Q

Infrastructure as a service

A

Infrastructure to run software and store data

With the IaaS model, cloud computing providers offer remotely accessible servers, networks, and storage capacity.
They supply these resources on demand from their large resource pools, which are located in their data centres.

257
Q

Platform as a service

A

Platforms to develop applications

258
Q

Software as a service

A

Software applications to process their data

259
Q

What type of customers might use infrastructure as a service

A

IaaS customers are often technology companies with IT expertise. These companies want access to computing power, but they do not
want to be responsible for installing or maintaining it.
Companies use the infrastructure to run software or simply to store data. Think Shopify (www.shopify.ca) or Amazon

260
Q

Platform as a service allows customer to both

A

run existing applications and to develop and test new applications.

261
Q

Advantages of platform as a service

A

Underlying computing and storage resources automatically scale to match application demand.
Operating system features can be upgraded frequently.
Geographically distributed development teams can work together on software development projects.
PaaS services can be provided by diverse sources located throughout the world.
Initial and ongoing costs can be reduced by the use of infrastructure services from a single vendor rather than maintaining multiple hardware facilities that often perform duplicate functions or suffer from incompatibility problems.

262
Q

Software as a service is the most _______ ______ service model and provides a ______ ______ of software applications

A

Widely used, broad range

263
Q

Software applications reside in __________

A

The cloud

264
Q

Software as a service is highly scalable. This means:

A

applications can run on as many servers as is necessary to meet changing demands.

265
Q

Benefits of cloud computing

A

Cloud computing has a positive impact on employees
Cloud computing can save money
Cloud computing can improve organizational flexibility and competitiveness

266
Q

Concerns and risks with cloud computing

A

Legacy IT Systems: These systems cannot easily be transferred to the cloud because they must first be untangled and simplified.
Reliability
Privacy
Security
The Regulatory and Legal Environment
European Union prohibits consumer data from being transferred to nonmember countries without the consumers’ prior consent and approval.
Criminal Use of Cloud Computing
The huge amount of information stored in the cloud makes it an attractive target for data thieves. Also, the distributed nature of cloud computing makes it very difficult to catch criminals.

267
Q

Web services

A

Web services are applications delivered over the Internet (the cloud) that MIS profession- als can select and combine through almost any device, from personal computers to mobile phones

268
Q

Web service applications allow

A

different systems to “talk” with one another

share data and services

269
Q

The collection of web services that are used to build a firm’s IT
applications constitutes a

A

service-oriented architecture (SOA).

270
Q

Benefits of web services

A
  • The organization can use the existing Internet infrastructure without having to implement any new technologies.
  • Organizational personnel can access remote or local data without having to understand the complexities of this process.
  • The organization can create new applications quickly and easily.
271
Q

Where can web services be employed

A

They can be employed in a variety of environments: over the Internet, on an intranet inside a corporate firewall, or on an extranet set up by business partners.

272
Q

Name the 4 key protocols that web services are based on

A

XML, SOAP, WSDL, and UDDI

273
Q

XML definition and what does it stand for

A

Extensible markup language (XML): a computer language that makes it easier to exchange data among a variety of applications and to validate and interpret these data.

Where HTML is limited to describing how data should be presented in the form of web pages, XML can present, communicate, and store data

274
Q

HTML

A

HTML is a page-descrip- tion language for specifying how text, graphics, video, and sound are placed on a web page document.

275
Q

What does HTML stand for

A

Hypertext markup language

276
Q

Jane Smith Bell Canada (416) 614-4664 is an example of

A

XML

277
Q

what does SOAP stand for and what does it mean

A

Simple object access protocol (SOAP) is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML. These rules essentially establish a common protocol that allows different web services to interoperate

278
Q

Wdsl what does it mean/stand for

A

The web services description language (WSDL) is used to create the XML document that describes the tasks performed by the various web services.

279
Q

UDDI meaning and what it stands for

A

Universal description, discovery, and integration (UDDI) allows MIS professionals to search for needed web services by creating public or private searchable directories of these services.

280
Q

HTML5

A

A page-description language that makes it possible to embed images, audio, and video directly into a document without add-ons. Also makes it easier for web pages to function across different display devices, including mobile devices as well as desktops. It supports the storage of data offline.

