• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/120

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

120 Cards in this Set

  • Front
  • Back
What is required for "good decision-making"
1. Good Info
2. Skills
3. Tools
What is a decision
A choice among alternatives
Decision making requires ___________ Reasoning Skills
Analytical
What are Structured or Programmed Decisions
Decisions that are routine and repetitive, and often have a well-defined procedure
Semi-structured Decisions
Decisions that have some elements that are structured and other elements that are unstructured

Ex. Planning annual compensation for employees in a large company
What is an Unstructured or Non-Programmed Decision
Decisions that are novel, that do not have a pre-existing procedure

Ex. Decision to introduce a new smartwatch by an electronics company
What type of decision are algorithmic trading systems used in investing?
Automated Decision Making
Should the Kill Decision Be Automated?
TED Talk by Daniel Suarez say NO it should not be made by Robot
Strategic Planning includes:
1) Choosing the Organizations Objectives
2) Deciding how to achieve objectives
3) Predicting the future
Managerial Control Includes:
1) Ensuring Efficient, effective use of resources
2) Detailed plan and enactment of achieving objectives
3) Continual Oversight
Operational Control Includes:
1) Ensuring Efficient,Effective conducting of tasks
2) Ensuring processes well-maintained and tight
Phases of Decision Making Process
1) Intelligence
2) Design
3) Choice
What happens in the intelligence phase?
A. Identify and clearly define the problem
B. Determine requirements and goals (target output)
What happens in the DESIGN PHASE?
A. Identify Alternatives (Input Values)
B. Define Criteria (Comparing Alternatives)
C. Select a Decision-making technique/tool
What happens in the CHOICE PHASE?
A. Evaluate Alternatives using criteria
B. Check if solution solves problem
What is Lethal Autonomy?
The act of a robot committing death attempts on its own
Lethal Autonomy left unregulated could lead to what?
Plausible Deniability and rogue attacks
What are some Decision Making Techniques?
1) Pro/Con Analysis
2) Paired Comparisons
3) Decision Matrix
Explain PRO/CON ANALYSIS
Non-Mathematical technique where you simply list advantages and disadvantages
Explain PAIRED COMPARISONS
Compare Pairs of alternatives to find "winning alternative"
Single - Only one moves forward
Comparison - One with most wins after all combos
Explain a Decision Matrix
Compare alternatives against all criteria by adding a score 1-10 for each criteria - Highest total wins
What are Document Management Systems
They Provide functions to locate and retrieve documents
Spreadsheets are popular ________
Data Support Systems
What is sensitivity analysis?
Changing one or more input variables to see impact on one or more of output variables
Types of "What If" Analysis
1) Scenario Manager
2) Data Table
Goal Seek takes a _____________ value and finds the needed ______ value
target output;input
Data Validation
Is used to prevent users from entering input data on a worksheet that does not meet conditions
Data validation is important in maintaining ________ in a worksheet
quality data
What does the PMT Excel Function do?
Outputs the payment for each period based on inputs
What inputs affect PMT?
(Rate);(Nper)# Periods; (PV) Present value
What is a Data Table?
allows you to compute the result of a formula for various values of an input
What does VBA Stand for?
Visual Basic for Applications
What are computer Communications?
A process in which two or more computers transfer data, instructions, or information
What is a network?
A collection of computers and devices connected together via communication devices
What is a computer network?
A collection of interconnected computing devices that can communicate amongst themselves.
What is LAN?
Local Access Network
What is WAN?
Wide Area Network
What is GAN?
Global Area Network
Define Network Architecture
The design of computers,devices, and media on a network.
What is P2P
Person to Person - Users access eachothers hard disks and exchange files directly over the internet
What is a network Topology?
The layout of the computers and devices in a communications network
History of Network Architecture
1) Star Network Topology
2) Ring Network Topology
3) Bus Network Topology
What are protocols?
Rules/Standards/Procedures that computers must follow when sending or receiving data
What is Ethernet?
A network standard that specifies no computer controls when data can be transmitted
What is a Token Ring standard?
Specifies that computers and devices on the network share or pass a special signal or token
TCP/IP Standard
Network standard that defines how messages are routed from one end of a network to another
WI-FI identifies any network based on what standard?
802.11
What is Bluetooth?
Defines how two devices use short-range radio waves to transmit data
What is UWB (Ultra-WIdeband)
Specifies how two UWB devices use short-range radio waves to communicate at high speeds
IrDA
Transmits Data WIrelessly via infrared (IR) Light Waves
RFID
Uses Radio signals to communicate with a tag placed in or attached to an object, animal, or person
What is WiMAX(802.16)?
-Towers can cover 30-Mile Radius
-Provides Wireless Broadband Internet Access
What does WAP stand for?
Wireless Application Protocol
-Specifies how some mobile devices can display the content of Internet Services
Communication software consists of programs that:
1) Help users establish a connection to another computer or network
2) Manage the Transmission of data, instructions, and information
3) Provides an interface for users to communicate with one another
4) Implements protocols at all levels, meaning firmware, on devices
What is a communications device?
is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device
Common Connectivity Devices
 Network Interface Cards (NICs)
 Repeaters
 Routers
 Hubs
 Bridges
 Switches
Connectivity Hardware
Hardware that allows computers to be "physically connected" to networks
MAC
Media Access Control
NIC
Network Interface Card - Allows computer to connect to network and has unique serial number
Function of a repeater
A network device used to regenerate or replicate a signal as it weakens when traveling across a network
What does a router do?
An intelligent device used to connect two or more individual networks. It can appropriately route messages coming from one network to another.
What is the purpose of a routing table?
A table used to choose the "best" known path or hop to send packets
What is a tracert/traceroute
A command tool available in Windows and Mac OS used to trace the path to the destination - Need Command Prompt or Terminal
Give an example of a domain name
ex. www.uiowa.edu
Give an example of a suffix
.edu
.org
.net
Domain Name Systems (DNS)
Maps domain names to IP Addresses
How do you find the IP address for a given domain
Using "ns lookup"
What makes the "Web" possible?
-HTTP
-HTML
-Browsers
-Internet
What is HTTP?
Hypertext Transfer Protocol
What is HTML?
Hypertext Markup Language - Language used to create webpages
What is URL?
Uniform Resource Locator
http://www.microsoft.com/security/default.html

