Thursday, December 8, 2016

CH.10


*Threat- a person or organization that seeks to obtain or alter data.

*Vulnerability- An opportunity for threats.

*safeguard- Measures some organizations take to block the threat from obtaining the asset.

*target- the asset that is desired by the threat.

Human error- mistakes.

*pretexting- someone deceives by pretending to be someone else.

*Phishing- A similar technique for obtaining unauthorized data that uses pretexting via email.

*Phisher- Pretends to be a legitimate company and sends out email requesting confidential data.

*Spoofing- Another term for a person pretending be someone else.

*Sniffing


Ch.9

*Business intelligence systems- Information systems that process operational, social and other data
identify patterns, relationships, and trends for use by business professionals and other knowledge.

*Patterns, relationships, and trends are known as business intelligence.

*decision support systems- Decision making BI systems.

*Data acquisition- The process of obtaining, cleaning, organizing and relating data.

*BI- Data Analysis- the process of creating business intelligence.

*Publish results- the process of delivering business intelligence to knowledge workers who need it.

*Push Publishing- Delivers business intelligence to users without any requests from the users.

*data warehouse-

-obtain data

-cleanse data

-organize and relate data

-catalog data

*granularity- a term that refers to the level of detail represented by the data.

*data mart- A data collection smaller than a data warehouse.

*reporting application-

-sorting

-filtering

-grouping

-calculating

-formatting

*Online Analytical Processing- Proves the ability to sum, count, average and perform other arithmetic operations on groups of data.

*measure- The data item of interest.

*dimension- A characteristic of a measure.


ch 8.

social media providers- Facebook, google, linked in, twitter.

social networks-  Social relationships among people with common interests.

viral hook-some inducement (A prize or reward).

Content Data- Data and responses to data that are contributed by users.

Connection data- A data about relationships.

Social CRM- A dynamic  SM-based CRM process.

Crowd sourcing- the dynamic social media process of employing users to participate in product design or product redesign.

business to business consumer (B2C)- Relationships to market products with end users.

(B2B) business to business- Leads to retailers.

Capital- the investment of resources for future product.

Human capital- the investment in juan knowledge and skills for future profit.

social capital- The investment in social relations with execration of returns in the marketplace.

value of social capital- determined by the number of relationships in a social network.

influencer- your opinion may for a change in another's behavior and beliefs.




Sunday, November 6, 2016

Ch 7.

*Structured Processes- Formally defined, standardized processes that involve day to day operations: accept a return, placing an order, purchasing, and so forth.

*Dynamic processes- Flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities.

*Workgroup process- Exists to enable workgroups to fulfill the charter, purpose, and goals of a particular group or department.

*Workgroup information- Exists to support one or more processes within the workgroup.

*Functional information Systems- Workgroup information systems.

*Functional Application- The program -Component of a functional information system.

*Enterprise processes- Span and organization and support activities in multiple departments.

*Enterprise information systems- Support one or more enterprise processes.

*Inter-enterprise processes- Span two or more interdependent organizations.

*Inter-enterprise information- Support one or more inter-enterprise processes.

*Process efficiency- A measure of the ratio process outputs and inputs.

*Process effectiveness- A measure of how well a process achieves organizational strategy.

*information silo- The condition that exists when data are isolated in separated information systems.

*data integrity- When an organization has inconsistent duplicated data.

*Business process reengineering- The activity of altering existing and designing new information systems.

*Inherent processes- predesigned procedures for using software products, saved organizations from the expanse delays, and risks of business process reengineering.

*Customer relationship management (CRM) system- A suite of applications, a database, and a set of inherent processes for magaging all the interactions with the customer, from lead generation to  customer service.

*Customer life cycle- Marketing customer acquisition, relationship management, and loss/churn.

*Enterprise resource planning (ERP)- A suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.

*ERP system- An information system based EPR technology.

