TIM50 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

IP address

-Hierarchical: beginning bits say which network the host is on, last bits tell which host of the network -Changeable: changes with the location of the host -4 bytes -4.2 billion (not a lot) -32 bits

MAC address

-Not hierarchical: beginning bits tell nothing useful -Not changeable -6 bytes -281 trillion

Digital goods

0 or nearly 0 marginal cost Goods delivered over a digital network Costs of delivery over internet are very low Cost of producing the first unit is almost the entire cost of the product Marketing costs the same, pricing is highly variable Industries with digital goods undergoing huge changes

Digital certificates

A data file used to establish the identity of users and electronic assets for the protection of online transactions Uses a trusted third party (certification authority (CA)), to validate a user's identity The CA verifies the user's identity, then stores the information in a CA server, which generates a encrypted digital certificate containing the owner ID information and copy of the owner's public key

Host

A device that communicates with others hosts on a network; _____ on a network include 'clients and servers' that send or receive data, services, or applications

What is a distributed denial of service attack?

A distributed denial of service (DDOS) attack involves sending traffic from a large number of hosts to a target system in attempt to overwhelm that system, diminishing its ability to serve legitimate users. Often DDOS attacks are launched by networks of infected computers known as "botnets."

Botnet

A group of computers that have been infected with a bot malware without the users knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks

Router

A physical or virtual device that passes information between the Internet and the devices connected to the Internet. 'routes' traffic between the devices and the internet

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

A))) Security ▪ B) Controls ▪ C) Benchmarking ▪ D) Algorithms

keyloggers

Action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored

Revenue models

Advertising, sales, subscription, free/freemium, transaction fees, affiliate

Customer lifetime value (CLTV)

Analytical CRM, analyzes customer data Difference between revenues produced by a specific customer and the expenses for acquiring and servicing that customer minus the cost of promotional marketing over the lifetime of the customer relationship expressed in today's dollars

Analytical CRM types

Based on data warehouses populated by operational CRM systems and customer touch points Analyzes customer data (OLAP, data mining, etc.) Also does customer lifetime value (CLTV)

Consumer Commerce (B2C)

Business to consumer Amazon

Link layer

Can make a Frame link out of a bit link Distinct packages of data that are separate from one another Can tell where a new frame begins by inserting a special sequence In binary 0's and 1's Can also do error detections and corrections Insert extra information that helps the receiver determine if the data has been corrupted Parity bit The sender adds either a 0 or 1 to make it odd or even If the receiver counts the opposite of what it should be, it's corrupted

Antivirus software

Checks computers for the presence of malware and can oftentimes eliminate it as well Requires continual updating

CKO and COPs

Chief Knowledge Officer Communities of practice (COPs) Informal social networks of professionals and employees Activities include education, online newsletters, and sharing knowledge Also reduces learning curves of new employees

• Enterprise Resource Planning (ERP)

Collects data from many divisions of the firm for use in nearly all of the firm's internal business activities Based on integrated software modules and common central database Info entered in one process is immediately available for others

Just-in-time strategy

Components arrive as they are needed Finished goods are shipped after leaving the assembly line

-Artificial intelligence

Computer hardware and software systems that are as "smart" as humans Grand vision of it Realistically are systems that take data inputs, process them, and produce outputs (like software programs) and that can perform many complex tasks that would be difficult or impossible for humans to perform Many different types and examples Below are the major types of AI

Interconsumer Commerce (C2C)

Consumer to consumer eBay

Physical layer

Convey bits over a wire Other ways to map a bit sequence Modulation schemes

CRM

Customer relationship management (knowing the customer) CRM systems Capture and integrate customer data from all over the organization Consolidate and analyze customer data Distribute customer information to various systems and customer touch points across enterprise Provides a single enterprise view of customers PRM: partner relationship management Lead generation, pricing, promotions, orders, availability Assess partner performance ERM: employee relationship management Objectives, performance, training, compensation Sales, Marketing, Service

Operational CRM types

Customer-facing applications Sales force automation call center and customer service support Marketing automation

Acceptable use policy (AUP)

Defines acceptable uses of firms information resources and computing equipment

Acquisition: (KMVC)

Documenting both tacit and explicit knowledge This includes storing documents, reports, presentations, best practices; unstructured documents; developing online knowledge Creating knowledge and tracking data from TPS and external sources

