IDSC 3001 Topics 7 and 8

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/100

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:40 PM on 3/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

101 Terms

1
New cards

Computing Hardware

physical components of information technology, which includes the computer and peripherals (storage devices, input devices, output devices)

2
New cards

Software

computer program or collection of programs. Precise set of instructions that tells hardware what to do

3
New cards

Hardware/Software Layer Cake (Stack)

- User

- Application

- Operating System

- Hardware

4
New cards

Operating System (OS)

controls the computer hardware. Provides a common set of controls for managing computer hardware.

- Makes it easier for users to interact with computers and for programmers to write application software.

- Graphical user interface items are displayed on the hardware of the computer display.

- Files are saved to the hardware of a hard drive or other storage device.

- Most include control panels, desktop file management, and other support programs to work directly with hardware elements.

- Designed to give programmers a common set of commands with which to consistently interact with the hardware.

5
New cards

Graphical User Interface (GUI)

visual items that appear on the hardware of a computer display.

- Ex: scroll bars, menus

6
New cards

Firmware

software stored on nonvolatile memory chips

7
New cards

Volatile Memory

loses data when power is off

8
New cards

Nonvolatile Memory

retains data even when power is turned off

9
New cards

Embedded Systems

special-purpose software designed and included inside physical products.

- As computing gets cheaper, special-purpose technology is increasingly becoming _____________ into all sorts of devices (i.e. cars, picture frames, aircraft engines, photocopiers, and heating and A/C systems)

10
New cards

Distributed Computing

a form of computing where systems in different locations communicate and collaborate to complete a task.

11
New cards

Server

program that fulfills the requests of a client.

- Hardware context: computer that has been configured to support requests from other computers.

- Software context: program that fulfills requests.

12
New cards

Client

software program that makes requests of a server program.

- a user's laptop, phone, desktop, typically using Windows or iOS

13
New cards

Architecture

process of development of methodical technology specifications, models, and guidelines.

14
New cards

Platform

a common technology term that is used for a variety of computing environments, standards, and marketplaces. Products and services that allow for the development and integration of software products and other complementary goods.

- Not all created equal.

- Very different in how they create network effects, interactions they enable, do you build the demand side first or the supply side, openness levels, growth dynamics, competitive strategies and monetization method.

- Building a successful ________ is more about making the right trade-offs than it is about best technology.

- Ex: Windows, the iPhone, the Wii, and the standards that allow users to create Facebook apps

15
New cards

Operability

systems run as designed and are relatively simple to operate

16
New cards

Usability

systems are intuitive and user-friendly

17
New cards

Availability

system down time is minimized

18
New cards

Flexibility and Maintainability

systems can be improved in a cost-effective manner

19
New cards

Scalability and Performance

systems can grow and expand

20
New cards

Interoperability and Portability

systems can run in multiple environments

21
New cards

Security

systems are protected and safe

22
New cards

Enterprise Architecture (EA) Framework

numerous technology decisions need to be made to make an organization's systems work together. Business functions and technology require a plan, guidance

- The plan looks like a pyramid with the Business function / requirements at the top, providing direction for key tech decisions.

- Built upon a variety of different technologies (hardware, networks, devices)

<p>numerous technology decisions need to be made to make an organization's systems work together. Business functions and technology require a plan, guidance</p><p>- The plan looks like a pyramid with the Business function / requirements at the top, providing direction for key tech decisions.</p><p>- Built upon a variety of different technologies (hardware, networks, devices)</p>
23
New cards

Enterprise Architecture Methodology

Current State (as-is) --> Target State (should be) --> Roadmap (how to, what to)

24
New cards

Technical Standard

a set of requirements for repeatable designs or task, using rules, conditions, or guidelines.

- A key component of strong Quality Management

25
New cards

Types of Standards

- Hardware

- Communication

- Data

- Security

- Software

- Design

26
New cards

Tangible Value of Standards

- Increases Interoperability

- Improves reliability

- Aids in regulatory compliance

- Reduces risk

- Lowers complexity and cost

27
New cards

Application Server

software that houses business logic for use (and reuse) by multiple applications.

