What computer language can almost every other computer language trace their ancestry to?
NETWORKWhat networking topology do we use today and what are it’s features?
Star: Allows for multiple computer conversations, easy to add workstations, and centralized control.
NETWORKWhat is a packet?
Small electronic messages that contain a header(where its going and where it came from) and data(actual payload).
NETWORKWhat is a hub, switch and router?
Hub: Connects at the physical layer. Makes a physical hardwired connection. Only one computer can talk at a time.
Switch: Connect at the link level. Recognizes MAC addresses. Has internal data table listing which computer is at which port for faster switching. From internal circuits between machines, uses in star architectures. Router:Connect at the network layer. Recognizes IP addresses and network domains. Acts as an international border guard.
Best services for writing your paper according to Trustpilot
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team
Checks packet destinations, keeps internal packets in and ROUTES external packets.
NETWORKWhat four steps are needed in the HTTP protocol?
NETWORKHow is DSL physically different from cable or fiber?
DSL needs to use the telephone lines so a phone is needed. Cable is being used with the cable line so no phone is needed, yet, a cable modem is needed. Fiber uses light modified light to transmit data.
SECURITYWhat are exploits?
Code that takes advantage of a software bug, glitch or computer vulnerability.
System security is compromised.
SECURITYWhat is a difference between a worm and virus?
Worm: a self-replicating computer program that sends copies of itself to other systems. Worms can destroy files, turn your computer into a Botnet zombie, open up your computer for illegal file sharing, make your computer send span emails and use your computer as a platform to hack into other systems.Virus(virii): Requires a host to attach itself.
Could be a file or in your BIOS. A virus can only spread from computer to another when its host is taken to the uninfected computer.
SECURITYWhat is DDOS?
Distributed Denial of Service- when multiple computers are working together to knock an opposing computer offline. Usually this is a coordinated effort by a botnet army.
SECURITYWhat is malware?
Malware is a general class of software that damages computer systems without consent. Has a variety of hostile, intrusive or annoying software. Bases on the perceived intent of the creator.
SECURITYWhat is the difference between black and white hats?
Two major classes of hackers. White hat: intending to improve security. Black hat: someone violating computer or internet security and do illegal activity.
SECURITYWhat are the three elements to two-factor authentication?
Something you have, something you are, something you know.
SECURITYWhat is spoofing?
Someone imitates your computer to gain access.
SECURITYWhat is a zero-day exploit?
Exploits that do not have patches yet.
SECURITYWhat is a firewall?
Can be hardware of software based. Designed to set up barriers to external worms, virii and hackers.
SECURITYWhat is a honeypot?
Decoy detection equipment.
BUSINESS CONTINUITYWhat is business continuity?
The ability to continue business in the face of disaster.
BUSINESS CONTINUITYWhat are the three approaches to handling risk?
Monitor, manage and implement.
BUSINESS CONTINUITYHow is each facet of the IT triad impacted by risk?
People: Risk of losing people, or having people who with bad intentions. Cost to keep and maintain. Technology:Risk of failure or shutdown.
Risk of changing technology and not being able to keep up. Process: Risk of process not being implemented or falling short of expectations.
BUSINESS CONTINUITYWhat steps should businesses take to prepare for disasters?
Monitoring and managing the risk. Then having a plan an implementing is. Making sure the plan has been through tests of course.
ecommerceWhat is the difference between eBusiness and ecommerce?
All business activity on a network (usually using internet technology and standards)->More than just buying and selling.ecommerce: Buying, selling, service.
ecommerceWhat are the three dimensions of ecommerce?
Physical(traditional), Mix of physical and online(Hybrid), and All online(pure electronic).
ecommerce?Define in-house, joint venture, and spin off?
In-house: complete integration, share info.Joint venture/partnerships: Independent companies share syneries.Spin-off: Complete separation. Such as brick and Mortar…
this is the most common in early days of ecommerce.
Founded by Steve Jobs in 1976 with Steve Wozniak and Ronald Wayne. Apple builds hardware, software and consumer electronics.
Jeff Bezos founded 1994.
Wrote business plan on a drive between New York and Seattle.
Who’s WhoCisco Systems?
Founded by Len Bosack and Sandy Lerner at Stanford. Current CEO is John Chambers.
