IS 300 Exam 2 (ch. 4, 5, 7)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

what is the optimization analysis?

finds the optimum value for a target variable by repeatedly changing other variables.

What does the Internet Protocol (IP) do?

first two networking protocols defined in this standard. it provides packet delivery.

what is predictive analytics?

utilizes a variety of analytics techniques and tools to examine recent and historical data in order to detect patterns and predict a future. Does NOT tell us what WILL happen but what WOULD happen.

What did Mintzberg use to come up with his organizational structures?

primary coordinating mechanism, organizational key level, and type of decentralization.

What does DSSs enable business managers to do?

1. Access data 2. Manipulate data 3. Conduct analysis

what are the two additional components in a prescriptive analytics using a predictive model?

1. Actionable data 2. feedback system that tracks the outcome produced by the action taken.

What are the two basic operations of data mining?

1. Predicting trends and behaviors 2. Identifying previously unknown patterns

What are the 4 types/quantitative models of DSSs including the MS excel decision support functions?

1. What-if-analysis (Excel Scenario Manager) 2. Sensitivity analysis (Excel IF function) 3. Goal-seeking analysis (Excel Goal Seek) 4. Optimization analysis (Excel Solver)

Types of Attacks

A DOS attack and a SCADA attack

Give examples of using client-sever model.

Bank account transactions, chat rooms, broadband routers, mmo games (PSO2).

what is an example of descriptive analytics?

Corporate using data collected from the Halloween buy one get one half off sale from last year to determine whether to use it again this year.

What does DSSs stand for?

Decision support systems

What are the 5 types of organizational structures?

Entrepreneurial, Machine, Professional, Divisional, Innovative structures.

What the types of computing?

Grid computing, shared computing, utility computing.

What does HTTP stand for?

Hypertext Transfer Protocol

What is the HTTP protocol?

Hypertext Transfer Protocol is an application protocol for distributed, collaborative, hypermedia information systems that allows users to communicate data on the World Wide Web (WWW/www). ex. www.google.com which the HTTP allows users to communicate with googles data.

What does PAN do?

PANS operate over short distances using wireless technologies such as Bluetooth or Wifi.

Prescriptive Analytics

Informs us what SHOULD happen in the future. Recommends more than one courses of action and showing the likely outcome of each decisions. Predicts many outcomes unlike predictive. Advises on possible outcomes before decisions are actually made.

What are Simons three (3) decision-making processes?

Intelligence, Design Phase, Choice Phase/Decision

What are the types of networks?

Internet extranet, intranet (from largest to smallest respectively).

what are access controls?

Involves authentication (biometrics) which confirms the identity of the person which then allows authorization of the user based on the level of actions, rights, and privileges that the authentication gives.

What is vulnerability?

Is the possibility that the system will be harmed by a threat.

What is the Internet Protocol Suite? (IPS)

Is the set of communications protocols used for the internet and other similar networks.

What are the advantages of Coaxial cables?

It is less susceptible to electrical interference, can carry more data than the twisted-pair wire.

What is Twisted-Pair cabling used for?

It is typically used for telephone communications and most modern ethernet networks.

what is fiber optic cabling used for?

It is used as a backbone for a network while using the other two types to connect individual devices within the network. Internet (using fiber optics) -----> Network ----> (using either TP or coaxial cabling) -----> individual devices within the network.

What are the disadvantages of Twisted-Pair cables?

It transmits data slowly, can be interfered by electrical sources, and can be easily tapped.

What are the advantages of Twisted-Pair cables?

It's inexpensive and easy to work with.

What does LAN do?

LAN uses wired or wireless technologies to connect devices to a local network. Composed of one communications medium.

What are the layers of the TCP/IP model?

Layer 1: Network Access Layer 2: Internet Access Layer 3: Transport Layer 4: Application

what does TCP/IP do?

List of communication protocols used to interconnect network devices on the Internet. IP is like your PC address on the internet.

What is LAN?

Local Area Network

What is MAN?

Metropolitan Area Network

what are example of semistructured decisions?

Middle management: Design a marketing plan Develop departmental budget Develop a new corporate website

What come up with the 5 types of organizational structures?