DNS

Domain Name System Move from root name server to more specific to more specific Ex: root server to UCSC name server to S&E name server Way to map domain names

E-Commerce

E-Commerce Use of internet and web to transact business Began in 1995 and grew exponentially Social, mobile, and local

Packet

Each time a device sends a file to another device, the data is broken down into ____ so that it can be sent efficiently. Data transmission across digital networks

Business to Business (B2B)

Ex: elemica (supply) New ways of buying and selling Private industry networks: private exchanges, large firm using a secure website to link to suppliers and partners New marketplaces (e-hubs): Single digital marketplace for many buyers and sellers, may focus on direct or indirect goods, may be vertical or horizontal marketplaces Exchanges: independently owned third-party net marketplaces for spot purchasing

Information systems audit

Examines the firm's overall security environment as well as controls governing individual information systems

True or False: An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.

False

True or False: Disintermediation provides major benefits to the distributor.

False

Controls

General controls: They govern design, security, and use of computer programs and security of data files in general throughout an organization Software controls, hardware controls, computer operations controls, data security controls, system development controls, and administrative controls Application controls: These are controls unique to each computerized application Input controls, processing controls, output controls

-Machine learning

How computer programs improve performance without explicit programming They recognize patterns, experience, prior learnings, supervised/unsupervised learning Ex: google searches, recommender systems (Amazon, Netflix)

Knowledge Management Value Chain

IS Activities: Acquire, Store, Disseminate, Apply

Network Layer

If Host A wants to send data to Host C, and knows C's address it sends the packets towards C Does this by marking the packet with C's IP address A uses a link to send it to B When it gets to B it looks at the packet header and routing table to choose link to destination

Storage (KMVC)

In databases, document management systems, and role of management

Application (KMVC)

In new business practices, products and services, and new markets

Large e-business topology

Incoming HTTP requests go to load balancer which go to presentation logic (web servers), logic flow of interaction (application servers) to databases

Computer worm

Independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs

Bullwhip effect

Information about product demand gets distorted as it passes from one entity to the next across the supply chain Upstream and downstream

-Transport Protocols - TCP/UDP

Internet is unreliable and will make its best effort to get packet to destination Packets can be lost because of congestion, link errors, or routing problems Transport is under Application, Presentation, and Session AND above Network, Link, and Physical There is a retransmit mechanism for reliability The receiver sends acknowledgement to sender When a packet is lost, there is no acknowledgement, so it retransmits Congestion control If there is perceived congestion (lost packets), the source reduces its send rate by half, then slowly increases TCP Header has TCP port numbers These help to sort out how to route packets to applications

Hierarchical addressing

Internet routing is hierarchical Addresses are hierarchical in topology Maximize wild cards Distribute address administration Names are hierarchical in administration Single administered organizations are often distributed topologically (ibm.com)

ISP topology

Internet service provider Local loops (from homes) to telephone switch and DSL Modem Switch goes to telephone network Modem goes to DSLAM to leased line to NAP

Firewall

It is a combination of hardware and software that prevents unauthorized users from accessing private networks Packet filtering, stateful inspection, network address translation (NAT), and application proxy filtering Corporate firewalls have an outer firewall to a web server then an inner firewall to corporate systems to databases The walls have policy rules

Statistical Multiplexing

Links are shared in a way that connections are not assigned a fixed fraction of Link Sources A and B will unlikely offer peak rate at the same time Possible that offer loads too high because resources aren't reserved When this happens packets are put into a queue

▪ Differences between early MRP and modern ERP

MRP evolved into ERP A common software architecture with modules to support different business functions Multi-functional, integrated, modular

Malware

Malicious software programs such as computer viruses, worms and trojan horses

Supply Chain Planning Systems

Model existing supply chain, enable demand planning, optimize sourcing and manufacturing plans, establish inventory levels, identify transportation modes

Intrusion detection systems

Monitors hot spots on corporate networks to detect and deter intruders

Ethernet

Multiple hosts want to share a link To avoid the hosts talking at the same time: Don't transmit if another host is talking If there is a collision, stop, wait a random amount of time, then try Medium Access Control (MAC) Protocol is this ^ How hosts on wireless ethernet identify each other: Each host (interface): has a globally unique MAC address, and cannot be changed

Layering of architecture

Network architectures are layered Each layer uses the services of the layer below it and offer more advanced services to the layer above Layers are designed independently 3 layers: Network - Link - Physical

Does the IP address of your laptop remain the same wherever you go?