Founded by current CEO Michael Dell. Steady feud with Apple.
Founded by Pierre Omidyar. Current CEO is John Donahoe.
CEO Terry Gou. Famous for labor camps. Makes iAnything, Xbox, playstation, kindle, Wii U.
CEO Larry Page.
Founded by Page and Sergey Brin
Found by Bill Hewlett and David Packard. Current CEO is Meg Whitman
Founded in 1898 by Herman Hollerith. CEO is Virginia Rometty. She was in charge of jeopardy game before IBM.
CEO Bria Krzanich.
Founded in 1975. CEO is Satya Nadella. Founded by Bill Gates and Paul Allen.
CEO Larry Ellison. Steve Jobs was his photographer in his 4th wedding. Ellison also founded company in 1977.
IT StrategyWhat are the five forces in Porter’s Competitive Forces Model?
Threat of new competitors, bargaining power of suppliers, bargaining power of customers, threat of substitute products or services, rivalry among existing firms.
IT StrategyWhat is the focus of the value chain?
Views an organization as a series, chain, or network of activities that add value to its products and services.
IT StrategyCan you identify each part of a PEST analysis?
IT StrategyWhat are some IT considerations when expanding your business?
Local- How to hold data, cost-savings by eliminating duplicationNational- Different state laws, Tax considerations.Global- Same as all the above, standards, privacy and sharing laws, currency controls.
IT PlanningWhat are the reasons for planning?
Structure, framework, set of procedures, content, assumptions. The future can be anticipated???
IT Planningwhat are the five organizational styles?
IT LawsWhat are intellectual property, copyright and patents?
Patents protect ideas for specific time, 20 yrs, depends on industry.Copyright: exclusive right. Life +70 years.Intellectual: original idea, work of art.
IT LawsWhat is the Fair Use Doctrine?
Legal concept of limitations to copyright infringementYou may make copies of copyrighted material for the purposes ofCriticism, comment, news reporting, teaching, scholarship, research or personal useUnder the Fair Use Doctrine, you can make backup copies of copyrighted material (CDs, DVDs) provided they are for your own use
It LawsWhat is DMCA?
Digital Millennium Copyright Act
IT LawsImportant Cases?
Viacom vs, YouTube (2013 Federal Appeals ruling) †YouTube was found with tens of thousands of TV showsYouTube is not liable for infringing tv shows, provided they comply with takedown notices (Safe Harbor provision)MPAA vs. RealNetworks (2009 Federal District ruling)RealNetworks built a software to backup DVDsPrograms engaging in Fair Use cannot circumvent DMCA access control measuresVernor vs.
AutoDesk (2010 Federal Appeals ruling, Final)Vernor found an unopened copy of AutoCad at a garage sale and attempted to sell it on eBayLicenses can forbid and severely restrict transfer or resaleConflict???Kirtsaeng vs. Wiley (2013 Supreme Court)???UsedSoft vs Oracle (2012 EU High Court)???Lenz vs. Universal (2010 Federal District ruling) †Video of a baby dancing to Prince musicRights holders must consider Fair Use before issuing takedowns
IT LawsWhat is an IP Troll?
Businesses whose only function is to profit from IP lawsuits.
FISA – Foreign Intelligence Surveillance Act (1978)Establishes standards and procedures to collect intelligence on foreign entities within the United StatesDisallows domestic spying without special warrantsHIPAA – Health Insurance Portability and Accountability Act (1996)Hierarchies of access control to healthcare informationData backups of 100% reliabilityForms and releases must be scanned, saved and availableSOX – Sarbanes-Oxley Act (2002)All business records, including electronic business records and electronic messages, must be saved for not less than 5 yearsPhone calls, emails, IMs, work files, memos, letters, everythingPatient Protection & Affordable Care Act (2010)Healthcare Information Technology (HIT) requirementsAll medical records are held electronicallyAll scripts must be ePrescriptionsAll patient records are available to health insurers
IT EthicsWhat are the categories of Ethical Failure?
Abuse of position, conflicts of interest, credit card abuse, gambling, gift violations, misuse of resources, morale-welfare and recreation problems, statutory crimes(fraud), knowing about an activity and not reporting it