28
New cards

Database Server

software that manages database management software and provides for access and storage of data

29
New cards

Web Services

small pieces of code that are accessed via the application server that permit interoperable machine-to-machine interaction over a network.

- Run on web servers

30
New cards

Application Programming Interface (API)

programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data.

31
New cards

Service-Oriented Architecture (SOA)

set of Web services built around an organization's processes and procedures.

32
New cards

LAMP Stack

Linux based web servers consist of four software components, arranged in layers supporting one another. Websites and Web Applications run on top of this underlying stack (Client).

- Linux

- Apache

- MySQL

- PHP

33
New cards

Internet Service Provider (ISP)

organization or firm that provides access to the internet. ___________ connect to one another, exchanging traffic and ensuring that messages can get to any other computer that's online and willing to communicate

- Ex: Verizon, Comcast, AT&T

34
New cards

Redundant and Fault-Tolerant

if one network, connecting wire, or server stops working, everything else should keep running.

- The Internet was designed this way

35
New cards

Internet

is a network of networks, and these networks are connected.

36
New cards

URL (Uniform Resource Locator)

identifies resources on the Internet along with the application protocol needed to retrieve it.

- Often used interchangeably with "Web address."

- Consists of:

- Application Transfer Protocol

- Host Name

- Domain Name

- Top-Level Domain

- Path

- File

37
New cards

HTTP (Hypertext Transfer Protocol)

application transfer protocol that allows Web browsers and Web servers to communicate with each other.

38
New cards

HTML (Hypertext Markup Language)

language used to compose Web pages.

39
New cards

Protocol

enables communication by defining the format of data and rules for exchange.

40
New cards

SMTP (Simple Mail Transfer Protocol)

a server to hold e-mail.

41
New cards

FTP (File Transfer Protocol)

application transfer protocol that is used to copy files from one computer to another.

42
New cards

Case-Sensitive Parts of a Web Address

- Path

- File

43
New cards

Non-Case-Sensitive Parts of a Web Address

- Application Transport Protocol

- Host Name

- Domain Name

- Top-Level Domain

44
New cards

Application Transport Protocol

- NOT case sensitive

- Ex: HTTPS, FTP, SMTP

45
New cards

Host Name

the computer you're looking for on a network.

- NOT case sensitive

- Assigning several computers to a ____ ____ helps ensure that all visits to a popular site like https://www.google.com won't overload a single computer.

- It is also possible for a single computer to have several ____ _____.

46
New cards

Domain Name

the name of the network you're trying to connect to (usually represents an organization).

- NOT case sensitive

- Some __________ are further broken down into sub__________, many times to represent smaller networks or subgroups within a larger organization.

47
New cards

Top-Level Domain

- NOT case sensitive

48
New cards

Path

maps to a folder location where the file is stored on the server

- Case sensitive

49
New cards

File

the name of the ____ you're looking for

- Case sensitive

50
New cards

SSL (Secure Sockets Layer)

a security standard that creates an encrypted link between a Web server and a browser.

- websites that use ___ will begin with https (note the 's' at the end).

51
New cards

Load Balancing

distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.

52
New cards

Fault Tolerance

systems that are capable of continuing operation even if a component fails.

53
New cards

Domain Name Registrar

firms that individuals pay for the rights to use a certain domain name. The right is renewable over time

- Some simply register domain names while others are able to run a website on their Internet-connected servers for a fee (web hosting service).

54
New cards

Web Hosting Services

a firm that provides hardware and servers to run the websites of others.

55
New cards

ICANN (Internet Corporation for Assigning Names and Numbers)

a nonprofit governance and standards-setting body that accredits registrars throughout the world. Responsible for managing the Internet's domain and numbering systems.

56
New cards

Generic Top-Level Domain (gTLD)

top-level domains such as .com, .net, or .org.

57
New cards

Sponsored Top-Level Domain (sTLD)

sponsored top-level domains run by private agencies or organizations with established rules restricting the eligibility of registrants

- Ex: only those in the aerospace industry can use .aero

- Ex: only education institutions have access to .edu.

58
New cards

Country Code Top-Level Domain (ccTLD)

two-character top-level domains that represent countries.

