Final Exam Flashcards
You have a spreadsheet with various inputs that are operated on by formulas to provide various outputs. You would like to find an input value (in a cell) that gives you a target output value (in another cell). Which of these is the simplest too you can use for this purpose?
Goal Seek
Which organization is responsible for coordinating IP addresses globally?
Internet Corporation For Assigned Names and Numbers (ICANN)
Most of the internet traffic between continents flows on submarine ______ cables
fiber optic
IP version 4 address are 32 bits long. This means that theoretically there can be no more than ____ computing devices directly to the internet with IP version 4.
2^32
All computers connected to the internet must follow the ____ protocol
TCP/IP
All computers directly connected to the internet must have a unique ____ address
IP
What is the domain name in the URL http://www.smu.edu.sg/programmes/undergraduate?
www.smu.edu.sg
Each packet of data that flows on the internet has
IP addresses of the sender and the receiver
When a large email message is sent from a computer in the United States to a computer in France over the internet, which of these is likely to be true
the message is broken into smaller packets, each packet has the IP addresses of the sender and the receiver, packets are reassembled at the receiver to recreate the original message (all the above)
According to Kevin Slavin, what percentage of movies on Netflix are rented because of Netflix’s recommendation algorithm?
60%
According to Kevin Slavin, which of these is an example of an algorithm locked-in with another algorithm in loops?
an out-of-print book at amazon listed at millions of dollars
Which of these preceded the development of the World Wide Web?
the internet, the TCP/IP protocol, email (all the above)
A course page on isis.uiowa.edu that shows you the current enrollment in the course is an example of
Dynamic Web Page
Search engines use a _____ to download pages for their index
crawler
When you query a search engine it searches ______ to find the matching pages
its index
To write a web page you are likely to use
HTML
While at work you visit a website, browse a few products and then close your browser. You visit the same site a few days later from home and these its seems to remember the products that you had browsed a few days ago. The site is likely using a:
persistent cookie
A cookie is
a small piece of data
Which of these raises most privacy concern: session cookie, persistent cookie, HTTP protocol, HTTP request
persistent cookie
When the browser is closed the ______ cookies are deleted
session
VLOOKUP function
vertical lookup that helps you find specific information in a spreadsheet table
IF function
a logical function that returns different values corresponding to the logical test (true or false)
GOAL SEAK
allows you to specify a target value for a calculated item, and returns the needed value of the input item to reach that goal
Data Validation
is used to control the type of data or the values that enter into a cell. You can use this tool to define restrictions on data entry and to prevent users from entering invalid data
PMT function
is used to calculate the payment required each period on a loan/mortgage or investment based on constant payments and a fixed rate
Solver
is an add-in program that can be used to find the best or optimum solution to a problem involving one or more variables
PMT
PMT(Rate, Nper, PV)
Data Table
A one variable data table allows you to compute the result of a formula for various values of an input
Scenario Manager
- Scenario manager in excel allows you to create predefined scenarios where each scenario may differ in the values of some inputs
- You can generate outputs corresponding to each predefined scenario
Computer network
a collection of interconnected computing devices that can communicate amongst themselves
Cable/physical channel
- Twisted pair
- Coaxial
- Fiber optic
Connectivity hardware
the hardware that allows computers to be physically connected to different types of networks
Common connectivity hardware
- network interface cards (NICs)
- routers
- repeaters
Server
a powerful computer on a network with programs that provide access to files, printing, communication and other services to users (other computers) on the network
Client
any computer such as a PC with programs that can request and use services provided by the servers in a network
Internet
Internet is a network of networks where all devices/computers on the network understand the TCP/IP protocol
- TCP-transmission control protocol
- IP- internet protocol
Referential integrity
the foreign key (e.g., ClientID in event schedule table) can be either null (empty) or one of the primary key values in the parent table (e.g., ClientID in ClientInformation table)
Cascade update related fields
if a primary key value in the parent table (e.g., ClientInformation table) is changed, corresponding changes are made to the foreign key values in the related table (e.g,. ClientID in Event schedule table)
Cascade delete related fields
if a record in the parent table is deleted, all records in the related table that reference the primary key of the deleted parent table record are also deleted
Ex. A SQL query to find the EventName, StartDate, TotalPrice for events being managed for clients from California (CA)
-SELECT EventName, StartDate, TotalPrice
-FROM EventSchedule, ClientInformation
-WHERE EventSchedule.ClientID = ClientInformation.ClientID AND State = ‘CA”
(foreign key=primary key)
Multiple tables and conditions
- SELECT ClientName, EventName, TotalPrice
- FROM EventSchedule, ClientInformation
- WHERE EventSchedule.ClientID = ClientInformation.ClientID AND TotalPrice > 150000 AND State = ‘CA’;
Domain Name System (DNS)
maps domain names to IP addresses
-The system is distributed and works through a series of communications between computers to find the IP address for a given domain
Finding IP address for a domain name
“nslookup” command in Windows (command Prompt) and Mac OS (Terminal) can be used to find the IP address for a given domain
Web made possible through
- A hypertext transfer protocol (HTTP)
- A hypertext markup language (HTML)
- Browsers and web servers
- And of course the internet
What is HTML
- HTML (Hypertext Markup Language) is the language that is used to create Web Pages
- A Web browser converts an HTML content into a user-friendly presentation
Static Web Pages
are delivered to the client exactly as stored on the server. Hence all users (clients) will see exactly the same page when they are requesting using a given URL
Dynamic Web Pages
are generated by web applications (programs) running on the server. Hence each user (client) may see a different page based on her context/inputs when she requests using a given URL
HTTP
- The hypertext transfer protocol is an application level protocol for distributed collaborative hypermedia information systems
- RFC 2616, the internet society (1999)
- All of the communication between the browser and the web server is based on HTTP
HTTP two types
request and response
Persistent cookies
stored on the browsers side (client side) computer even after the browser is closed
Temporary or session cookies
stored on the client side temporarily while browser is open. When the browser is closed the cookies is deleted
Five factors creating vulnerability
- Today’s interconnected interdependent wirelessly networked business environment
- Smaller, faster, cheaper computers and storage devises
- Decreasing skills necessary to be a computer hacker
- International organized crime taking over cybercrime
- Lack of management support
Malicious software (MALWARE) attacks
- Remote attacks requiring user action
- Denial of service attack (DoS)
- Distributed denial of service attack (DDoS)
Virus
attaches itself to other programs to spread
worm
replicates and distributes itself through networks
-phising attack
Spyware
keystoke loggers and screen adapters
Denial of service attack (DoS)
attacker overwhelms a target computer with a massive number of information requests
Distributed Denial of service Attack (DDoS)
A DoS attack by first comprising a large number of computers through malicious software and then coordinating them (zombies or botnet) to send massive number of information requests to a target computer
access controls
authenticaltion and authorization
Communication controls
firewall, encryption, VPN etc.
Encryption
the process of encoding messages before they enter a communication channel such that, while in transit, the messages cannot be decoded without special information (key)
Brick and mortar
these are traditional organizations that server their customers through physical locations ex. Grocery stores car manufacturers
Clicks and mortar
these are traditional organization that serve through both physical and online presence walmart bestbuy
Pure play (virtual)
these are organization that serve their customers only through their online presence amazon google
A business process can be described with
a flowchart
Information Systems play a vital role in business processes by supporting
- the execution of the processes
- the capturing and storing of process data
- the monitoring of process performance
Airbnb is a marketplace that connects owners of an unused space (e.g., a house) with the people who are looking for such space. It is an example of what is called
collaborative consumption
All computers connected to the internet must follow the
TCP/IP protocol