Business informatics Flashcards

1
Q

What is a communication protocol?

A

Set of rules that governs data communication and are required to exchange messages in and between computing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do we need com. protocols?

A

To create consistency & universality for sending & receiving messages. Examples: File transfer protocol (FTP); TCP/IP; Hypertext Transfer Protocol (HTTP); SIMPLE MAIL TRANSFER (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocols can address properties as?

A

Transmission Speed, Flow control, Product size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is LAN tech. other than ethernet and token ring?

A

Asynchronous Transfer Mode (ATM) goal of transporting real-time voice, video, text, graphics & offers full array of network service
Fiber Distribution Data Interface (FDDI) : Dual ring network using a token scheme with many similarities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weak points of TCP/IP

A

Fail to represent any other protocol stock than TCP/IP suitable = not generic (Cannot describe Bluetooth)
Originally designed and implemented for WAN and not for LAN/PAN
Hackers can gain access to the source path of information and modify route options. Further TCP Blindspooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Quantum Computing

A

Excels all types of problem solving, but requires rethinking of current software systems. Based on QUBITS= Has many more states than 0/1s, contains an infinite amount of information. Follows mores law.

Can improve solar panels, drug discovery and computing power

Could trim computing times- therefore provide huge cuts in costs of cloud services or big data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is vulnerability?

A

The inability to withstand the effects of a hostile environment. Weaknesses in software/hardware being exposed to harmful intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is system vulnerability?

A

Weakness in the system which can be exploited by a threat –> attackers that gain access to a system and cross privilege boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are sources for system vulnerabilities?

A

Design flaws, Poor security mgmt, social engineering, incorrect implementation, internet vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Best ways to identify system vulnerabilities?

A

Penetration Test: Companies authorize/ hire hackers to infiltrate their system and therefore expose potential weaknesses/ vulnerabilities.

Audits: Often consultants, create a detailed report of all security issues -> bird’s eye view

Software solutions: continuous security monitoring. use of software security tools -> vulnerability scans network in the search for weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is innovative misuse?

A

Tech trends that introduce new methods and ideas to corrupt/ misuse new technologies like Smart home devices, facial recognition, AI Cloning.
e.g. fully automated attack technology through the use of ML tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What role does it play in the search for solutions? (innovative Misuse)

A

users dependent on the internet, used for many crucial applications therefore one minor attack has the potential to cause huge damage. Further increased time to discover and analyze attack mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is incomplete implementation?

A

Often the result of incompatible interfaces. 2 products can only be deployed and work together if they are compatible. That means modules must be additive.

Vast number of variables (hardware/software) = not possible to test all combinations and the budget for IT transformation is often insufficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is social engineering?

A

Hackers use manipulation and psychological tricks to gain access to computer systems, to receive passwords , personal information etc. of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is it such a big issue (social engineering)

A

Users have become increasingly dependent on the internet, using it for almost every critical application.

Further, the enormous growth of the internet leads to millions of vulnerable computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are design flaws such a big issue?

A

Design flaws are the biggest problems in system security vulnerability due to the high potential.

It is not easy to describe because it is a combination of things.

Sources that contribute to design flaws are Human factors, software complexity, trustworthy software sources.

Further, the growth of the internet lead the escalating cost of software production and the marketplace is used as a giant testing lab.

Or a mismatch between reused requirements specifications and design -> might not match current situation.

17
Q

What is a computer language?

A

Formal language used to express calculation rules for being executed by the computer and implement algorithms.

18
Q

Difference between High & Low level language?

A

High Level(Python; java): Close to human language, needs to be compiled into machine code by translator, is platform & computer independent.

Low level: Made up by binary characters, only language computer can understand, difficult for humans to comprehend.

19
Q

Which computer language is the best?

A

Every language was developed with its own purpose and suited for certain things. Some languages are very popular like Java, C++, Python and used by big tech companies and start ups. Others for the training of students etc.

20
Q

Where is Python used today?

A

Web development: Python is known for code readability. Has a large and comprehensive set of modules, packages and libraries that exist beyond standard libraries.
It is further used in machine learning and big data. Her et is used for projects that involve sentiment analysis.

21
Q

What is a virtual switching element?

A

It connects networking components, a software application that allows communication between virtual machines, forwards data packages and intelligently directs communication on a network.

22
Q

Why should businesses opt to virtualize computing resources?

A

Because it contributes to the conservation of energy because no hardware/software used, helps to neglect cooling cost of data center, reduces cost of utility.

Increases uptime because it makes use of resources to the max.
Saving costs, because it doesn’t require any hardware components, no investment involved to create on site resources / any separate areas of space.

Efficiency- allows automatic updates to hardware and software, reduction in resource mgmt

23
Q

Cons of virtualisation?

A

Implementation costs are high although concept is highly cost effective.

limitations, not every server/app is virtualisation compatible -> hybrid system necessary.

Security, server managed by third party provider

Availability, virtualisation servers might go offline results un dependency on third party provider.

24
Q

differences between dig and quantum tech.

A

Dig: bit consists of binary system (0/1s) 2 states represented by transistors switch which is either turned “off” or “on”

Quantum: Relies on quantum mechanics, therefore more states than only 0 & 1s based on superposition. Info of qubit must be extracted by measurement probability of each outcome depending on “latitude”

25
Q

Moores law

A

Number of components on integrated circuit double every 1,5 years

Variations: 2 times as many transistors
2 times as much switching speed in transistors
2 times as much memory on a chip

26
Q

Current trends in semiconducter industry=?

A

Companies are opting for increasingly specialized processor from other companies or design their own.

Intel acquired nervana systems to lay the groundwork for general infrastructure additionally Movidious to gain high performance systems on chip platform

27
Q

Natural language processing examples?

A
Information retrieval 
Sentiment analysis
Data analysis 
Question answering
GPT-3 = autoregressive language model using deep learning 
information extraction
28
Q

Give examples of ML tech/ school of thoughts

A
Connectionists,
Artifical explainable intelligence, 
gamified learning and education
High fidelity simulations 
predictive learners
Recommendation engines
29
Q

open source tech/ libraries?

A

Ocean
Tensor flow = open source Ml network (google)
Scikit-team= ML in python
Microsoft cognitive toolkit= commercial grade toolkit that trains DL algorithms to learn like human brain