Mintzberg?

what are examples of structured decisions?

Operational Management (Individual employees and teams): Determine overtime eligibility Restock inventory Offer credit to customers Determine special offers to customers

What are the different forms of Intellectual property (IP)?

Patents, Trademarks, Registered Designs, and Copyright.

What is PAN?

Personal Area Network

what are the common type or source of a cyber attack?

Phishing, Virus, Worms

What are the five information security controls?

Physical security controls, access control, communications security, business continuity solution (BCM), Information Systems Auditing

what is bandwidth? and give an example

Refers to the capacity at which a network can transmit data. Ex. if the bandwidth of a network is 40 Mbps, it implies that the network CANNOT transmit data faster than 40 Mbps in any given case.

What do routers do?

Routers move packets between networks based on high-level protocol addresses, and each network being linked must be configured into the router. Both bridges and routers are used to build larger networks, and both devices are called switches in the marketplace.

Explain the 3-way handshaking model to establish connection. (client-server)

SYN = Synchronize ACK = Acknowledge 1. Client sends SYN(seq= m) request to Server 2.Server sends SYN(seq = n) with ACK of SYN (ACK = m + 1) back to Client 3. Client receives SYN (seq = n) and ACK (ACK = m + 1) request from Sever 4. Client sends ACK (n + 1) back to Server (ack = n + 1) to confirm Synchronization and acknowledgement.

What is an example of unstructured decisions?

Senior management: Decide entrance or exit from markets Approve capital budget Decide long-term goals

what does TCP/IP stand for?

TCP is Transmission Control Protocol IP is Internet Protocol.

what is the internet?

The Internet is a vast network that connects computers all over the world.

What are the disadvantages of Coaxial cables?

They are more expensive, inflexible, difficult to work with compared to twisted-pair wire.

What are the two most important protocols in the Internet Protocol Suite? (IPS)

Transmission Control Protocol (TCP) and Internet Protocol (IP).

What are the three (3) types of cabling for a network/wireline communications media and channels?

Twisted-Pair Cable, Coaxial Cable, Optical Fiber Cable

What are the two types of threats?

Unintentional threats and Intentional threats

What are the three (3) decision characteristics/problem structures?

Unstructured, Semistructured, Structured. Go from high executive level to middle management to operational teams (ie. individual employees and teams).

What does WAN do?

WAN uses a combination of wired and wireless communication links, such as satellite, fiber-optic cables, or radio waves to connected devices across the network. Covers multiple communications medium.

What is WAN?

Wide Area Network

what is a SCADA attack?

a Supervisory Control and Data Acquisition (SCADA) attack is an unauthorized access into a SCADA system in order to cause harm such as an attack on monitoring system (ie electricity, water, nuclear).

What is grid computing?

a computing infrastructure that combines computer resources spread over different geographical locations to achieve a common goal.

What is Phishing?

a cybercrime in which a target is contacted by email, telephone, or text message by someone pretending to be a legitimate institution to lure individuals into providing sensitive information such as IDs, banking and credit card details, and passwords.

What are data marts?

a data storage systems that contains information specific to an organization's business unit. (ex. lipstick information in a beauty database).

what is a DOS attack?

a denial of service (DoS) attack is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services and resources. TLDR; cyberattacks that prevent you from accessing your own account or data.

What is shared computing?

a network of computers that work together to accomplish a specific task.

what is utility computing?

a service provisioning model that offers computing resources to clients as and when they require them on an on-demand basis.

what is a worm?

a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems. (does not need human interaction)

What is what-if analysis?

assumptions and predictions regarding input data (aka uncertain futures) which impact of changes in the assumptions on the proposed solution.

What are unintentional threats?

are considered to be human error, environmental hazards, and computer failures. Most people don't purposely cause harm.

what are structured decisions?

are decisions that have a standardized solution based on policy and procedures usually.

What is intranet?

are private networks accessible only to authorized users within an organization. (usually uses LANs)

What is Extranets?

are private networks that allow external parties to access certain parts of an organization's intranet. (includes suppliers, customers, partners).

What is the choice phase?

consists of choosing among courses of action. The "pick and option and decide how to implement it" phase.