281
Q

Server farms

A

Massive data centres, which may contain hundreds of thousands of networked computer servers.

282
Q

Goal of AI

A

Build machines that mimic human intelligence

283
Q

Turing test

A

Man and computer both pretend to be human and interviewer has to find real one

284
Q

Strong AI

A

Hypothetical AI that matches or exceed human intelligence

285
Q

Preservation of knowledge, NI vs AI

A

NI: Perishable from an organizational point of view
AI: Permanent

286
Q

NI vs AI: Duplication and dissemination of knowledge in a computer

A

NI: Difficult, expensive, takes time
AI: Easy, fast, and inexpensive

287
Q

NI vs AI: Total cost of knowledge

A

NI: Can be erratic and inconsistent, incomplete at times
AI: Consistent and thorough

288
Q

NI vs AI: Documentation of process and knowledge

A

NI: Difficult, expensive
AI: Fairly easy, inexpensive

289
Q

NI vs AI: Creatibity

A

NI: Can be very high
AI: low, uninspired

290
Q

NI vs AI: Use of sensory experiences

A

NI: Direct and rich in possibilities
AI: Must be interpreted first; limited

291
Q

NI vs. AI: Recognizing patterns and relationships

A

NI: Fast, easy to explain
AI: Machine learning still not as good as people in most cases, but in some cases better than people

292
Q

NI vs. AI: reasoning

A

NI: Makes use of wide context of experiences
AI: Good only in narrow, focused, and stable domains

293
Q

Weak AI + examples

A

performs a useful and specific function that once required human intelligence to perform, and does so at human levels or better (for example, character recognition, speech recognition, machine vision, robotics, data mining, medical informatics, automated investing, and many other functions).

294
Q

4 technological advancements that have led to advancements in AI

A
  • Advancements in chip technology
  • Big data
  • The internet and cloud computing
  • Improved algorithms
295
Q

First stage of AI applications

A

Recommendation systems, i.e. next up on youtube

296
Q

Second stage AI applications

A

Analyze data that traditional companies have collected and labeled in the past

297
Q

Third stage applications

A

Analyze additional data from smart devices and sensors

298
Q

Fourth stage AI applications

A

Integrate 1-3 and enable machines to sense and respond to the world around them i.e. autonomous cars

299
Q

Expert systems

A

Expert systems (ESs) are computer systems that attempt to mimic human experts by apply- ing expertise in a specific domain. Expert systems can either support decision makers or com- pletely replace them.

300
Q

Problems of expert systems (3)

A
  • transferring domain expertise from human experts to expert system can be hard because humans can’t always explain how they know/what they know (not always aware of complete reasoning process)
  • even if domain experts can explain the reasoning process, automating it may not be possible (difficult to program all the possible decision paths in an expert system)
  • in some contexts, potential liability from use of expert systems, i.e. medical treatment
301
Q

Machine Learning

A

machine learning (ML) is the ability to accurately perform new, unseen tasks, built on known properties learned from training or historical data that are labelled.

302
Q

In banking, automated fraud detection systems use _________ ________ to identify behaviour patterns that could indicate fraudulent payment activity.

A

Machine Learning

303
Q

Deep learning

A

Deep learning is a subset of machine learning in which the system discovers new patterns without being exposed to labelled historical or training data

304
Q

Example applications of deep learning include

A

speech recognition, image recognition, natural language processing, drug discovery and toxicology, and customer relationship management.

305
Q

Neural Network

A

A neural network is a set of virtual neurons or central processing units (CPUs) that work in par- allel in an attempt to simulate the way the human brain works, although in a greatly simplified form. The neural network assigns numerical values, or weights, to connections between the neurons.

