CIS 3380 Final Exam

Ace your homework & exams now with Quizwiz!

Define Phishing

refers to cons executed through technology

What is an example of BIG Data?

"Money Ball" -helping the Red Sox win their first world series in 83 years -and with helping the New England Patriots win 3 Super Bowls in 4 years

What is Reliability for Open Source?

"given enough eyeballs, all bugs are shallow

Define Authentication

a method for confirming user's identities -the most secure type is a combo of something the users know, smart card, fingerprint or voice signature

Define Foreign Key

a primary key in 1 table that appears as a field in another table **provides logical relationship among 2 tables

What is Broadband Internet Access?

high-speed last mile technologies

Define Notice

person's right to know what is collected and how it will be used

Define Choice

person's right to object for other uses of info

Define Access

person's right to view and correct info

What is Cluster Analysis in Marketing?

-an example is the vacation travel market 1. the demanders = they want exceptional service and expect to be pampered 2. the escapists = they want to get away and just relax 3. the educationalist = they want to see new things, go to museums, go on a safari, or experience new cultures

Define Relationship

-association between tables in a relational database made by use of common fields

Define Moonshots

-balloon-delivered wireless networks -driveless cars, balloon-delivered wireless networks, etc -google bought 11 robotic firms in a single year for..well the firm isnt saying

What is Data Mining?

-common forms of data mining analysis capabilities include 1. cluster analysis 2. association detection 3. statistical analysis

Define Cloud Computing

replacing computing with services provided over the internet

Define Association Detection

reveals the degree to which variables are related and the nature and frequency of these relationships in the info

Define The Internet Backbone

made of fiber optic lines **very fast

Define Domain Squatting****

(ex. insure.com; PETA.com; verizonsucks.com)

What is Fiber?

**a light-filled glass pipe to your doorstep -fiber to the home is the fastest last mile technology around -fiber networks need to be built from scratch as they do not have preexisting infrastructure (ex. google fiber)

What is the most common approach to organizing a database?

**by using tables -called a "relational database"

What kind of free is OSS? (open source)

**downloaded free as in LIBERATED **free as beer or free as freedom

How are employees measured?

**on customer-centric metrics -speed and friendliness and are compensated based on guest satisfaction ratings -changed the corporate culture to a collaborative, customer-focused enterprise

What happens when you move from one cell's range to another?

**the towers hand off your connection. sometimes this does not work and your call gets dropped

Who are the Most Valuable Customers?

-Accurately project customer lifetime value (CLV) -the likely future income stream -the firm tracks over 90 demographic segments, and each responds differently to different marketing approaches

What is CRM?

-CRM systems depend on cluster analysis to segment customer info and identify behavioral traits (ex. consumer goods by content, brand loyalty, similarity; retail store layouts and sales performances, design of assembly line control functions)

What id DSL?

-Phone company copper -DSL tech uses copper wire phone companies have already run into homes -unlike cable, DSL uses standard copper wiring without shielding -signals degrade with distance from phone company offices -DSL technologiy is popular in EUROPE and ASIA owing to densely populated cities -DSL connections are infeasible in the US where cities are sparsely populated

What is Risk associated with Saas?

-data asset stored off-site may lead to security and legal concerns -limited configuration, customization, and system integration options compared to packaged software or alternatives developed in-house

How did BIG Data help the "moneyball" year?

-demonstrated that on-base % and slugging % are better indicators of offensive success -these qualities were cheaper to obtain on the open market than more historically valued qualities such as speed and contact

What is Cable Broadband?

-ethernet cable-copper -majority of domestic broadband connections are through copper cable technology -coaxial copper cables have shielding to reduce electrical interference -signals travel longer distances without degrading and at significant speeds

How does Caesar's Palace track most valuable customers?

-from its data they realized that most of its profits came from locals -customers 45 years and older -80-20 rule: 30% customers account for 80% spending -gives the high value customers special attention -

What is a Database?

-much info is stored in a database **it is a collection of info that can be easily accessed, managed, and updated

What is Hadoop?

-open source project -created to analyze massive amounts of raw info better than traditional, highly structured databases

Define Entity

-person, place, thing, or event -customers, orders, products, sales reps -represented by tables in a relational database

What is Net Neutrality?