59
New cards

Geographic Top-Level Domain (GeoTLDs)

top-level domains that are not two-level country codes, but that are associated with a geographical, geopolitical, ethnic, linguistic, or cultural community.

- Ex: .cat (for Catalan), .paris, and .asia.

60
New cards

Cybersquatting

acquiring a domain name that refers to a firm, individual, product, or trademark, with the goal of exploiting it for financial gain. The practice is illegal in many nations, and ICANN has a dispute resolution mechanism that in some circumstances can strip people of registered domains.

61
New cards

404 Error

an error that occurs when you mistype the path and file of a URL (i.e. by using incorrect case)

62
New cards

IP Address

value used to identify a device that is connected to the Internet. Can be used to:

- Identify a user's physical location.

- Tailor search results.

- Customize advertising.

63
New cards

IPv4

the widely-used IP address format. Expressed as four numbers (from 0-255), separated by periods

- Ex: 216.3.128.12

64
New cards

NAT (Network Address Translation)

conserves IP addresses by mapping devices on a private network to single Internet-connected devices that acts on their behalf.

- Helps delay the impact of the IP address drought but slows down Internet access and is complex, cumbersome, and expensive to administer

65
New cards

IPv6

increases the possible address space from the addresses used in the current system.

- Not backward compatible with IPv4 and transition has been very slow.

•When ____ is deployed, some of the benefits may include potentially improving speed, reliability, and security of the internet.

66
New cards

Domain Name Service (DNS)

Internet directory service that allows devices and services to be named and discoverable. Distributed database that looks up host and domain names and returns the actual IP address for them.

- Likened to a big, hierarchical set of phone books capable of finding Web and email servers and more.

- Nameservers that work together can get you anywhere you need to go online.

- The system also remembers what's it's done so next time your computer can pull this out of cache

67
New cards

Nameservers

similar to phonebooks that can find Web and email servers, and more.

- When they work together to create the DNS, they can get you anywhere you need to go online

68
New cards

Cache

temporary storage space used to speed computing tasks.

69
New cards

Governance, Regulation, and Compliance (GRC)

governments, partnerships, imposed standards, and industry standards oversee and control the data that an organization collects, stores, and uses.

- Main goal of ensuring transparency

- Increasingly complex and rigorous burden

- Tech plays a vital role: ___ systems can assess risk against a particular objective, and can increase visibility of compliance efforts.

- There must be a central function that can aggregate _______________ information

- Management of policies must happen locally

- Execution needs to be owned by the business

- People are as important as the process

70
New cards

Reasons for Implementing GRC Programs

- Regulatory requirements

- Monetary risks and / or reputation risks

71
New cards

Regulations

- data retention,

- protecting confidential information

- financial accountability

- disasters recovery

72
New cards

Horizontal (Cross-Industry) Obligations

financial reporting, labor laws, data privacy that spans industries

73
New cards

Vertical Obligations

regulatory requirements for food, medical devices, higher education, etc.

- Industry-specific

74
New cards

Contractual Obligations

obligations to business partners, supply chain, outsourcers, service providers, and contractors.

75
New cards

Strategic Objectives

maintaining visibility and control so that the organization can meet business objectives.

76
New cards

Pros of GRC

- Provides Transparency for Shareholders

- Create a high barrier entry for new competitors

- Discourages current competitors from 'cheating'

77
New cards

Cons of GRC

- Expensive and Time Consuming

- Can Limit Innovation & Risk Taking

- Risk of Fines and Penalties

78
New cards

Corporate Governance

the set of processes, policies, laws, customs, and rules affecting the way a corporation is directed, managed and controlled.

- Board of Directors and Delegation of Authority

- ____________ has a "top-down" component.

79
New cards

Board of Directors

play a key role in overseeing, administering, and monitoring a company.

- Part of corporate governance

80
New cards

Delegation of Authority

the accountability of individuals in an organization through information systems.

- Part of corporate governance

81
New cards

IT Governance

provides structure around how organizations align IT strategy with business strategy.

- Enterprise-wide visibility for compliance

- Monitoring all existing processes is a daunting task

- Requires access to numerous information systems and timely reporting

- Involves IT systems

- ____________ has a "bottom-up" component.

