ITM100

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/155

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

156 Terms

1
New cards

What is telecommunications?

electronic transmission of audio, sound and information through a distance by electromagnetic waves

2
New cards

Convergence

connecting telephone and computer into one

3
New cards

Broadband

contain more data and sends it faster

4
New cards

Major Computer Network Components

client/server, network interfaces, connection medium, hubs/switches

5
New cards

client/server computing

Form of distributed processing in which some machines (servers) perform computing functions for end-user PCs (clients).

6
New cards

Packet Switching

slicing digital networks into packets and sending them through connected networks

7
New cards

Protocol

rules that govern transmission of info between on point to another

8
New cards

TCP/IP

Transmission Control Protocol/Internet Protocol

9
New cards

Modem

a conversion device for digital and analog data

10
New cards

Digital Signal

A system of discrete states: high or low, on or off, 1 or 0.

11
New cards

Analogy signals

continuously changing signals

12
New cards

Bandwidth

difference between the highest and lowest frequencies in a band or set of frequencies

13
New cards

What is the internet?

A worldwide network of interconnected networks

14
New cards

Network Service Providers

Own trunk lines (high-speed backbone networks)

15
New cards

Regional telephone and cable TV companies

Provide regional and local access

16
New cards

Government Bodies duties

makes internet standards

17
New cards

DNS (Domain Name System)

Converts IP address into domains, or identifying labels that use a variety of recognizable naming conventions.

18
New cards

IP address

A number assigned to any item that is connected to the Internet.

19
New cards

Web Server

a computer that delivers requested webpages to your computer or mobile device

20
New cards

Searching for info on the web

search engines, search engine marketing and search engine optimization

21
New cards

What is search engine optimization?

the process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine.

22
New cards

wireless sensor networks (WSNs)

networks of interconnected wireless devices with built-in processing, storage, and radio-frequency sensors and antennas that are embedded into the physical environment to provide measurements of many points over large spaces

23
New cards

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

24
New cards

What is e-commerce?

Conducting business on the internet (buying/selling on the internet)

25
New cards

Technology foundations for eCommerce

wifi connection, wearable devices, smartphones

26
New cards

ubiquity

Internet/Web technology available everywhere: work, home, and so on, anytime

27
New cards

Global reach

the ability to reach anyone connected to the internet anywhere in the world

28
New cards

universal standards

One set of technology standards: Internet standards

29
New cards

Richness

Supports video, audio, and text messages

30
New cards

Interactivity

can interact w/ customers (tech support chat window)

31
New cards

information density

the total amount and quality of information available to all market participants

32
New cards

information asymmetry

situation in which one party is more informed than another because of the possession of private information

33
New cards

menu costs

the costs of changing prices

34
New cards

search costs

the effort required to find suitable products

35
New cards

transaction costs

the expenses of negotiating and executing a deal

36
New cards

dynamic pricing

adjusting prices continually to meet the characteristics and needs of individual customers and situations

37
New cards

Disintermediation

occurs when a business sells directly to the customer online and cuts out the intermediary

38
New cards

Digital Goods

goods that can be delivered over a digital network

39
New cards

Business-to-business (B2B)

applies to businesses buying from and selling to each other over the internet

40
New cards

Business-to-consumer (B2C)

applies to any business that sells its products or services to consumers over the internet

41
New cards

Consumer-to-consumer (C2C)

applies to customers offering goods and services to each other on the internet

42
New cards

long tail marketing

ability of firms to market goods profitably to very small online audiences, largely because of the lower costs of reaching very small market segments

43
New cards

behavorial targeting

the process of following people's behavior and then sending them material tailored to what was learned about them

44
New cards

native targeting

provides new ways to communicate with customers

45
New cards

social shopping sites

Swap shopping ideas with friends (Ex. Pinterest)

46
New cards

Social network marketing

using online social networks to build and strengthen brands

47
New cards

Electronic Data Interchange (EDI)

the computer-to-computer exchange of business documents from a retailer to a vendor and back