Saturday, November 5, 2016

Ch. 6

"The Cloud"

*Cloud- The elastic leasing of pooled computer computer resources on the computer.

*elastic- Means the computing resources released can increased or decreased dramatically, programmatically, in a short span of time and that organizations just pay the resources they use.

*pooled- Cloud resources are pooled because many different organizations use the same physical hardware.

With "the cloud" resources are accessed over the internet.

-preferred in house hosting.

-Does not make sense for those required by law or industry standard practice to have physical control over their data.

*network- A collection of computers that network with one another over transmission wires or wirelessly.

*Personal network area- connects devices located around a single person.

*Local area network- Connects computers that reside in a single geographic location on the premises of the company that operates the LAN.

*Wide area network- Connects computers at different geographic locations.

*Internet- Network of networks.

*Intranet- A private internet used exclusivley within an organization.

*Protocol- A set of rules and data structures for organizing communication.

 *Bluetooth- Another common wireless protocol used to make PAN connections.

*(ISP) Internet service provider- When you are connecting to the internet you are actually connecting to this.

*(DSL) Digital subscriber line- Operates on the same lines as voice telephones, but it operates so it does not interfere with voice telephone service.

*Cable Lines- Provide high speed data transmission using cable television lines.

*WAN wireless- A third way you can connect your computer, mobile device, or other communicating device.

*Hop- The movement from one network to another.

*Packet- message.

* Carriers- As your message Moves across the internet it passes through (networks owned by large telecommunication) known as carriers.

*Net neutrality principle- Where all data is treated equally.

*IP address- An internet address.

*Public IP adresses- Identify a particular device on the public internet.

*ICANN- Internet Corporation for assigned names and numbers.

*Private IP address- Identify a particular device on a private network, usually on the LAN.

-IP addresses have two common formats

the most common IPv4.  The second is called IPv6.

*Domain name- A worldwide unique name that is affiliated with a public IP address.

*URL( Uniform resource locator)- An address on the internet.

*Three -tier architecture- A design of user computers and servers that consist of three categories, or tiers.

*The server tier consists of of severs that run web servers and process application programs.

*database tiers -Consists of computers that run a DBMS that processes requests to retrieve data.

*Web page- A document coded in, usually html.

*WEb servers- programs that run on server tier computer and manage traffic by sending and recieving Web pages to and from clients.

*commerce server- An application program.

*(SOA) Service oriented architecture- According to this philosophy, all interactions among computing devices are defined as services in a formal, standardized way.

*encapsulated- No department has or need any knowledge of who works in another department nor how it will be processed.

*TCP/IP protocol architecture-

-this protocol has five layers

Data communications and software vendors write computer programs that implement the rules of a particular protocol.

* Hypertext transfer protocol (http)- protocol used between browsers and web servers.

*https- (you have a secure transmission)

*Simple mail transfer protocol (SMTP)- used for email transmissions

* FTP (Fire transfer protocol)- Is used to move files over the internet.

*WDSL- a standard for describing the services, inputs and outputs and other data supporting a Web service.

*SOAP- A protocol for requesting web services and for sending web response to Web service requests.

*XML- A markup language used for transmitting documents. (Contains much meta data)

*JSON- A markup language used for transmitting data (Contains little meta data)

*Saas (Software as a service)- provides not only hardware infrastructure, but an operating system and application programs as well.

*Paas (Platform as a service)- Whereby vendors provide hosted computers, an operating system, and possibly a DBMS.

*infrustructure as a service (Iaas)- The cloud of hosting a bare server computer data storage.

*Content Delivery Network- A system of hardware and software that stores user data in many different geographical locations and makes those data available on demand.

*Virtual Private Network (VPN) Uses the internet to create the appearance of private, secure connections.

*Tunnel- A virtual, private pathway over a public or shared network from the VPN server in Chicago.

*Private Cloud- A cloud owned and operated by an organization for its own benefit.