82
New cards

IT Systems

when implemented properly, helps companies increase visibility into the effectiveness of compliance efforts.

- poorly designed __ _______ leaves companies vulnerable to a variety of potential issues.

83
New cards

Environmental, Social, and Governance Software (ESG)

- Environmental (Sustainability & Carbon Management, Hazardous substances, Waste Recycling, Water Use)

- Social (DEI, labor practices, health and safety)

- Governance (Enterprise Risk Management, Compliance Management, Vendor Risk Management)

84
New cards

Principles

outcome-focused direction for decision making (e.g., Hiring ____________)

- Very strategic and high risk

85
New cards

Policies

formal guidelines (e.g., Travel Expense ______)

- Strategic and risky

86
New cards

Standards

methods and resources provided to support policy (e.g., ISO 9001 ___________)

- In between strategic and tactical

- Moderate risk

87
New cards

Procedures

detailed directions on how policies should be followed (e.g., _________ to file for Travel Reimbursement)

- Tactical and not very risky

88
New cards

Guidelines

informal suggested practices (e.g., Social Media _________)

- Very tactical and low risk

89
New cards

Examples of Audits

- Internal Financial Audit

- External Financial Audit

- Tax Audit

- Operational Audit

- Compliance Audit

- Information System Audit

- Payroll Audit

90
New cards

Examples of Controls

- Log-in Credentials

- Approvals

- Legal review of Contracts

- Spending Authority & Spending Limits

- Segregation of Duties

- Account Reconciliation

91
New cards

Sarbanes-Oxley Act (SOX)

mandates a strong internal control environment, including the electronic data needed to prove it. Aims to enforce corporate governance and strengthen corporate accountability by:

- internal checks and balances

- levels of approval and sign-off

- full transparency

- adequate controls

- supported by enterprise applications (ERP, CRM, SCM)

- All data (emails, communications, files, directives and requests) that may be relevant to lawsuits must be produced and thus it must be archived.

92
New cards

Health Insurance Portability and Accountability Act (HIPAA)

imposed tough data privacy and protection for any businesses related to health care.

93
New cards

Basel IV

introduces changes that limit the reduction in capital, a standardized floor for capital requirement, requiring banks to meet higher maximum leverage ratios.

94
New cards

PCI Standards

council that offers comprehensive standards to enhance payment card data security.

95
New cards

Biggest IT Compliance Challenges

- Employees

- Mobile Devices

- Third Parties

- Cloud Service Providers

96
New cards

GDPR (General Data Protection Regulation)

the EU's new privacy law as of 2018. 87 pages long and contains 99 articles, is still the "most complex piece of regulation the EU has ever produced". Privacy is considered a fundamental human right, this is an attempt to put individuals back in charge.

- Concern is that it would make collecting and handling personal information prohibitively complicated.

- Personal data can be even harder to pin down than money and financial products.

- Many questions had to be addressed: How should data be collected? Who should have access? What can be done with them? Who should ultimately be in control of them?

- Consent to collect and use personal data now has to be "unambiguous" and for "specific" purposes.

- People can demand a copy of the data held on them, ask for information to be deleted (the "right to be forgotten").

- Data transferred to another service ("data portability").

- Fines up to $24 M or 4% of global annual sales, whichever is greater.

- Controversy over extraterritorial reach. It will apply not just in the EU, but wherever personal data about European citizens are processed.

97
New cards

EDI (Electronic Data Interchange)

a set of standards for exchanging messages containing formatted data between computer applications.

98
New cards

XML (Extensible Markup Language)

a tagging language that can be used to identify data fields made available for use by other applications. Most APIs and Web services send messages where the data exchanged is wrapped in identifying ___ tags.

99
New cards

JSON (JavaScript Object Notation)

a popular data interchange format. A technology standard often used to format data when being sent or received via APIs.

<p>a popular data interchange format. A technology standard often used to format data when being sent or received via APIs.</p>
100
New cards

Governance

the process to monitor and control an organization's information technology and systems. Involves use, security, responsibility, enforcement, penalties, ethics, and audit, among other areas.

Explore top flashcards

flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)
flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)