48
New cards

M-commerce

the ability to conduct commerce using a mobile device for the purpose of buying or selling goods or services

49
New cards

mission-critical

Systems that must run without failure or with nearly instant recovery from failure or will result in major loss

50
New cards

Why are information systems vulnerable?

have confidential info, trade secrets, info on new products

51
New cards

Software problems

Programming errors, installation errors, unauthorized changes, physical damage

52
New cards

Buffer Overflow

A technique for crashing by sending too much data to the buffer in a computer's memory leaving user with heightened privilege

53
New cards

Computer Crime

any illegal act involving a computer

54
New cards

Computer as target of crime

Breaching confidentiality of protected computerized data

55
New cards

Accessing a computer system without authority

56
New cards

Computer as an Instrument of Crime

theft of trade secrets,

57
New cards

using emails for threats

58
New cards

SSID

The name of a wireless network

59
New cards

War driving

driving around looking for unprotected home or corporate wireless networks and gain access

60
New cards

virus

A piece of code that is capable of and typically has a detrimental effect, such as corrupting the system or destroying data needs a host

61
New cards

Worm

A destructive computer program that bores its way through a computer's files or through a computer's network no active host needed

62
New cards

Trojan Horse

a program that appears desirable but actually contains something harmful

63
New cards

Hackers

People who try to get access to your computer without your permission

64
New cards

Cracker

a hacker with criminal intent

65
New cards

SQL Injection

An attack that targets SQL servers by injecting commands to be manipulated by the database.

66
New cards

Phising

Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

67
New cards

Pharming

Reroutes requests for legitimate websites to false websites

68
New cards

Back door

a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

69
New cards

spoofing

pretending to be someone or something else, normally without permission

70
New cards

sniffing

Eavesdropping on network communications by a third party.

71
New cards

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

72
New cards

Botnets

a set of computers that are penetrated by malicious software known as malware that allows an external agent to control their actions

73
New cards

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

74
New cards

general controls

controls designed to make sure an organization's information system and control environment is stable and well managed

75
New cards

application controls

Controls that apply to the processing of specific computer applications and are part of the computer programs used in the accounting system.

76
New cards

CAPTCHA

prevents software bots

77
New cards

reCAPTCHA

prevents digital books from bots

78
New cards

WEP (Wired Equivalent Privacy)

A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.

79
New cards

WPA2 (Wi-Fi Protected Access 2)

A secure encryption protocol.

80
New cards

risk assessment

the process of measuring risk

81
New cards

security policy

Ranks information risks, identifies acceptable security goals, and identifies mechanisms for achieving these goals

82
New cards

disaster recovery plan

A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

83
New cards

Business Continuity Planning

outlines procedures for keeping an organization operational in the event of a natural disaster or network attack

84
New cards

information systems audit

examines the firm's overall security environment as well as controls governing individual information systems

85
New cards

security audit

An assessment of an organization's security vulnerabilities performed by an accredited network security firm.

86
New cards

Hardware Platform Trends

mobile digital platform, virtualization, green computing, quantum computing, BYOD

87
New cards

BYOD

Bring Your Own Device

88
New cards

Virtualized Computing

Creates multiple "virtual" machines on a single computing device

89
New cards

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

90
New cards

green computing

involves reducing the environmental waste generated when using a computer

91
New cards

Quantum computing

uses the principles of quantum physics to represent data and perform operations on these data

92
New cards

open source software

Software such as Linux that includes its uncompiled source code which can be modified and distributed by programmers

93
New cards

Java

a programming language used to create interactivity on web pages

94
New cards

Python

used to build cloud computing app

95
New cards

HTML

The file format for documents viewed using a browser.

96
New cards

Service-oriented architecture (SOA)

set of self-contained services that communicate with each other to create a working software application

97
New cards

Web Services

Software components that exchange information with one another using universal Web communication standards and languages

98
New cards

XML (Extensible Markup Language)

programming language that uses author-defined tags to identify each data entry so that the data can be easily imported into other applications

99
New cards

3 external sources for software

(1) Software packages and enterprise software

100
New cards

(2) Software outsourcing