No. The IP address changes when the computer is connected to different parts of the network. This is necessary since the IP addressing scheme is hierarchical - so that information about the location of the IP address can be discerned by reading the beginning parts of the address. This structure could not be maintained if hosts moved around the network without changing addresses.

Click fraud

Occurs when an individual or computer program fraudulently clicks an online ad without any intention of learning more about the advertiser or making a purchase

Secure Sockets Layer (SSL)

One type of encryption on networks Also has successor Transport Layer Security (TLS) Enables client and server computers to manage encryption and decryption activities as they communicate with each other during a secure web session

Secure Hypertext Transfer Protocol (S-HTTP)

One type of encryption on networks Protocol used for encrypting data flowing over the internet; limited to individual messages

SCM (supply chain management)

Organizations and processes for procuring materials, transforming materials into products, distributing the products

EDI (Electronic Data Interchange)

Part of internet-enabled technologies in B2B Computer-to-computer exchange of standard transactions such as invoices, purchase orders Major industries have EDI standards: Define structure and information fields of electronic documents More companies are moving to this, can link to other firms with EDI, wider range of info Supplier and firm systems

Home network topology

Personal computers to ethernet switch to router to DSL modem to telephone line which goes to local office

Small/medium business topology

Personal computers to ethernet switch to router with firewall, website server to local office

Popular business model categories

Portal/search engine, e-tailer, content provider, market creator, transaction broker, service provider, community provider

Dissemination (spread) (KMVC)

Portals, wikis, email, instant messaging Search engines, collaboration tools Training programs, informal networks, and shared management experience

Post office analogy (Hierarchical addressing )

Post office analogy Bob is in NY and wants to send letter to Alice on High St in SC NY Post Office: plane to London or SFO Make forwarding decision on beginning of zip code SFO Post office: truck to Santa Rosa or Santa Cruz Make forwarding decision on address Santa Cruz Post Office: 41st st or High st Final destination

Spoofing

Redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination

Digital markets

Reduce: information asymmetry, search costs, transaction costs, menu costs o Enable: dynamic pricing, disintermediation

Computer virus

Rogue software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions

-Routing Table, Packet Forwarding, IP Addresses

Routing algorithms is where routers talk to each other to build routing tables Routing tables have wild cards Prefixes in the table vary so generally route to the longest prefix match

Sales force automation vs. customer service vs. marketing roles

Sales Force automation (SFA) Sales prospect and contact information Sales quote generation capabilities Customer service assigning and managing customer service requests web-based self-service capabilities Marketing Capturing prospect and customer data, scheduling and tracking direct marketing mailings or email Cross-selling

Zero Day vulnerability

Security vulnerabilities in software, unknown to the creator, that hackers can exploit before the vendor becomes aware of the problem

CRM Service platforms

Service delivery, customer satisfaction, returns, planning, call center/help, analytics

Patches

Small pieces of software to repair the software flaws without disturbing the proper operation of the software

Supply chain management

Supply chain planning systems Model existing supply chain, enable demand planning, optimize sourcing - manufacturing plans, establish inventory levels, identify transportation modes Supply chain execution systems Manage flow of products through distribution centers and warehouses

MRP (Material or Manufacturing Resource Planning)

Takes: product development forecasts, inventory balances, and replenishment lead times; to Develop a production schedule for a single plant Planning tool

Spyware

Technology that aids in gathering information about a person or organization without their knowledge

Encryption

The coding and scrambling of messages to prevent their being read or accessed without authorization Transforming text or data into cipher text that cannot be read by unintended recipients Two methods for the encryption on networks Secure Sockets Layer (SSL) and Successor Transport Layer Security (TLS) Secure Hypertext Transfer Protocol (S-HTTP) Symmetric key encryption Sender and receiver use single, shared key Public key encryption Uses two, mathematically related keys Public and private key The sender encrypts the message with the recipients public key The recipient decrypts with the private key

What responsibilities does the link layer have?

The link layer is responsible for turning a "bit link" provided by the physical layer into a "frame" link that sends groupings of bits called frames. The link layer also is responsible for medium access control to allow multiple hosts to share a medium like a wire or radio channel. Finally the link layer does error correction and/or detection.

Churn rate

The number of customers who stop using or purchasing products or services from the company Indicates growth or decline of the firms customer base

Describe how an IP packet is sent over an Ethernet to a gateway router.