Find: Protocol, Directory, File, Domain/Host
Protocol: http://
Domain/Host: www.microsoft.com
Directory: /security
file:/default.html
Static Web Pages
Are delivered to the client exactly as stored on the server. Hence all users (clients) will see exactly the same page when they request using a given URL.
Dynamic Web Pages
Are generated by web applications (programs) running on the server. Hence each user (client) may see a different page based on her context/inputs
when she requests using a given URL.
What does SOA stand for?
Service Oriented Architecture - A set of design principles of how to take data from heterogeneous systems and create reusable services.
-Enables different devices to connect to network
What is Middleware?
software that can understand each technology’s
specific formats and communication protocols, and can then translate them into another platforms formats and protocols, enabling interoperability
What is Software as a Service (SaaS)?
A ‘software rental’ model architecture
 It is implemented like a subscription, think of Office 365, where you always get updates
Describe Cloud Computing?
An architectural approach to computing where an organization rents computing resources from providers, instead of having their own locally managed hardware and software
What are the advantages of cloud computing?
Enables ease of scalability, lower costs because not so many IT staff, migration costs to stay current, backup costs
What is virtualization?
allows one physical device, such as a server or
computer, to operate as if it is several machines ``
Web 2.0
Users drive Content
Ex. Twitter/Blogs/Facebook
Web 3.0
When computers start to understand the meaning,
called semantics, of what is there; understanding the
information and data to better make it useable
-Semantic Web - Everything Linked
Three Main Categories of Threats
-Denial/disruption of service
- Unauthorized Access
- Theft and Fraud
Information Security (IS)
a broad concept that involves dealing
with any threat to computerized systems, such as viruses,
hackers, accidental loss of data or systems, natural disasters
What 2 things does IS require?
technology + management
Worm
is an independent program which replicates itself and sends
copies from computer to computer across network connections.
Upon arrival the worm may be activated to replicate.
Trojan Horse
Masquerades as beneficial program
while quietly destroying data or damaging your
system.
Logic Bomb
Malware logic executes upon certain conditions
ex. Employee triggers database erase when he is fired
Social Engineering
manipulates people into performing actions or divulging confidential information
Phishing
a ‘trustworthy entity’
asks via e-mail for
sensitive information
such as SSN, credit
card numbers, login
IDs or passwords.
Botnet
a large number of compromised computers that are
used to create and send spam or viruses or flood a network with
messages as a denial of service attack
Repdudiation
is an illicit attempt to deny sending or
receiving a transaction.
Non-Repudiation
is the ability to prove that a transaction
has, in fact, occurred.
ex. encryption, signatures
Preventive controls
stop or limit the security threat from
happening in the first place (anti-virus scans)
Corrective controls
repair damages after a security problem
has occurred (anti-virus quarantine
Detective controls
find or discover where and when security
threats occurred (audit logs)
Layered security
approach has the advantage of creating
a barrier of multiple defenses that can be coordinated to thwart a variety of attacks
 Obscurity strategy
means what goes on inside a system or
organization should be hidden
Authentication credentials can include:
A user name and password
 Tokens, such as those created by token cards
 Digital certificates
Authentication logon process
1. Identification – credentials presented
2. Authentication – checks to see if present in authentication DB
3. Authorization – allowed to log onto computer
4. Access – granted access to resources according to permissions
assigned
Authentication Methods:
1) What you know
2) What you have
3) Who You are
4) Where you are
What are Tokens?
 Item presented during authentication process
 Often a challenge phrase presented
SSL/TLS or Secure Socket Layer/Transport Layer
Security
are protocols that allows for secure communication
between two computers (e.g., between a browser and a web server)
What is FIPP
Fair Information Practices
Principles

