Devices (computers, smartphones, servers) that send and receive data over a network.
2
New cards
Routers
Network devices that forward data packets between computer networks.
3
New cards
Links
Physical or wireless connections that transmit data between hosts and network devices.
4
New cards
Packet
A small unit of data transmitted over a network, containing both the payload and control information (such as source and destination addresses).
5
New cards
Packet Switching
A method of data transmission where messages are divided into packets and sent independently over the network, then reassembled at the destination.
6
New cards
IP Address
A logical address assigned to a device on a network, used for identifying devices across different networks.
7
New cards
MAC Address
A physical, unique identifier assigned to a device's network interface card (NIC) that is used within a local network.
8
New cards
Routing Table
A routing table is a data structure in routers that stores paths to various network destinations. It helps determine the best route for forwarding data packets.
9
New cards
Hierarchical addressing
Hierarchical addressing structures network addresses in layers (e.g., country, state, city, street, house number), similar to how a post office sorts mail at multiple levels before final delivery.
10
New cards
Parity Bit, Why it might not work
An extra bit added to data to detect errors by ensuring the number of 1s in a data set is even (even parity) or odd (odd parity). If multiple errors occur, they may cancel each other out, making error detection ineffective.
11
New cards
Congestion in network
Network congestion occurs when too many data packets are sent at once, exceeding the network's capacity and causing delays or packet loss.
12
New cards
Flow Control
Flow control is a mechanism that regulates data transmission speed between sender and receiver to prevent overwhelming the receiving device.
13
New cards
DNS (Domain Name System)
Translates human-readable domain names (e.g., google.com) into IP addresses.
14
New cards
WWW (World Wide Web)
A system of interlinked web pages accessed via the internet using HTTP/HTTPS.
15
New cards
HTTP (Hypertext Transfer Protocol)
A protocol used for transferring web pages between servers and browsers.
16
New cards
Layering of architecture
A design principle in networking where functions are divided into separate layers, each responsible for a specific aspect of communication, allowing modularity and interoperability,
17
New cards
Physical Layer
The lowest layer in the network stack responsible for transmitting raw bits over a physical medium such as cables, radio waves, or fiber optics,
18
New cards
Link Layer
The network layer responsible for local data transfer between directly connected devices, handling error detection, MAC addressing, and framing,
19
New cards
Ethernet
A widely used wired networking technology that defines standards for data transmission and frame formatting in local area networks (LANs),
20
New cards
MAC Addresses
Unique, hardware-embedded addresses assigned to network interface cards (NICs) for device identification within a local network,
21
New cards
Hubs/Switches
Network devices that connect multiple devices in a LAN; hubs broadcast data to all devices, while switches intelligently forward data to specific devices using MAC addresses,
22
New cards
Network Layer
The layer responsible for routing data between networks, determining the best path for packet delivery using IP addresses,
23
New cards
Routing Table
A data structure in routers that stores routes to various network destinations, used to determine the next hop for forwarding packets,
24
New cards
Packet Forwarding
The process of transmitting packets from one network device to another along the best available route toward the destination,
25
New cards
IP Address
Logical numerical addresses assigned to devices for identification and communication across different networks,
26
New cards
Transport Protocols - TCP/UDP
TCP (Transmission Control Protocol) ensures reliable, ordered data delivery with error checking, while UDP (User Datagram Protocol) provides fast, connectionless transmission with minimal overhead,
27
New cards
Statistical Multiplexing
A technique where multiple data streams share a communication channel dynamically based on demand, optimizing bandwidth usage,
28
New cards
Typical Network Topologies (home, ISP, small business, large e-biz)
Different network designs based on scale, including simple router-based networks for homes, more complex infrastructures for ISPs, structured setups for small businesses, and high-availability architectures for large enterprises,
29
New cards
Web Caching
A method of temporarily storing web content on servers or local devices to reduce load times and decrease bandwidth usage by serving previously accessed data instead of retrieving it from the original source,
30
New cards
Antivirus software
A program designed to detect, prevent, and remove malware, including viruses, worms, and other malicious software,
31
New cards
Acceptable use policy (AUP)
A set of rules and guidelines that define appropriate and prohibited behaviors for users of an organization's network and computing resources,
32
New cards
Public key encryption
A cryptographic method that uses a pair of keys (public and private) to secure communication, ensuring confidentiality and authentication,
33
New cards
Ransomware
A type of malware that encrypts a victim's files and demands payment for their decryption, often threatening data loss or exposure,
34
New cards
Risk assessment
The process of identifying, analyzing, and evaluating potential security threats and vulnerabilities to mitigate risks,
35
New cards
(Distributed) Denial-of-service (DoS) attack
A cyberattack that overwhelms a network, server, or website with excessive traffic, disrupting normal operations; in a distributed attack (DDoS), multiple systems are used,