306
Q

6 steps of neural network image processing

A
  1. Each layer of the neural network manages a different level of abstraction.
  2. To process an image, the first layer is fed with raw images.
  3. That layer notes aspects of the images such as the brightness and colors of individual pixels, and how those properties are distributed across the image.
  4. The next layer analyzes the first layer’s observations into more abstract categories, such as identifying edges, shadows, and so on.
  5. The next layer analyzes those edges and shadows, looking for combinations that signify features such as eyes, lips, and ears.
  6. The final layer combines these observations into a representation of a face
307
Q

Deep neural network

A

DL automates much of the feature extraction piece of the process.
Eliminates some of the manual human intervention.
Enables the use of large data sets

308
Q

4 main components of neural network

A

Inputs, weights, bias/threshold, output

309
Q

Layers of processing sound in neural network

A
  1. the first layer of processors learns the smallest unit of speech sound, called a phoneme.
  2. The next layer finds combinations of sound waves that occur more often than they would by chance alone.
  3. The next layer looks for combinations of speech sounds such as words,
  4. and the final layer can recognize complete segments of speech.
310
Q

Computer vision

A

Computer vision refers to the ability of information systems to identify objects, scenes, and activities in images. Computer vision applications are designed to operate in unconstrained environments.

311
Q

Natural language processing

A

Natural language processing refers to the ability of information systems to work with text the way that humans do. For example, these systems can extract the meaning from text and can generate text that is readable, stylistically natural, and grammatically correct.

312
Q

Speech recognition

A

Speech recognition focuses on automatically and accurately transcribing human speech. This technology must manage diverse accents, dialects, and background noise.

313
Q

Intelligent agent + 3 types

A

An intelligent agent is a software program that assists you, or acts on your behalf, in per- forming repetitive computer-related tasks.

three types of agents: information agents, monitoring and surveillance agents, and user or personal agents.

314
Q

Information agents + ex

A

Information agents search for information and display it to users. The best-known information agents are buyer agents. A buyer agent, also called a shop- ping bot, helps customers find the products and services they need on a website
I.e. • The information agents for Amazon.com display lists of books and other products that customers might like, based on past purchases.

315
Q

Monitoring and surveillance agents + example

A

Monitoring and surveillance agents, also called predictive agents, constantly observe and report on some item of interest.
I.e. • Monitoring and surveillance agents can watch your competitors and notify you of price changes and special offers

316
Q

User agents + example

A

User agents, also called personal agents, take action on your behalf.
I.e. • Check your email, sort it according to your priority rules, and alert you when high-value emails appear in your inbox.

317
Q

Ethics

A

Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behaviour

318
Q

5 widely used ethical frameworks

A
Utilitarian
Rights
Fairness
Common good
Deontology
319
Q

Utilitarian approach

A

an ethical action is the one that provides the most good or does the least harm

320
Q

Rights approach

A

an ethical action is the one that best protects and respects the moral rights of
the affected parties. (who has what right? Can we list them all and agree upon them?)

321
Q

Fairness approach

A

ethical actions treat all humans equally, or if unequally, then fairly, based on
some defensible standard (all humans are equal)

322
Q

common good approach

A

respect and compassion for all others is the basis for ethical actions. (welfare for everyone, free education for all)

323
Q

Deontology approach

A

morality of an action is based on whether that action itself is right or wrong under a series of rules - not based on consequences of the action (forget about self-defense)

324
Q

3 fundamental tenets of ethics

A
  • Responsibility means that you accept the consequences of your decisions and actions.
  • Accountability refers to determining who is responsible for actions that were taken.
  • Liability is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems
325
Q

4 steps of traditional approach + a question in each one

A
  1. Recognize an ethical issue
    • Could this decision or situation damage someone or some group?
    • Does this decision involve a choice between a good and a bad alternative?
    • Is this issue about more than what is legal? If so, how?
  2. Get the facts
    • What are the relevant facts of the situation?
    • Do I know enough to make a decision?
    • Which individuals and/or groups have an important stake in the outcome?
    • Have I consulted all relevant persons and groups?
  3. Evaluate alternative actions
    • Which option will produce the most good and do the least harm? (the utilitarian approach)
    • Which option best respects the rights of all stakeholders? (the rights approach)
    • Which option treats people equally or proportionately? (the fairness approach)
    • Which option best serves the community as a whole, and not just some members? (the common good approach)
  4. Make a decision and test it
    • Considering all the approaches, which option best addresses the situation?
    • Act and reflect on the outcome of your decision
    • How can I implement my decision with the greatest care and attention to the concerns of all stakeholders?
    • How did my decision turn out, and what did I learn from this specific situation?
326
Q

