HARDWAREWhat is Moore’s Law?
A doubling in the number of transistors per circuit every 18 to 24 months.
HARDWARECan you add two binary numbers 0011 and 1010?
HARDWAREWhat is the difference between a bit and a byte?
Bit is smallest element of date. May have 0 or 1. A byte consists of 8 bits and represents one character of data.
HARDWAREWhat does a harddrive do?
Stores, and records.

HARDWAREWhat storage medium has the highest storage capacity and the slowest speed?
Magnetic tape.
HARDWAREWhat are the four basic computer categories?
Mainframes, midrange computers, micro computers, smartphones.
DATABASEWhat are the four operations of a Database?
Create, Read, Update, Destroy.

DATABASEWhat is the Hierarchy data?
(Smallest to largest)Field, record, table, database, data warehouse.
DATABASEWhat is a primary key?
Unique identifiers or records. (numberic, alphabetic, alphanumeric)
DATABASEWhat is referential integrity?
Enforces relations between different data elements.

DATABASEWhat are the four parts of a database?
Tables, Queries, Forms, and Reports.
ERPWhat is the main focus of ERP vs CRM/SCM?
ERP- Core business processes.CRM/SCM-Customer/supplier
ERPWhat is the largest of cost implementing ERP?
ERPWhat are some ERP benefits?
Lower costs, decision support, quality and efficiency.
ERPWhat is CRM?
Customer Relations Management (CRM)
ERPWhat is SCM?
Supply Chain Management (SCM)
INTERNET OF THINGSWhat are some other names for UbiComp?
Non-traditional computers that connect to the internet. (i.e, wearable computing, energy management)
INTERNET OF THINGSWhat are the three classes of UbiComp devices?
Dust- Miniature devicesSkin- Flexible fabrics uses as display surfaces.Clay- 3D objects
What are some of the major issues with current internet of things (loT) devices?
Privacy, secrecy, permissions.

SOFTWAREWhat is an operating system?
The language of the computer that controls application interface (API), user interfaces, peripherals( like printers), memory, storage, and processors.
SOFTWAREWhat are major functions of an OS?
CPU time-sharing, resource allocation, memory management, device drivers, application interface.
SOFTWAREHow do corporations purchase software?
Site Licenses or Application Service Provider (ASP)
SOFTWAREWhat is vertical market software?
Written for a particular type of business. Such as a dentists office, or accounting software.

SOFTWAREWhat is the Software development lifecycle?
Analysis, Design, Construction, Testing, Implementation.
What computer language can almost every other computer language trace their ancestry to?
Fortran (1954)
NETWORKWhat networking topology do we use today and what are it’s features?
Star: Allows for multiple computer conversations, easy to add workstations, and centralized control.
NETWORKWhat is a packet?
Small electronic messages that contain a header(where its going and where it came from) and data(actual payload).
NETWORKWhat is a hub, switch and router?
Hub: Connects at the physical layer. Makes a physical hardwired connection. Only one computer can talk at a time.

Switch: Connect at the link level. Recognizes MAC addresses. Has internal data table listing which computer is at which port for faster switching. From internal circuits between machines, uses in star architectures. Router:Connect at the network layer. Recognizes IP addresses and network domains. Acts as an international border guard.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
Writers Experience
Recommended Service
From $13.90 per page
4,6 / 5
Writers Experience
From $20.00 per page
4,5 / 5
Writers Experience
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

Checks packet destinations, keeps internal packets in and ROUTES external packets.

NETWORKWhat four steps are needed in the HTTP protocol?
NETWORKHow is DSL physically different from cable or fiber?
DSL needs to use the telephone lines so a phone is needed. Cable is being used with the cable line so no phone is needed, yet, a cable modem is needed. Fiber uses light modified light to transmit data.
SECURITYWhat are exploits?
Code that takes advantage of a software bug, glitch or computer vulnerability.

System security is compromised.

