Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
120 Cards in this Set
- Front
- Back
What is required for "good decision-making"
|
1. Good Info
2. Skills 3. Tools |
|
What is a decision
|
A choice among alternatives
|
|
Decision making requires ___________ Reasoning Skills
|
Analytical
|
|
What are Structured or Programmed Decisions
|
Decisions that are routine and repetitive, and often have a well-defined procedure
|
|
Semi-structured Decisions
|
Decisions that have some elements that are structured and other elements that are unstructured
Ex. Planning annual compensation for employees in a large company |
|
What is an Unstructured or Non-Programmed Decision
|
Decisions that are novel, that do not have a pre-existing procedure
Ex. Decision to introduce a new smartwatch by an electronics company |
|
What type of decision are algorithmic trading systems used in investing?
|
Automated Decision Making
|
|
Should the Kill Decision Be Automated?
|
TED Talk by Daniel Suarez say NO it should not be made by Robot
|
|
Strategic Planning includes:
|
1) Choosing the Organizations Objectives
2) Deciding how to achieve objectives 3) Predicting the future |
|
Managerial Control Includes:
|
1) Ensuring Efficient, effective use of resources
2) Detailed plan and enactment of achieving objectives 3) Continual Oversight |
|
Operational Control Includes:
|
1) Ensuring Efficient,Effective conducting of tasks
2) Ensuring processes well-maintained and tight |
|
Phases of Decision Making Process
|
1) Intelligence
2) Design 3) Choice |
|
What happens in the intelligence phase?
|
A. Identify and clearly define the problem
B. Determine requirements and goals (target output) |
|
What happens in the DESIGN PHASE?
|
A. Identify Alternatives (Input Values)
B. Define Criteria (Comparing Alternatives) C. Select a Decision-making technique/tool |
|
What happens in the CHOICE PHASE?
|
A. Evaluate Alternatives using criteria
B. Check if solution solves problem |
|
What is Lethal Autonomy?
|
The act of a robot committing death attempts on its own
|
|
Lethal Autonomy left unregulated could lead to what?
|
Plausible Deniability and rogue attacks
|
|
What are some Decision Making Techniques?
|
1) Pro/Con Analysis
2) Paired Comparisons 3) Decision Matrix |
|
Explain PRO/CON ANALYSIS
|
Non-Mathematical technique where you simply list advantages and disadvantages
|
|
Explain PAIRED COMPARISONS
|
Compare Pairs of alternatives to find "winning alternative"
Single - Only one moves forward Comparison - One with most wins after all combos |
|
Explain a Decision Matrix
|
Compare alternatives against all criteria by adding a score 1-10 for each criteria - Highest total wins
|
|
What are Document Management Systems
|
They Provide functions to locate and retrieve documents
|
|
Spreadsheets are popular ________
|
Data Support Systems
|
|
What is sensitivity analysis?
|
Changing one or more input variables to see impact on one or more of output variables
|
|
Types of "What If" Analysis
|
1) Scenario Manager
2) Data Table |
|
Goal Seek takes a _____________ value and finds the needed ______ value
|
target output;input
|
|
Data Validation
|
Is used to prevent users from entering input data on a worksheet that does not meet conditions
|
|
Data validation is important in maintaining ________ in a worksheet
|
quality data
|
|
What does the PMT Excel Function do?
|
Outputs the payment for each period based on inputs
|
|
What inputs affect PMT?
|
(Rate);(Nper)# Periods; (PV) Present value
|
|
What is a Data Table?
|
allows you to compute the result of a formula for various values of an input
|
|
What does VBA Stand for?
|
Visual Basic for Applications
|
|
What are computer Communications?
|
A process in which two or more computers transfer data, instructions, or information
|
|
What is a network?
|
A collection of computers and devices connected together via communication devices
|
|
What is a computer network?
|
A collection of interconnected computing devices that can communicate amongst themselves.
|
|
What is LAN?
|
Local Access Network
|
|
What is WAN?
|
Wide Area Network
|
|
What is GAN?
|
Global Area Network
|
|
Define Network Architecture
|
The design of computers,devices, and media on a network.
|
|
What is P2P
|
Person to Person - Users access eachothers hard disks and exchange files directly over the internet
|
|
What is a network Topology?
|
The layout of the computers and devices in a communications network
|
|
History of Network Architecture
|
1) Star Network Topology
2) Ring Network Topology 3) Bus Network Topology |
|
What are protocols?