*Virtual Private Cloud (VPC)- A subset of a public cloud that has highly restricted, secure access.









Wednesday, October 19, 2016

Ch. 5



*database- A self describing collection of integrated records.

*columns- Bytes are grouped (student name and student and student name)

*byte- A character of data.

*Rows- Columns or fields are grouped into this.

*Table or file- A group of similar groups or records.

*key or primary key- Column or group of columns that identifies a unique row in a table.

*Foreign keys- Keys of a different foreign table than the one in which they reside.

*relational databases- Data bases that carry their data in the form of tables that represent relationships using foreign keys.

*Metadata- Data that describes date.

*Database management system (DBMS)- A program used to create, process, and administer a database. (SQL Server Microsoft)  -license free

*Database administration- can be used to set up a security system involving use accounts, passwords, permissions, and limits for processing the database.

*Database application- A collection of forms, reports, queries, and application programs that serves as an intermediary between users and database data.

*Queries- Search based on values provided by the user.

*Reports- Structured representation of data using sorting, grouping, filtering, and other operations.

*Forums- View data; insert new, update existing, and delete existing data.

*Applications Programs- Provide security, data consistency, and special purpose processing. (Handle out of stock situations)

*graphical queries- Created when the user clicks on a graphic.

Multi-user processing- (Buying concert tix at the same time as multiples)
*Lost update problem- (someone buys your concert tix at the same time and gets them)



*Entity-relationship (E-R data model)- Atool for constructing data models.

*MongoDB- Open source docu. to store video footage.


*ACID- (atomic, consistent, isolated, durable) transactions.

*Normal forms- to remove duplicative data.

*data integrity problem- “accounting and finance” - “Accounting” 

1:N one-to-many

N:M Many-to-many

*Crows feet- angled lines.


Thursday, October 6, 2016

Chapter 4

*Computer hardware consist of electronic components and related  gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software. 

* Central processing unit (CPU)- Sometimes called "The brain of the computer". 

-The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. 

- A computer with two CPUs is called a *dual-processor computer.

*Quad processor computers have four CPUs.

*Main memory- The CPU reads data and instructions from memory and then stores the results of computations in main memory.

- Main memory is sometimes called RAM for random access memory.

*Storage hardware- All computers have storage hardware and it's used to save data and programs. 

*Personal computers- Classic computing devices that are used by individuals.

*Tablets- Ipads.

*Server- A computer that is designed to support processing requests from many remote computers and users.

*Clients- In computing environments servers can send Web pages, email, files or data to PCs.  PCs, tablets, and smart phones that access servers are called clients.

*Server farm- A collection of, typically, thousands of servers.

- Computers represent binary digits, called bits. 

*Bit- A bit is either a zero or a one.

*Self driving car- Also known as a driverless car.

-Self driving cars make things cheaper.
-Self driving cars make things safer
-Self driving cars will disrupt businesses 

*3-D printing- Can print out metal or plastic objects.

*Operating  system- A program that controls the computer's resources.

*Native applications- Programs that are written to use a  particular operating system. (Sometimes called thick-client applications)

*Web application- (Thin-client app.) Designed to run within a computer browser such as firefox, Chome, Opera, or Edge (Formerly internet explorer).

*Microsoft windows- The most popular operating system.

*Application software- Performs a service or function. (Excel or Word)

*site license- A flat fee that authorizes the company to install the product.

*Horizontal-market application- Software provides capabilities common across all organizations and industries.

*Vertical market application- Software serves the needs of a specific industry.

*One- of a Kind application- Software is developed for a specific and unique need.

* Firmware- Is installed into devices such as printers, print servers, and various types or communication devices.

*Host operating system- Runs one or more operating systems as applications.

*Virtual Machines- Those hosted operating systems are virtual machines.

*PC virtualization- A personal computer, such as a desktop or laptop, hosts several different operating systems. 

*Server virtualization- A server computer hosts one or more other server computers.