-principle that all internet traffic should be treated equally -access providers have wanted to offer varying coverage depending on the service used and bandwidth consumed -internet firms worry that innovation maybe limited if network providers move away from flat-rate pricing toward usage-based schemes -may generate less incentive for big firms reducing the chance of better technology

Define Attribute (or field)

-property of an entity -customer has name, street, city, etc -represented by columns in the table

What are some problems with using Spreadsheets?

-redundancy **duplication of data or the storing of the same data in more than one place -difficulty accessing data -limited security -size limitations

What is the Clouds and Tech Industry Impact?

-shifting to cloud computing modifies the margin structure for many in the computing industry -cloud computing can accelerate innovation -firms need to think about the strategic advantages that can be created

What is BIG Data?

-the amount of data on corporate hard drives doubles every 6 months -collective # of those bits already exceeds the number of stars in the universe -Wal-Mart alone boasts a data volume well over 125 times as large as the entire print collection of the US library of congress

What are examples of Data Sources?

1. POS 2. enterprise software (ERP, SCM, CRM) 3. survey (freshdirect, zara) 4. external sources

What is the Internet's "Secret Sauce"

1. TCP works at both ends of Internet communications to ensure perfect copies of messages are sent 2. IP is a routing protocol in charge of forwarding packets on the Internet 3. Routers are computing devices that connect networks and exchange data between them

What are the key variables to consider for tech decisions?

1. competitive advantage 2. security 3. legal and compliance requirements 4. skill, expertise and available labor 5. cost and time 6. vendor issues

What are some technologies available to help prevent and build resistance to attacks?

1. content filtering 2. encryption 3. firewalls

What is Market Domination?

1. controls about 1/3 of all online advertising dollars 2. facebook, bing, yahoo, AOL, twitter, add up all their advertising revenue and combined they're less than half of Google's 3. add in China's giants

What are Motivations for criminals and privacy invasion with tech?

1. cyber warfare 2. espionage 3. identity theft 4. fraud 5. personal use 6. make money

What are some risks with SaaS?

1. dependence on a single vendor 2. concern about the long-term viability of partner firms 3. users may be forced to migrate to new versions 4. reliance on a network connection which may be slower, less stable and less secure

What do you do when Collecting Data?

1. everything you might do at their properties 2. track your preferences -decide if you are the customer worth wooing 3. total rewards loyalty card system

What is Wireless?

1. mobile wireless service is provided to customers via cell towers 2. with boom in sales of smart phones, bandwidth crunch is becoming a serious concern 3. wireless networks are transitioning from 3rd generation (3G) to 4th generation (4G) -LTE (long term evolution) -3G networks are slower than 4G and offer a lesser range of services

What are the 3 basic types of relationships?

1. one-to-one 2. one-to-many 3. many-to-many

Explain Google Fiber Bunny compared to Cable? powerpoint 14 slide 23

1. speed = 1,000 mbps vs. 15 mbps 2. pricing = internet and tv $120/mo vs.

What does the Internet Protocol Suite consist of?

1. transmission control protocol (TCP) 2. Internet Protocol (IP) **check IP address **running out of IP adresses **2^32 addresses used in the current system (more than grains of sand on the earth)

What do methods of infection include?

1. viruses 2. worms 3. trojans

What is The DNS?

Domain Name Service (the internet's phone book)

Define Flexibility (with Hadoop)

Hadoop can absorb any type of data, structured or not, from any type of source (geeks would say such a system is schema-less) -but this disparate data can still be aggregated and analyzed

Define Fault Tolerance

Hadoop is designed in such a way so that there will be no single point of failure -the system will continue to work, relying on the remaining hardware

Define LAMP

LAMP software powers many of the sites you visit each day, from Facebook to Youtube

Define Smart Card

a device that is around the same size as a credit card, containing embedded technologies that can store info and small amounts of software to perform some limited processing

Define Primary Key

a field that is a unique identifier of each record in a table

Define Data Warehouse

a logical collection of info gathered from many different operational databases that supports business analysis activities and decision-making tasks

Define Extraction, Transformation, and Loading (ETL)

a process that extracts info from internal and external databases, transforms the info using a common set of enterprise definitions, and loads the info into a data warehouse

Define Record

a set of related field values -a set of records are put together to form a table for a particular entity

Define Relational Database

a structure that can store information about 1. multiple types of entities =stored as tables in the database 2. attributes to those entities = stored as columns of the database tables 3. relationships among entities = tables linked together with special keys

Define Pagerank

algorithm to rank web sites

What does every device connected to the Internet have?