The packet is encapsulated by an Ethernet frame and this frame is sent to the gateway. The Ethernet frame has a header which will have a destination MAC address field set to be the MAC address of the gateway router. The encapsulated packet will have a header with a destination IP address set to be the IP address the final destination.

Parity bit

The sender adds either a 0 or 1 to make it odd or even If the receiver counts the opposite of what it should be, it's corrupted

Risk assessment

This determines the level of risk to the firm if specific activity or process is not properly controlled -Types of threat -Probability of occurrence during the year -Potential losses Value of the threat -Expected annual loss

Structured, unstructured, and semistructured data

This is knowledge in an enterprise Structured documents: reports, presentations, formal rules Semi Structured documents: emails, videos Unstructured: tacit knowledge 80% is structured or semistructured

Web caching

This speeds up web page loading by storing previously seen components locally

Behavioral targeting

Tracking online behavior of individuals Found on individual websites/apps and across advertising networks

True or False: Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business.

True

Token

Type of authentication to safeguard information systems Physical device similar to an identification card that is designed to prove the identity of a single user

Push-based model (built to stock)

Uses earlier SCM systems Schedules based on best guesses of demand Manufacturer: to supplier; and distributor to retailer to customer Supply chain driven by production master schedules based on forecasts or best guesses of demand for products, and products are 'pushed' to customers

Public key encryption

Uses two, mathematically related keys Public and private key The sender encrypts the message with the recipients public key The recipient decrypts with the private key Public key infrastructure The use of a public key cryptography working with CA It is widely used in e-commerce

Knowledge management

Very large part of labor force and very fast growing area Intangible assets (very important): knowledge, brands, reputations, business processes Data, knowledge, wisdom Knowledge is: firm asset, different forms, location, situational Documenting tacit and explicit knowledge: Storing documents, reports, presentations, best practices; unstructured documents; developing online knowledge Creating knowledge and tracking data from TPS and external sources Knowledge storage: databases, document management systems, role of managemen

Pull-based model (demand driven)

Web-based Customer orders trigger events in the supply chain Customer to retailer to distributor to manufacturer to supplier Supply chain driven by actual customer orders or purchases so that members of the supply chain produce and deliver only what customers have ordered

Ethernet Switch

When a switch knows where the destination is it forwards an incoming frame to the destination only Parallel conversations are made possible

Congestion control

When networks are congested, some sessions should reduce offered rates All TCP sessions slow down when there are packet losses today UDP sessions, however, do not slow down

HTTP

hypertext transfer protocol Communications standard for transferring web pages

WWW

in a URL (uniform resource locators)

E-commerce differences with traditional commerce

marketplace is virtual and transaction costs are reduced Global reach: transactions cross cultural and national boundaries Universal standards: one set technology standards, Internet standards Richness: supports video, audio, and text messages Interactivity Information density: greater price and cost transparency; enables price discrimination Personalization and customization: technology permits modification of messages/goods Social technology: promotes user content generation and social networking

ERP Notes

o Key features of ERP ▪ Multi-functional, integrated, modular o Design around key business processes Reflect best practices Finance and accounting; human resources; manufacturing and production; sales and marketing o Customizable options Use software's configuration tables

Routing table

used by routers to determine where a packet will be sent by examining its destination IP address A set of rules This destination IP address is hierarchical; the beginning bits tell you which network the host is on. The IP address prefixes are stored in the table.

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:

▪ A) phishing ▪ B) pharming. ▪ C) spoofing. ▪ D) evil twins. E))) click fraud.

The effort required to locate a suitable product is called: ▪ A) price discrimination. ▪ B) search costs. ▪ C) menu costs. ▪ D) shopping costs.

▪ B) search costs.

Why is overstocking warehouses not an effective solution for a problem of low availability? ▪ A) It does not speed product time to market. ▪ B) It is an inefficient use of raw materials. ▪ C) It increases sales costs. ▪ D) It increases inventory costs.

▪ D) It increases inventory costs.


Set pelajaran terkait

Vocabulary Workshop Level D Unit 4 Choosing the right word

View Set

Operations Management Multiple Choice

View Set

ICND1 Exam Practice Review - (Cisco 1 & 2)

View Set

Econ 111A Accounting MC Practice Problems

View Set

EESC 101 Chapter 3: Earth Systems & Ecosystems

View Set