36
New cards
Digital certificates
Electronic credentials issued by a trusted authority to verify the authenticity of websites, organizations, or individuals in online communications,
37
New cards
Click fraud
A type of fraud where automated bots or individuals repeatedly click on online ads to generate illegitimate revenue or drain advertising budgets,
38
New cards
Botnet
A network of compromised computers controlled by a hacker to perform malicious activities such as spam distribution, DDoS attacks, and data theft,
39
New cards
Key loggers
Malicious software or hardware that records keystrokes to capture sensitive information, such as passwords and credit card numbers,
40
New cards
Information systems audit
An examination of an organization's IT infrastructure, policies, and practices to assess security, efficiency, and compliance with regulations,
41
New cards
Intrusion detection systems
Security tools that monitor network traffic for suspicious activities and potential cyber threats, alerting administrators to possible breaches,
42
New cards
Patches
Software updates that fix security vulnerabilities, bugs, or performance issues in an application or operating system,
43
New cards
Controls
Security measures implemented to protect systems, data, and networks from unauthorized access, attacks, and other threats,
44
New cards
Secure Hypertext Transfer Protocol (S-HTTP)
A protocol that enhances HTTP by providing encryption and security features for web communications,
45
New cards
Secure Sockets Layer (SSL)
A cryptographic protocol that secures data transmission over the internet by encrypting communication between web servers and browsers,
46
New cards
Computer virus
A type of malicious software that attaches itself to legitimate programs and spreads by infecting other files, often causing damage or disruption,
47
New cards
Malware
Malicious software designed to harm, exploit, or steal data from computer systems, including viruses, worms, ransomware, and spyware,
48
New cards
Computer worm
A self-replicating malware that spreads across networks by exploiting security vulnerabilities, often causing widespread damage,
49
New cards
Identity Theft
A crime in which someone unlawfully obtains and uses another person's personal information, such as social security numbers or credit card details, for fraudulent purposes,
50
New cards
Encryption
The process of converting data into a coded format to prevent unauthorized access, requiring a decryption key for retrieval,
51
New cards
Firewall
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access,
52
New cards
Spoofing
A cyberattack technique where an attacker disguises their identity by falsifying data, such as email addresses, IP addresses, or websites, to deceive victims,
53
New cards
Spyware
Malicious software that secretly collects a user's data, such as browsing habits, login credentials, and financial information, without their consent,
54
New cards
Token
A security device or digital key used for authentication, often as part of multi-factor authentication to enhance security,
55
New cards
Zero Day vulnerability
A security flaw in software or hardware that is unknown to the vendor and can be exploited by attackers before a patch is developed,
56
New cards
Departmental vs. enterprise
Departmental systems focus on specific functions within a single business unit, while enterprise systems integrate processes across the entire organization for better coordination and efficiency,
57
New cards
MRP
Material Requirements Planning (MRP) is a system for managing manufacturing processes by determining material needs based on production schedules,
58
New cards
Differences between early MRP and modern ERP
Early MRP systems focused solely on manufacturing and inventory control, while modern Enterprise Resource Planning (ERP) integrates broader business functions, including finance, HR, and customer relationship management,
59
New cards
Key features of ERP
Enterprise Resource Planning (ERP) systems are multi-functional, integrated, and modular, allowing businesses to streamline operations across different departments,
60
New cards
Multi-functional, integrated, modular
ERP systems support multiple business functions, integrate data across departments, and allow modular implementation to meet specific organizational needs,
61
New cards
Design around key business processes
ERP systems are structured to optimize core business processes such as procurement, production, sales, and financial management,
62
New cards
Customizable options
ERP solutions can be tailored to fit an organization's unique needs by modifying modules, workflows, and reporting capabilities,
63
New cards
Bullwhip effect
A supply chain phenomenon where small demand fluctuations at the consumer level cause increasing variations in orders and inventory levels upstream, leading to inefficiencies,
64
New cards
Just-in-time
A strategy that minimizes inventory costs by receiving goods only as they are needed for production or sales, reducing waste and storage costs,
65
New cards
Supply Chain Planning Systems
Tools that help businesses optimize supply chain operations, including forecasting, production scheduling, and inventory management,
66
New cards
Push vs. Pull
Push models forecast demand and produce goods in advance, while pull models respond to actual customer demand, minimizing excess inventory,
67
New cards
Sales force automation vs. customer service vs. marketing roles
Sales force automation streamlines sales processes, customer service manages interactions and support, and marketing focuses on outreach and lead generation,
68
New cards
Operational vs. analytical CRM types
Operational CRM focuses on customer-facing processes such as sales and support, while analytical CRM uses data analysis to improve customer relationships and business strategies,
