Business informatics Flashcards
What is a communication protocol?
Set of rules that governs data communication and are required to exchange messages in and between computing systems.
Why do we need com. protocols?
To create consistency & universality for sending & receiving messages. Examples: File transfer protocol (FTP); TCP/IP; Hypertext Transfer Protocol (HTTP); SIMPLE MAIL TRANSFER (SMTP)
Protocols can address properties as?
Transmission Speed, Flow control, Product size
What is LAN tech. other than ethernet and token ring?
Asynchronous Transfer Mode (ATM) goal of transporting real-time voice, video, text, graphics & offers full array of network service
Fiber Distribution Data Interface (FDDI) : Dual ring network using a token scheme with many similarities
Weak points of TCP/IP
Fail to represent any other protocol stock than TCP/IP suitable = not generic (Cannot describe Bluetooth)
Originally designed and implemented for WAN and not for LAN/PAN
Hackers can gain access to the source path of information and modify route options. Further TCP Blindspooting
Quantum Computing
Excels all types of problem solving, but requires rethinking of current software systems. Based on QUBITS= Has many more states than 0/1s, contains an infinite amount of information. Follows mores law.
Can improve solar panels, drug discovery and computing power
Could trim computing times- therefore provide huge cuts in costs of cloud services or big data
What is vulnerability?
The inability to withstand the effects of a hostile environment. Weaknesses in software/hardware being exposed to harmful intruders.
What is system vulnerability?
Weakness in the system which can be exploited by a threat –> attackers that gain access to a system and cross privilege boundaries.
What are sources for system vulnerabilities?
Design flaws, Poor security mgmt, social engineering, incorrect implementation, internet vulnerability
Best ways to identify system vulnerabilities?
Penetration Test: Companies authorize/ hire hackers to infiltrate their system and therefore expose potential weaknesses/ vulnerabilities.
Audits: Often consultants, create a detailed report of all security issues -> bird’s eye view
Software solutions: continuous security monitoring. use of software security tools -> vulnerability scans network in the search for weaknesses
What is innovative misuse?
Tech trends that introduce new methods and ideas to corrupt/ misuse new technologies like Smart home devices, facial recognition, AI Cloning.
e.g. fully automated attack technology through the use of ML tech.
What role does it play in the search for solutions? (innovative Misuse)
users dependent on the internet, used for many crucial applications therefore one minor attack has the potential to cause huge damage. Further increased time to discover and analyze attack mechanisms
What is incomplete implementation?
Often the result of incompatible interfaces. 2 products can only be deployed and work together if they are compatible. That means modules must be additive.
Vast number of variables (hardware/software) = not possible to test all combinations and the budget for IT transformation is often insufficient
What is social engineering?
Hackers use manipulation and psychological tricks to gain access to computer systems, to receive passwords , personal information etc. of individuals
Why is it such a big issue (social engineering)
Users have become increasingly dependent on the internet, using it for almost every critical application.
Further, the enormous growth of the internet leads to millions of vulnerable computers.
Why are design flaws such a big issue?
Design flaws are the biggest problems in system security vulnerability due to the high potential.
It is not easy to describe because it is a combination of things.
Sources that contribute to design flaws are Human factors, software complexity, trustworthy software sources.
Further, the growth of the internet lead the escalating cost of software production and the marketplace is used as a giant testing lab.
Or a mismatch between reused requirements specifications and design -> might not match current situation.
What is a computer language?
Formal language used to express calculation rules for being executed by the computer and implement algorithms.
Difference between High & Low level language?
High Level(Python; java): Close to human language, needs to be compiled into machine code by translator, is platform & computer independent.
Low level: Made up by binary characters, only language computer can understand, difficult for humans to comprehend.
Which computer language is the best?
Every language was developed with its own purpose and suited for certain things. Some languages are very popular like Java, C++, Python and used by big tech companies and start ups. Others for the training of students etc.
Where is Python used today?
Web development: Python is known for code readability. Has a large and comprehensive set of modules, packages and libraries that exist beyond standard libraries.
It is further used in machine learning and big data. Her et is used for projects that involve sentiment analysis.
What is a virtual switching element?
It connects networking components, a software application that allows communication between virtual machines, forwards data packages and intelligently directs communication on a network.
Why should businesses opt to virtualize computing resources?
Because it contributes to the conservation of energy because no hardware/software used, helps to neglect cooling cost of data center, reduces cost of utility.
Increases uptime because it makes use of resources to the max.
Saving costs, because it doesn’t require any hardware components, no investment involved to create on site resources / any separate areas of space.
Efficiency- allows automatic updates to hardware and software, reduction in resource mgmt
Cons of virtualisation?
Implementation costs are high although concept is highly cost effective.
limitations, not every server/app is virtualisation compatible -> hybrid system necessary.
Security, server managed by third party provider
Availability, virtualisation servers might go offline results un dependency on third party provider.
differences between dig and quantum tech.
Dig: bit consists of binary system (0/1s) 2 states represented by transistors switch which is either turned “off” or “on”
Quantum: Relies on quantum mechanics, therefore more states than only 0 & 1s based on superposition. Info of qubit must be extracted by measurement probability of each outcome depending on “latitude”
Moores law
Number of components on integrated circuit double every 1,5 years
Variations: 2 times as many transistors
2 times as much switching speed in transistors
2 times as much memory on a chip
Current trends in semiconducter industry=?
Companies are opting for increasingly specialized processor from other companies or design their own.
Intel acquired nervana systems to lay the groundwork for general infrastructure additionally Movidious to gain high performance systems on chip platform
Natural language processing examples?
Information retrieval Sentiment analysis Data analysis Question answering GPT-3 = autoregressive language model using deep learning information extraction
Give examples of ML tech/ school of thoughts
Connectionists, Artifical explainable intelligence, gamified learning and education High fidelity simulations predictive learners Recommendation engines
open source tech/ libraries?
Ocean
Tensor flow = open source Ml network (google)
Scikit-team= ML in python
Microsoft cognitive toolkit= commercial grade toolkit that trains DL algorithms to learn like human brain