• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/75

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

75 Cards in this Set

  • Front
  • Back
Computer system layered cake
hardware > OS > app > user
Application server
houses and serves business logic for use by multiple programs
Web services
software services design to support interoperable machine-to-machine interaction over a network
EDI

Electronic data interchange
set of standards for exchanging msgs containing formatted data between computer apps




Most common use is sending electronic equivalent of structured docs between orgs because computers communicate with less errors

Client
a software program that makes requests of a server program
APIs
programming hooks published by orgs to tell how other programs can get a service to perform a task such as send or receive data
Programming languages
provide the standards, syntax, statements and instructions for writing computer software
Integrated development environment (IDE)
application that includes an editor, debuger, complier etc.
Compiling

converts code into machine-readable form

Scripting languages
programming tools that execute within an application
Capability maturity model integration (CMMI)
process-improvement approach, assists in assessing maturity, quality, development of org bus processes and suggests steps for their improvement
LAMP Stack
Linux, Apache, MySQL, Perl
OSS

open source software

- Nearly every type of product has OSS equivalent


- Even big data tools


- Can have concens of quality/security if fewer developers


- Have fewer bugs because of the large number of people who have looked at the code


- Can bring products to market faster because skip whole segments of the software development process


- Heartbleed - did not have enough developers to look at it


- Less popular projects may not get a lot of developers -> network effects

Hardened
tech products with strong security features
Scalability of software
ability to easily expand to manage workload increases
Total cost of ownership
cost associated with the design, development, testing, implementation, documentation, maintenance etc of a software
Platform as a service
vendors provide OS and supporting software but clients write their own code
Cloud computing

- replacing computing resources with services provided over the internet


- Not suitable when complex legacy systems have to be ported


- Decrease hardware and software sales, but increase service expenses

Software as a service

form of cloud computing where firm subscribes to 3rd party software and receives a service that is delivered online




- Lower care and maintenance costs


- Backed by Oracle


- Sign service level agreements


- Scalable systems


- Lower distribution costs for vendors


- However client is dependent on a single vendor


- Consumerization of technology is a challenge - employees can go set up a wiki

Private clouds
pool of computing resources reside in an org that can be served up fro specific tasks as need arrives
Cloud firms
tend to be located in warehouses designed for computers
Vertical niches
products and services designed to target a specific industry
Software as a service
cloud vendors that host hardware, OS, DB and other software which clients then build their own apps with

Black swans
unpredictable but highly impactful events
Cloudbursting
use of cloud computing to provide excess capacity during periods of spiking demand
Infrastructure as a service
clients select their own OS, development environments, underlying apps and cloud firm manages the infrastructure
Virtualization software
create smaller compartments in memory that each behave as a separate computer

utility computing
A form of cloud computing where a firm develops its own software, and then runs it over the Internet on a service provider’s computers.
Data
raw facts and figures
Information
presented in a context so it can answer a question or support decision making
Knowledge
insight derived from experience and expertise
SQL
used to create and manipulate databases
DBMS
software for creating, maintaining, and manipulating data
File
a list of data or table

Field
defines the data a table can hold
Record
a single instance of whatever the table keep tracks of, or a row of a table

Database admin
job focused on directing, performing, overseeing activities of a database
Relational database
common standard, tables (files) are related based on common keys

Artificial intelligence
software that seeks to reproduce human thought, decision making or brain functions
Data aggregator
firms that collect and resell data
Data warehouse
- relational database that is designed for query and analysis rather than transaction. Usually has historical data but can include data from other sources
Data mart
subset of data warehouse, usually specific business
E-Discovery
refers to identifying and retrieving relevant electronic info to support litigation efforts
Transaction processing systems (TPS)

- systems that record transactions (form of business exchange)


- If not set up for both reporting and analysis data is not efficiently transformed into info


- Running analytics can slow down TPS

CRM
used to empower employees to track and record data at every point of customer contact
Data mining

- process of using computers to identify hidden patterns and build models from large data sets


- Market basket - check to see what they buy together


- Data must reflect current and future trends

Neural network
AI system that examines data and hunts down and exposes patterns in order to build models to exploit findings, also used to recognize patterns to improve speech recognition
Online analytical Processing (OLAP)

method of querying that takes data from relational databases and summarizes the data, stores it in a data cube.


- Data cube


- special database used to store data in OLAP reporting

Expert systems
AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise
Genetic algorithms
model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathermatical models, and comparing the mutated models to search for a best alternative
Twin nightmares
having too much inventory or insufficient

Inventory turnover ratio
annual sales to inventory
Customer lifetime value
the present value of the likely future income stream generated by an individual
Strategic Asset characteristics

- Value


- Rarity


- Lead time


- Non-substitutability

Data harvesters
cyber criminals who infiltrate systems and collect data for illegal resale
Botnets
large horde of infiltrated computers linked and controlled remotely, zombie networks
Cyberwarefare

is Internet-based conflict involving politically motivated attacks on information and information systems


ex: attack on US power grid by terrorists

Hacker
used to refer to a skilled programmer
White hat hacker
uncovers computer weaknesses without exploiting them
Hacktivist
protestor seeking to make a political point by leveraging tech tools

DDoS (Distrbuted denial of service)
virtual shutdown with seemingly legit requests
Stuxnet
worm that infiltrated nuclear facilities and reprogrammed controls
Hack
break into computer or a particularly clever solution
Zero-day exploits
attacks so new they are not clearly identified and have not made it into security screening systems
SQL injection technique
exploits sloppy practice where user input not validated
Spoof
e-mail transmissions and packets that are altered to appear as if they came from another source

Encryption
scrambling of data using a cipher, hidden to those who do not have the key
Certificate authority
trusted 3rd party that provides authentication services in public key encryption schemes
Compliance
legal or professionally binding steps that an org must take
Intrusion detection system
monitors network for potential hacking attempts, takes preventative action to block, isolate, identify and warm
Blacklists
systems that deny entry of specific IP addresses
Access control tools
enforces access privileges and helps verify that systems are not being accessed by unauthorized
Honeypots
are tempting but bogus targets meant to draw hacking attempts
Whitelists
highly restrictive programs that permit communication only with approved entities/in an approved manner
Firewalls
systems that act as controls for network traffic, block unauthorized traffic