|
Rules/Standards/Procedures that computers must follow when sending or receiving data
|
|
What is Ethernet?
|
A network standard that specifies no computer controls when data can be transmitted
|
|
What is a Token Ring standard?
|
Specifies that computers and devices on the network share or pass a special signal or token
|
|
TCP/IP Standard
|
Network standard that defines how messages are routed from one end of a network to another
|
|
WI-FI identifies any network based on what standard?
|
802.11
|
|
What is Bluetooth?
|
Defines how two devices use short-range radio waves to transmit data
|
|
What is UWB (Ultra-WIdeband)
|
Specifies how two UWB devices use short-range radio waves to communicate at high speeds
|
|
IrDA
|
Transmits Data WIrelessly via infrared (IR) Light Waves
|
|
RFID
|
Uses Radio signals to communicate with a tag placed in or attached to an object, animal, or person
|
|
What is WiMAX(802.16)?
|
-Towers can cover 30-Mile Radius
-Provides Wireless Broadband Internet Access |
|
What does WAP stand for?
|
Wireless Application Protocol
-Specifies how some mobile devices can display the content of Internet Services |
|
Communication software consists of programs that:
|
1) Help users establish a connection to another computer or network
2) Manage the Transmission of data, instructions, and information 3) Provides an interface for users to communicate with one another 4) Implements protocols at all levels, meaning firmware, on devices |
|
What is a communications device?
|
is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device
|
|
Common Connectivity Devices
|
Network Interface Cards (NICs)
Repeaters Routers Hubs Bridges Switches |
|
Connectivity Hardware
|
Hardware that allows computers to be "physically connected" to networks
|
|
MAC
|
Media Access Control
|
|
NIC
|
Network Interface Card - Allows computer to connect to network and has unique serial number
|
|
Function of a repeater
|
A network device used to regenerate or replicate a signal as it weakens when traveling across a network
|
|
What does a router do?
|
An intelligent device used to connect two or more individual networks. It can appropriately route messages coming from one network to another.
|
|
What is the purpose of a routing table?
|
A table used to choose the "best" known path or hop to send packets
|
|
What is a tracert/traceroute
|
A command tool available in Windows and Mac OS used to trace the path to the destination - Need Command Prompt or Terminal
|
|
Give an example of a domain name
|
ex. www.uiowa.edu
|
|
Give an example of a suffix
|
.edu
.org .net |
|
Domain Name Systems (DNS)
|
Maps domain names to IP Addresses
|
|
How do you find the IP address for a given domain
|
Using "ns lookup"
|
|
What makes the "Web" possible?
|
-HTTP
-HTML -Browsers -Internet |
|
What is HTTP?
|
Hypertext Transfer Protocol
|
|
What is HTML?
|
Hypertext Markup Language - Language used to create webpages
|
|
What is URL?
|
Uniform Resource Locator
|
|
http://www.microsoft.com/security/default.html
Find: Protocol, Directory, File, Domain/Host |
Protocol: http://
Domain/Host: www.microsoft.com Directory: /security file:/default.html |
|
Static Web Pages
|
Are delivered to the client exactly as stored on the server. Hence all users (clients) will see exactly the same page when they request using a given URL.
|
|
Dynamic Web Pages
|
Are generated by web applications (programs) running on the server. Hence each user (client) may see a different page based on her context/inputs
when she requests using a given URL. |
|
What does SOA stand for?
|
Service Oriented Architecture - A set of design principles of how to take data from heterogeneous systems and create reusable services.
-Enables different devices to connect to network |
|
What is Middleware?
|
software that can understand each technology’s
specific formats and communication protocols, and can then translate them into another platforms formats and protocols, enabling interoperability |
|
What is Software as a Service (SaaS)?
|
A ‘software rental’ model architecture
It is implemented like a subscription, think of Office 365, where you always get updates |
|
Describe Cloud Computing?
|
An architectural approach to computing where an organization rents computing resources from providers, instead of having their own locally managed hardware and software
|
|
What are the advantages of cloud computing?
|
Enables ease of scalability, lower costs because not so many IT staff, migration costs to stay current, backup costs
|
|
What is virtualization?