What is the intelligence phase?

consists of finding the occasion for decision making. The "what is the issue?"

What is the design phase?

consists of identifying, developing, and analyzing all possible courses of action. The "what are my options" phase.

What is a threat?

danger to which a system may be exposed.

What is DBMS stand for?

database management system

what are unstructured decisions?

decisions based on individual opinions and intuition (CEO decisions)

What are semistructured decisions?

decisions that are made using standard solutions with a mix of intuition.

what are the three types of analytics?

descriptive, predictive, and prescriptive analytics.

what is Business Continuity solution (BCM)?

gives peace of mind with powerful preparedness, flexible, scalable, and secure online business continuity and planning software. guarantees flow in case of an incident.

What is Sensitivity analysis?

how sensitive an output is to any change in ONE input while other inputs are constant.

What are physical security controls?

include such things as data center perimeter fencing, locks, guards, access controls card, bio metric access control systems, surveillance cameras, and intrusion detection sensors.

What is Internet?

is a public network accessible to anyone.

What is operational control?

is a subset of management control whose aim is to regularly monitor and check routine business operations so as to confirm the consistency and quality of business activities. Basically following policies and procedures. (structured).

What is a virus?

is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. (needs human interaction)

what is a trojan?

is a type of malware that uses social engineering to spread and infect other computers. It CANNOT replicate

What is Strategic Control?

is all about following the trail or movements of the strategy as it is implemented in order to identify the areas of issue or potential areas of the issue so that necessary adjustments can be made. So basically follow the strategy and modify along the way. (kinda semistructured)

What is a Coaxial Cable?

is an insulated copper wire.

What is a DBMS?

is middleware that allows programmers, database administrators, software applications, and end users to store, organize, access, query, and manipulate data in a database.

What is exposure?

is the HARM, LOSS, or DAMAGE that can result if a threat compromises that resource.

what is Goal-seeking analysis (aka backward-seeking analysis)?

is the backwards solution calculates the value of the inputs necessary to achieve desired level of output.

What is a Twisted-Pair cable?

is the predominant form of communications wiring using strands of copper wire twisted in pairs.

What is Data mining?

is the process of searching for valuable business information (BI) in a large database, datawarehouse, or datamart.

what are the disadvantages of fiber optic cabling?

it is really expensive to install and produce.

What are the advantages of fiber optic cabling?

it is smaller, lighter, can transmit more data than the others two cables, provides better security.

what is descriptive analytics used fo?

production, financials, operations, sales, finance, inventory, and customers.

what is communications security?

protects information and information systems from unauthorized access or modifications. secures the movement of data across networks. Consists of firewalls, anti-malware systems, whitelisting, blacklisting, etc

What dos the Transmission Control Protocol do? (TCP)?

provide further functions such as reordering and data resending.

What are intentional threats?

refer to purposeful actions resulting in theft or damage of computer resources, equipment, and data.

What is the World Wide Web?

refers to all the public websites or pages that users can access on their local computers and other devices through the Internet.

what is Intellectual property (IP)?

refers to creations of the mind, inventions, literary and artistic works, symbols, names, imagines, and designs used in commerce. Basically your rights to your own creation.

what are descriptive analytics?

tells us what has already happen and allows decision makers to learn from the past behaviors.

What is the client-server model?

the client server model describes the distributed computing relationship between at least two independent computers (client and server) which use either the internet or LANs to communicate. There can be multiple clients per sever.

What is a fiber optic cable?

transmits information via light pulses from a laser, which goes through very thin filaments of glass.

What is an example of predictive analytics?

websites predict what ads might appeal to you based on what you click on.


Ensembles d'études connexes

Criminal Justice Chapter 2-3 (short answer)

View Set

Farm Management Study Guide (CDE)

View Set

Citi Group 2 + responsible conduct of research

View Set

Chapter 23: The Evolution of Populations

View Set

NU310: (prepU: assessment of kidney and urinary function)

View Set

2021 Java Programming Vocabulary Final Exam

View Set

Chapter 6: Consumer Attitude Formation and Change

View Set

S3 Practice Written Comp #1 (3/2/23 ) - 56/70

View Set