 FIPP are guidelines that represent widely accepted concepts
concerning fair information practice in an electronic marketplace
 The FIPP principles provide guidance for how to deal specifically with
personal information
PATRIOT ACT
is an Act of Congress that was signed into
law by President George W. Bush on October 26, 2001.
FERPA
permits a school to disclose personally identifiable information
from education records of an "eligible student" (a student age 18 or
older or enrolled in a postsecondary institution at any age) to his or her
parents, if student is a dependent
Cookies
A text data passed to a browser from a Web server.
Then the text data is sent back to the Web server with every
subsequent request to the Web server. Used by Web applications
to store state and user information
system
a set of
components that
interact to achieve
a common goal
Information System (IS)
a
collection of
hardware, software,
data, people, and
procedures that
work together to
produce quality
information
SDLC
Systems Development Life Cycle
Systems Analyst
is the
Liaison between users and
IT professionals
Project Phases
1) Planning
2)Analysis/Requirements
3) Design/Development
4) Implementation/Maintenance
RFSS
Request for System Services
Analysis Phase
a) Conduct preliminary Investigation
b) Perform Detailed Analysis
Process modeling
an
analysis and design technique that describes
processes that transform inputs into outputs
entity-relationship
diagram (ERD)
a tool
that graphically shows
the connections among
entities in a system
Design/Development Phase
A) Acquire Hardware/Software
B) Develop Details
Implementation Phase
Perform Tests on Product
Training
Maintenance and Security Phase
to
provide ongoing assistance for an information system and its
users after the system is implemented
Reengineering
g is the fundamental rethinking and radical
redesign of business processes to achieve dramatic
improvements; in:
 cost
 quality
 service
 speed