69
New cards
Importance of churn-rate
Churn rate measures the percentage of customers who stop doing business with a company, highlighting customer retention challenges and the need for loyalty strategies,
70
New cards
Service platforms
Integrated technology solutions that support multiple business functions, such as customer relationship management, enterprise resource planning, and e-commerce,
71
New cards
Push vs Pull based Model
A supply chain strategy where push models produce goods based on forecasts, while pull models manufacture or deliver products in response to actual demand,
72
New cards
Bullwhip effect
Demand fluctuations that cause inefficiencies in the supply chain, leading to overproduction or shortages,
73
New cards
Just-in-time strategy
A lean manufacturing approach that reduces inventory waste by receiving supplies only when needed,
74
New cards
Supply chain management
The process of planning, coordinating, and optimizing the flow of goods, services, and information across the supply chain,
75
New cards
Churn rate
The percentage of customers who stop using a company's product or service over a given period, often used to measure customer retention,
76
New cards
Customer lifetime value (CLTV)
A metric that estimates the total revenue a business can expect from a single customer throughout their relationship with the company,
77
New cards
E-Commerce
The buying and selling of goods and services over the internet, using digital technologies for transactions, payments, and marketing,
78
New cards
Differences with traditional commerce
E-commerce operates online with lower overhead costs, broader reach, and faster transactions, while traditional commerce relies on physical stores and face-to-face interactions,
79
New cards
Digital markets
Online platforms that facilitate the exchange of goods and services, reducing inefficiencies in transactions and increasing accessibility,
80
New cards
Reduce
information asymmetry, search costs, transaction costs: Digital markets lower barriers by providing transparent pricing, easier product discovery, and streamlined transactions,
81
New cards
Why is information asymmetry important in markets?
It affects pricing and decision-making; reducing it helps consumers and businesses make better-informed choices, leading to fairer markets,
82
New cards
Enable
dynamic pricing, disintermediation: Digital markets allow real-time price adjustments based on demand (dynamic pricing) and reduce reliance on middlemen (disintermediation),
83
New cards
Digital goods
Products such as software, music, and e-books that can be distributed electronically,
84
New cards
0 or nearly 0 marginal cost
Digital goods can be replicated and delivered at almost no additional cost, unlike physical goods,
85
New cards
Consumer Commerce (B2C)
Business-to-consumer transactions where companies sell products or services directly to end users online,
86
New cards
Business to Business (B2B)
Online transactions between businesses, such as wholesale suppliers selling to retailers,
87
New cards
Interconsumer Commerce (C2C)
Consumer-to-consumer transactions where individuals sell directly to other individuals through platforms like eBay or Facebook Marketplace,
88
New cards
Popular business model categories
Various approaches to e-commerce, including portal/search engine (Google), e-tailer (Amazon), content provider (Netflix), market creator (eBay), transaction broker (PayPal), service provider (Dropbox), and community provider (Facebook),
89
New cards
Revenue models
Different ways e-commerce businesses generate income, including advertising (Google Ads), sales (Amazon), subscriptions (Netflix), free/freemium (Spotify), transaction fees (PayPal), and affiliate marketing (Amazon Associates),
90
New cards
Wisdom of Crowds
The idea that collective decision-making, such as user reviews and ratings, can be more reliable than individual expert opinions,
91
New cards
E-commerce marketing
Strategies used to attract and retain customers in online markets,
92
New cards
Long-tail marketing vs. mass marketing
Long-tail marketing focuses on niche products with lower demand but a broad audience, while mass marketing targets high-demand, mainstream products,
93
New cards
Behavioral targeting
An online advertising strategy that uses consumer data, such as browsing history and purchase behavior, to personalize marketing efforts,
94
New cards
EDI (Electronic Data Interchange)
A system for exchanging business documents electronically in a standardized format, improving efficiency and reducing errors in transactions,
95
New cards
Knowledge management
The process of capturing, organizing, sharing, and applying knowledge within an organization to improve decision-making and efficiency,
96
New cards
CKO and COPs
The Chief Knowledge Officer (CKO) is responsible for managing knowledge resources, while Communities of Practice (COPs) are groups that share expertise and best practices within an organization,
97
New cards
Knowledge Management Value Chain
A framework that describes how knowledge is acquired, stored, disseminated, and applied to create business value,
98
New cards
IS Activities
Acquire, Store, Disseminate, Apply: The core activities of knowledge management, where organizations gather information, store it in databases, share it with relevant users, and apply it to business processes,
99
New cards
Tacit vs. Explicit Knowledge
Tacit knowledge is personal, experience-based, and difficult to document, while explicit knowledge is codified, structured, and easily shared,
100
New cards
Structured, unstructured, and semistructured data
Structured data is organized in databases (e.g., spreadsheets), unstructured data lacks a fixed format (e.g., emails, videos), and semistructured data has some organization but is not strictly formatted (e.g., JSON, XML),