Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
75 Cards in this Set
- Front
- Back
Computer system layered cake
|
hardware > OS > app > user
|
|
Application server
|
houses and serves business logic for use by multiple programs
|
|
Web services
|
software services design to support interoperable machine-to-machine interaction over a network
|
|
EDI
|
Electronic data interchange Most common use is sending electronic equivalent of structured docs between orgs because computers communicate with less errors |
|
Client
|
a software program that makes requests of a server program
|
|
APIs
|
programming hooks published by orgs to tell how other programs can get a service to perform a task such as send or receive data
|
|
Programming languages
|
provide the standards, syntax, statements and instructions for writing computer software
|
|
Integrated development environment (IDE)
|
application that includes an editor, debuger, complier etc.
|
|
Compiling
|
converts code into machine-readable form |
|
Scripting languages
|
programming tools that execute within an application
|
|
Capability maturity model integration (CMMI)
|
process-improvement approach, assists in assessing maturity, quality, development of org bus processes and suggests steps for their improvement
|
|
LAMP Stack
|
Linux, Apache, MySQL, Perl
|
|
OSS
|
open source software - Even big data tools - Can have concens of quality/security if fewer developers - Have fewer bugs because of the large number of people who have looked at the code - Can bring products to market faster because skip whole segments of the software development process - Heartbleed - did not have enough developers to look at it - Less popular projects may not get a lot of developers -> network effects |
|
Hardened
|
tech products with strong security features
|
|
Scalability of software
|
ability to easily expand to manage workload increases
|
|
Total cost of ownership
|
cost associated with the design, development, testing, implementation, documentation, maintenance etc of a software
|
|
Platform as a service
|
vendors provide OS and supporting software but clients write their own code
|
|
Cloud computing
|
- replacing computing resources with services provided over the internet - Not suitable when complex legacy systems have to be ported - Decrease hardware and software sales, but increase service expenses |
|
Software as a service
|
form of cloud computing where firm subscribes to 3rd party software and receives a service that is delivered online - Lower care and maintenance costs - Backed by Oracle - Sign service level agreements - Scalable systems - Lower distribution costs for vendors - However client is dependent on a single vendor - Consumerization of technology is a challenge - employees can go set up a wiki |
|
Private clouds
|
pool of computing resources reside in an org that can be served up fro specific tasks as need arrives
|
|
Cloud firms
|
tend to be located in warehouses designed for computers
|
|
Vertical niches
|
products and services designed to target a specific industry
|
|
Software as a service
|
cloud vendors that host hardware, OS, DB and other software which clients then build their own apps with
|
|
Black swans
|
unpredictable but highly impactful events
|
|
Cloudbursting
|
use of cloud computing to provide excess capacity during periods of spiking demand
|
|
Infrastructure as a service
|
clients select their own OS, development environments, underlying apps and cloud firm manages the infrastructure
|
|
Virtualization software
|
create smaller compartments in memory that each behave as a separate computer
|
|
utility computing
|
A form of cloud computing where a firm develops its own software, and then runs it over the Internet on a service provider’s computers.
|
|
Data
|
raw facts and figures
|
|
Information
|
presented in a context so it can answer a question or support decision making
|
|
Knowledge
|
insight derived from experience and expertise
|
|
SQL
|
used to create and manipulate databases
|
|
DBMS
|
software for creating, maintaining, and manipulating data
|
|
File
|
a list of data or table
|
|
Field
|
defines the data a table can hold
|
|
Record
|
a single instance of whatever the table keep tracks of, or a row of a table
|
|
Database admin
|
job focused on directing, performing, overseeing activities of a database
|
|
Relational database
|
common standard, tables (files) are related based on common keys
|
|
Artificial intelligence
|
software that seeks to reproduce human thought, decision making or brain functions
|
|
Data aggregator
|
firms that collect and resell data
|
|
Data warehouse
|
- relational database that is designed for query and analysis rather than transaction. Usually has historical data but can include data from other sources
|
|
Data mart
|
subset of data warehouse, usually specific business
|
|
E-Discovery
|
refers to identifying and retrieving relevant electronic info to support litigation efforts
|
|
Transaction processing systems (TPS)
|
- systems that record transactions (form of business exchange) - If not set up for both reporting and analysis data is not efficiently transformed into info - Running analytics can slow down TPS |
|
CRM
|
used to empower employees to track and record data at every point of customer contact
|
|
Data mining
|
- process of using computers to identify hidden patterns and build models from large data sets - Market basket - check to see what they buy together - Data must reflect current and future trends |
|
Neural network
|
AI system that examines data and hunts down and exposes patterns in order to build models to exploit findings, also used to recognize patterns to improve speech recognition
|
|
Online analytical Processing (OLAP)
|
method of querying that takes data from relational databases and summarizes the data, stores it in a data cube. - Data cube - special database used to store data in OLAP reporting |
|
Expert systems
|
AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise
|
|
Genetic algorithms
|
model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathermatical models, and comparing the mutated models to search for a best alternative
|
|
Twin nightmares
|
having too much inventory or insufficient
|
|
Inventory turnover ratio
|
annual sales to inventory
|
|
Customer lifetime value
|
the present value of the likely future income stream generated by an individual
|
|
Strategic Asset characteristics
|
- Value - Rarity - Lead time - Non-substitutability |
|
Data harvesters
|
cyber criminals who infiltrate systems and collect data for illegal resale
|
|
Botnets
|
large horde of infiltrated computers linked and controlled remotely, zombie networks
|
|
Cyberwarefare
|
is Internet-based conflict involving politically motivated attacks on information and information systems ex: attack on US power grid by terrorists |
|
Hacker
|
used to refer to a skilled programmer
|
|
White hat hacker
|
uncovers computer weaknesses without exploiting them
|
|
Hacktivist
|
protestor seeking to make a political point by leveraging tech tools
|
|
DDoS (Distrbuted denial of service)
|
virtual shutdown with seemingly legit requests
|
|
Stuxnet
|
worm that infiltrated nuclear facilities and reprogrammed controls
|
|
Hack
|
break into computer or a particularly clever solution
|
|
Zero-day exploits
|
attacks so new they are not clearly identified and have not made it into security screening systems
|
|
SQL injection technique
|
exploits sloppy practice where user input not validated
|
|
Spoof
|
e-mail transmissions and packets that are altered to appear as if they came from another source
|
|
Encryption
|
scrambling of data using a cipher, hidden to those who do not have the key
|
|
Certificate authority
|
trusted 3rd party that provides authentication services in public key encryption schemes
|
|
Compliance
|
legal or professionally binding steps that an org must take
|
|
Intrusion detection system
|
monitors network for potential hacking attempts, takes preventative action to block, isolate, identify and warm
|
|
Blacklists
|
systems that deny entry of specific IP addresses
|
|
Access control tools
|
enforces access privileges and helps verify that systems are not being accessed by unauthorized
|
|
Honeypots
|
are tempting but bogus targets meant to draw hacking attempts
|
|
Whitelists
|
highly restrictive programs that permit communication only with approved entities/in an approved manner
|
|
Firewalls
|
systems that act as controls for network traffic, block unauthorized traffic
|