|
allows one physical device, such as a server or
computer, to operate as if it is several machines `` |
|
Web 2.0
|
Users drive Content
Ex. Twitter/Blogs/Facebook |
|
Web 3.0
|
When computers start to understand the meaning,
called semantics, of what is there; understanding the information and data to better make it useable -Semantic Web - Everything Linked |
|
Three Main Categories of Threats
|
-Denial/disruption of service
- Unauthorized Access - Theft and Fraud |
|
Information Security (IS)
|
a broad concept that involves dealing
with any threat to computerized systems, such as viruses, hackers, accidental loss of data or systems, natural disasters |
|
What 2 things does IS require?
|
technology + management
|
|
Worm
|
is an independent program which replicates itself and sends
copies from computer to computer across network connections. Upon arrival the worm may be activated to replicate. |
|
Trojan Horse
|
Masquerades as beneficial program
while quietly destroying data or damaging your system. |
|
Logic Bomb
|
Malware logic executes upon certain conditions
ex. Employee triggers database erase when he is fired |
|
Social Engineering
|
manipulates people into performing actions or divulging confidential information
|
|
Phishing
|
a ‘trustworthy entity’
asks via e-mail for sensitive information such as SSN, credit card numbers, login IDs or passwords. |
|
Botnet
|
a large number of compromised computers that are
used to create and send spam or viruses or flood a network with messages as a denial of service attack |
|
Repdudiation
|
is an illicit attempt to deny sending or
receiving a transaction. |
|
Non-Repudiation
|
is the ability to prove that a transaction
has, in fact, occurred. ex. encryption, signatures |
|
Preventive controls
|
stop or limit the security threat from
happening in the first place (anti-virus scans) |
|
Corrective controls
|
repair damages after a security problem
has occurred (anti-virus quarantine |
|
Detective controls
|
find or discover where and when security
threats occurred (audit logs) |
|
Layered security
|
approach has the advantage of creating
a barrier of multiple defenses that can be coordinated to thwart a variety of attacks |
|
Obscurity strategy
|
means what goes on inside a system or
organization should be hidden |
|
Authentication credentials can include:
|
A user name and password
Tokens, such as those created by token cards Digital certificates |
|
Authentication logon process
|
1. Identification – credentials presented
2. Authentication – checks to see if present in authentication DB 3. Authorization – allowed to log onto computer 4. Access – granted access to resources according to permissions assigned |
|
Authentication Methods:
|
1) What you know
2) What you have 3) Who You are 4) Where you are |
|
What are Tokens?
|
Item presented during authentication process
Often a challenge phrase presented |
|
SSL/TLS or Secure Socket Layer/Transport Layer
Security |
are protocols that allows for secure communication
between two computers (e.g., between a browser and a web server) |
|
What is FIPP
|
Fair Information Practices
Principles FIPP are guidelines that represent widely accepted concepts concerning fair information practice in an electronic marketplace The FIPP principles provide guidance for how to deal specifically with personal information |
|
PATRIOT ACT
|
is an Act of Congress that was signed into
law by President George W. Bush on October 26, 2001. |
|
FERPA
|
permits a school to disclose personally identifiable information
from education records of an "eligible student" (a student age 18 or older or enrolled in a postsecondary institution at any age) to his or her parents, if student is a dependent |
|
Cookies
|
A text data passed to a browser from a Web server.
Then the text data is sent back to the Web server with every subsequent request to the Web server. Used by Web applications to store state and user information |
|
system
|
a set of
components that interact to achieve a common goal |
|
Information System (IS)
|
a
collection of hardware, software, data, people, and procedures that work together to produce quality information |
|
SDLC
|
Systems Development Life Cycle
|
|
Systems Analyst
|
is the
Liaison between users and IT professionals |
|
Project Phases
|
1) Planning
2)Analysis/Requirements 3) Design/Development 4) Implementation/Maintenance |
|
RFSS
|
Request for System Services
|
|
Analysis Phase
|
a) Conduct preliminary Investigation
b) Perform Detailed Analysis |
|
Process modeling
|
an
analysis and design technique that describes processes that transform inputs into outputs |
|
entity-relationship
diagram (ERD) |
a tool
that graphically shows the connections among entities in a system |
|
Design/Development Phase
|
A) Acquire Hardware/Software
B) Develop Details |
|
Implementation Phase
|
Perform Tests on Product
Training |
|
Maintenance and Security Phase
|
to
provide ongoing assistance for an information system and its users after the system is implemented |
|
Reengineering
|
g is the fundamental rethinking and radical
redesign of business processes to achieve dramatic improvements; in: cost quality service speed |