SECURITYWhat is a difference between a worm and virus?
Worm: a self-replicating computer program that sends copies of itself to other systems. Worms can destroy files, turn your computer into a Botnet zombie, open up your computer for illegal file sharing, make your computer send span emails and use your computer as a platform to hack into other systems.Virus(virii): Requires a host to attach itself.

Could be a file or in your BIOS. A virus can only spread from computer to another when its host is taken to the uninfected computer.

Distributed Denial of Service- when multiple computers are working together to knock an opposing computer offline. Usually this is a coordinated effort by a botnet army.

SECURITYWhat is malware?
Malware is a general class of software that damages computer systems without consent. Has a variety of hostile, intrusive or annoying software. Bases on the perceived intent of the creator.

SECURITYWhat is the difference between black and white hats?
Two major classes of hackers. White hat: intending to improve security. Black hat: someone violating computer or internet security and do illegal activity.
SECURITYWhat are the three elements to two-factor authentication?
Something you have, something you are, something you know.
SECURITYWhat is spoofing?
Someone imitates your computer to gain access.

SECURITYWhat is a zero-day exploit?
Exploits that do not have patches yet.
SECURITYWhat is a firewall?
Can be hardware of software based. Designed to set up barriers to external worms, virii and hackers.
SECURITYWhat is a honeypot?
Decoy detection equipment.

BUSINESS CONTINUITYWhat is business continuity?
The ability to continue business in the face of disaster.
BUSINESS CONTINUITYWhat are the three approaches to handling risk?
Monitor, manage and implement.
BUSINESS CONTINUITYHow is each facet of the IT triad impacted by risk?
People: Risk of losing people, or having people who with bad intentions. Cost to keep and maintain. Technology:Risk of failure or shutdown.

Risk of changing technology and not being able to keep up. Process: Risk of process not being implemented or falling short of expectations.

BUSINESS CONTINUITYWhat steps should businesses take to prepare for disasters?
Monitoring and managing the risk. Then having a plan an implementing is. Making sure the plan has been through tests of course.
ecommerceWhat is the difference between eBusiness and ecommerce?
All business activity on a network (usually using internet technology and standards)->More than just buying and selling.ecommerce: Buying, selling, service.
ecommerceWhat are the three dimensions of ecommerce?
Physical(traditional), Mix of physical and online(Hybrid), and All online(pure electronic).

ecommerce?Define in-house, joint venture, and spin off?
In-house: complete integration, share info.Joint venture/partnerships: Independent companies share syneries.Spin-off: Complete separation. Such as brick and Mortar…

this is the most common in early days of ecommerce.

Whos’s WhoApple?
Founded by Steve Jobs in 1976 with Steve Wozniak and Ronald Wayne. Apple builds hardware, software and consumer electronics.
Who’s whoAmazon?
Jeff Bezos founded 1994.

Wrote business plan on a drive between New York and Seattle.

Who’s WhoCisco Systems?
Founded by Len Bosack and Sandy Lerner at Stanford. Current CEO is John Chambers.

Who’s WhoDell?
Founded by current CEO Michael Dell. Steady feud with Apple.
Who’s whoeBay?
Founded by Pierre Omidyar. Current CEO is John Donahoe.

Who’s whoFacebook?
Mark Zuckerburg
Who’s WhoFoxconn?
CEO Terry Gou. Famous for labor camps. Makes iAnything, Xbox, playstation, kindle, Wii U.
Who’s WhoGoogle?
CEO Larry Page.

Founded by Page and Sergey Brin

Who’s WhoHP?
Found by Bill Hewlett and David Packard. Current CEO is Meg Whitman
Who’s WhoIBM?
Founded in 1898 by Herman Hollerith. CEO is Virginia Rometty. She was in charge of jeopardy game before IBM.
Who’s WhoIntel?
CEO Bria Krzanich.