an identifying address called the internet protocol (IP) address **the domain name service is hierarchical system of nameservers that maps host-domain name combos to IP addresses

Define Internet Service Provider (ISP)

an organization or firm that provides access to the Internet (ex. telecomm industry: comcast)

Define Market Basket Analysis

analyzes such items as web sites and checkout scanner info to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services 1. which product combos are bought 2. when they are purchased 3. what sequence

What is the MOST COMMMON type of detection and response technology?

antivirus software

Define Hypertext Transfer Protocol (HTTP)

application transfer protocol that allows web browsers and web servers to communicate with each other

Define File Transfer Protocol (FTP)

application transfer protocol that is used to copy files from one computer to another

Define One-to-One Relationships (1:1)

between 2 entities in which an instance of entity A can be related to only one instance of entity B and entity B can be related to only one instance of entity A

Define One-to-Many Relationship (1:M)

between 2 entities, in which an instance of entity A, can be related to 0, 1, or more instances of entity B and entity B can be related to only one instance of entity A

Define Botnet

compromising computing assets for use in other crimes such as 1. sending spam from thousands of difficult to shut down accounts 2. launching tough to track click fraud efforts 3. distributed denial of service (DDoS) attacks

Define Routers

computing devices that connect networks and exchange data between them

Define Data Mart

contains a subset of data warehouse info

Define Redundancy

duplication of data or the storing of the same data in more than one place

Define Software as a Service (SaaS)

firm subscribes to a 3rd party software and receives a service that is delivered online

Define Scalability (with Hadoop)

hadoop systems can start on a single PC, but thousands of machines can eventually be combined to work together for storage and analysis

Define Firewall

hardware and/or software that guards a private network by analyzing the info leaving and entering the network

Define Shoulder Surfing

looking over someone's shoulder to glean password to other propietary info on a computer screen

What is the ANATOMY of a Web Address?

http://www.nytimes.com/tech/index.html http = application transfer protocol www = host name nytimes = domain name .com = top-level domain tech = path index.html = file

Is Cloud Computing Hype or Hope?

it is about replacing computer resources - either an org's or an individual's hardware or software - with services provided over the internet

Define Content Filtering

occurs when orgs use software that filters content to prevent the transmission of unauthorized info **used for filtering emails and prevent emails containing sensitive info from transmitting and stop spam and viruses spreading

What is the primary PURPOSE of a Data Warehouse?

primary purpose is to aggregate info throughout an org into a single repository for decision-making purposes

Define Encryption

scrambling data using a code or formula, known as a CIPHER, such that it is hidden from those who do not have the unlocking key **even the largest attacks havent come close to breaking encryption

Define Organic or Natural Search

search engines results returned and ranked according to relevance

Define Protocol

set of rules for communication

Define Dumpster Diving

sifting through trash to uncover valuable data or insights to facilitate attacks

Define Cost Effectiveness (with Hadoop)

since the system is open source and can be started with low-end hardware, the tech is chea by data-warehousing standards. -many vendors also offer Hadoop as a cloud service, allowing firms to avoid hardware costs altogether

Define Tokens

small electronic devices that change user passwords automatically

Define Open Source Software (OSS)

software that is free and where anyone can look at and potentially modify the code

How is OSS source code shared?

source code is openly shared

Define Structured Query Language (SQL)

standard language for manipulating database content

What is Amdahl's Law?

states that a system's speed is determined by its slowest component or the last mile

Define Biometrics

the identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice, or handwriting **can be costly and intrusive

Define Clustering Analysis

the process of grouping observations into clusters so that the degree of similarity is strong between members of the same cluster and weak between members of different clusters

What is Malware?

threatens any connected system running software such as embedded devices and a firm's networking equipment

Define URL (uniform resource locator)

used interchangeably with "web address"; URLs identify resources on the Internet along with the application protocol need to retrieve it

What is VoIP?

voice over internet protocol

What is the connection of your Phone to the Tower?

your phone's connection to the tower is just a regular radio, on a specific frequency (or range)


Related study sets

Pilgrims Progress Dangerous Journey Vocab

View Set

II Lecture Chapter 15 Short Answer/Discussion: Gynecological Abdominal Procedures pp 341

View Set

Transtheoretical model/ stages of change

View Set

ACG2021 FSU Paterson Exam 1 Chapter 2

View Set

Slope-intercept and Slope of 2 points

View Set