Giving Voice to Values Approach steps and questions

A
  1. Identify an ethical issue
    • What are the different issues that give rise to this ethical issue?
    • What are the values of the individuals or organizations underlying this ethical issue?
    • Is there a possibility of action to resolve the ethical issue?
  2. Purpose and choice
    • What personal choices do you have in reacting to this ethical issue?
    • What is your most appropriate professional choice, being guided by professional rules, and what would be a “good” choice?
  3. Stakeholder analysis
    • Who is affected by the ethical issue?
    • How are they affected, considering if I do give voice to resolving the issue?
    • How are they affected, considering if I do not give voice to resolving the issue?
    • How can I connect with the stakeholders to best deal with the ethical issue?
  4. Powerful response
    • Who is my audience?
    • What types of things could I say to provide a response to the ethical issue?
    • What are some inhibiting arguments that would prevent me from acting?
    • What could I say in response to the inhibiting arguments (called an enabling argument)?
    • What external arguments (called levers) support my enabling arguments?
    • What external research supports or refutes my arguments?
  5. Scripting and coaching
    • What words (script) could I use when talking about the ethical issue? (consider both positive and negative responses)
    • Who can I practise with?
    • How would I approach my audience to provide the best opportunity for discussing the ethical issue?
327
Q

The diversity and ever-expanding use of IT applications have created a variety of ethical issues. These issues fall into four general categories:

A

Privacy issues involve collecting, storing, and disseminating information about individuals.
2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is col-
lected and processed.
3. Property issues involve the ownership and value of information.
4. Accessibility issues revolve around who should have access to information and whether they should pay a fee for this access.

328
Q

Privacy issues questions

A

What information about oneself should an individual be required to reveal to others?
What kinds of surveillance can an employer use on its employees?
What types of personal information can people keep to themselves and not be forced to reveal to others?
What information about individuals should be kept in databases, and how secure is the information there?

329
Q

Accuracy issues questions

A

Who is responsible for the authenticity, integrity, and accuracy of the information collected?
How can we ensure that the information will be processed properly and presented accurately to users?
How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
Who is to be held accountable for errors in information, and how should the injured parties be com- pensated?

330
Q

Property issues questions

A

Who owns the information?
What are the just and fair prices for its exchange?
How should we handle software piracy (illegally copying copyrighted software)?
Under what circumstances can one use proprietary databases?
Can corporate computers be used for private purposes?
How should experts who contribute their knowledge to create expert systems be compensated? How should access to information channels be allocated?

331
Q

Accessibility issues questions

A

Who is allowed to access information?
How much should companies charge for permitting access to information? How can access to computers be provided for employees with disabilities? Who will be provided with the equipment needed for accessing information?
What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

332
Q

Privacy

A

privacy is the right to be left alone and to be free of unreasonable personal intru- sions

333
Q

Information privacy

A

Information privacy is the right to determine when, and to what extent, information about you can be gathered or communicated to others.

334
Q

Code of ethics

A

a collection of principles that are intended to guide decision making by members of an organization.

335
Q

Who can privacy rights apply to

A

individuals, groups, and institutions.

336
Q

Court decisions have followed 2 rules for defining privacy:

A

Right of privacy is not absolute. Your privacy must be balanced against the needs of society.
Public’s right to know supersedes the individual’s right of privacy.

337
Q

Digital dossier

A

an electronic profile of you and your habits.

338
Q

Profiling

A

The process of forming a digital dossier

339
Q

Electronic surveillance

A

Using technology to monitor individuals as they go about their daily routines

340
Q

Data aggregation

A

Process of gathering data and presenting it in a h

summarized format.

341
Q

Personal information is being kept in

A

Databases

342
Q

Privacy policies/privacy codes

A

Privacy policies or privacy codes are an organization’s guidelines for protecting the privacy of its customers, clients, and employees.

343
Q

Opt-out model

A

The opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

344
Q

Opt-in model

A

Privacy advocates prefer the opt-in model of informed consent, which prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

345
Q

What do data aggregators do

A

Data Aggregators collect public and non-public data (e.g. social insurance numbers and financial data) then integrate these data to form digital dossiers on most adults in North America.

346
Q

3 privacy policy guidelines

A

Data collection
Data accuracy
Data confidentiality

347
Q

Privacy policy guidelines help to

A

Codify requirements for employees
Provide a standard set of procedures
Protect organizations from litigation
Can be used as a measurement tool if disciplinary action is required