Who’s WhoMicrosoft?
Founded in 1975. CEO is Satya Nadella. Founded by Bill Gates and Paul Allen.
Who’s WhoOracle?
CEO Larry Ellison. Steve Jobs was his photographer in his 4th wedding. Ellison also founded company in 1977.
Who’s WhoSamsung
CEO Oh-Hyun Kwon
Who’s WhoSAP
CEO Hasso Plattner
Who’s Who
IT StrategyName some competitive strategies?
Cost focus, cost leadership, differentiation, innovation, growth, alliances, focus/niche
IT StrategyWhat are the five forces in Porter’s Competitive Forces Model?
Threat of new competitors, bargaining power of suppliers, bargaining power of customers, threat of substitute products or services, rivalry among existing firms.

IT StrategyWhat is the focus of the value chain?
Views an organization as a series, chain, or network of activities that add value to its products and services.
IT StrategyCan you identify each part of a PEST analysis?
IT StrategyWhat are some IT considerations when expanding your business?
Local- How to hold data, cost-savings by eliminating duplicationNational- Different state laws, Tax considerations.Global- Same as all the above, standards, privacy and sharing laws, currency controls.
IT PlanningWhat are the reasons for planning?
Structure, framework, set of procedures, content, assumptions. The future can be anticipated???
IT Planningwhat are the five organizational styles?
Navigator, Evangelist, Conductor, Scientist, Gorilla.
IT PlanningCan you identify the impact and the difficulty associated with each are of the IT triad?
Processes, people and technology.

People are the most difficult.

IT PlanningWhat are the three organizational decision-making levels and what are their responsibilities?
Executive/Strategic, Managerial/Tactical, Operational/Functional
IT LawsWhat are intellectual property, copyright and patents?
Patents protect ideas for specific time, 20 yrs, depends on industry.Copyright: exclusive right. Life +70 years.Intellectual: original idea, work of art.
IT LawsWhat is the Fair Use Doctrine?
Legal concept of limitations to copyright infringementYou may make copies of copyrighted material for the purposes ofCriticism, comment, news reporting, teaching, scholarship, research or personal useUnder the Fair Use Doctrine, you can make backup copies of copyrighted material (CDs, DVDs) provided they are for your own use
It LawsWhat is DMCA?
Digital Millennium Copyright Act
IT LawsImportant Cases?
Viacom vs, YouTube (2013 Federal Appeals ruling) †YouTube was found with tens of thousands of TV showsYouTube is not liable for infringing tv shows, provided they comply with takedown notices (Safe Harbor provision)MPAA vs. RealNetworks (2009 Federal District ruling)RealNetworks built a software to backup DVDsPrograms engaging in Fair Use cannot circumvent DMCA access control measuresVernor vs.

AutoDesk (2010 Federal Appeals ruling, Final)Vernor found an unopened copy of AutoCad at a garage sale and attempted to sell it on eBayLicenses can forbid and severely restrict transfer or resaleConflict???Kirtsaeng vs. Wiley (2013 Supreme Court)???UsedSoft vs Oracle (2012 EU High Court)???Lenz vs. Universal (2010 Federal District ruling) †Video of a baby dancing to Prince musicRights holders must consider Fair Use before issuing takedowns

IT LawsWhat is an IP Troll?
Businesses whose only function is to profit from IP lawsuits.
IT Laws
FISA – Foreign Intelligence Surveillance Act (1978)Establishes standards and procedures to collect intelligence on foreign entities within the United StatesDisallows domestic spying without special warrantsHIPAA – Health Insurance Portability and Accountability Act (1996)Hierarchies of access control to healthcare informationData backups of 100% reliabilityForms and releases must be scanned, saved and availableSOX – Sarbanes-Oxley Act (2002)All business records, including electronic business records and electronic messages, must be saved for not less than 5 yearsPhone calls, emails, IMs, work files, memos, letters, everythingPatient Protection & Affordable Care Act (2010)Healthcare Information Technology (HIT) requirementsAll medical records are held electronicallyAll scripts must be ePrescriptionsAll patient records are available to health insurers
IT EthicsWhat are the categories of Ethical Failure?
Abuse of position, conflicts of interest, credit card abuse, gambling, gift violations, misuse of resources, morale-welfare and recreation problems, statutory crimes(fraud), knowing about an activity and not reporting it
IT EthicsWhat are the four main issues in ethics?