Mock Exam Themen - still unfinished Flashcards

1
Q

What exactly is Value Proposition?

A
  • unique benefit or solution that a company offers to its customers through the use of digital technology
  • development of new products and services
  • e.g. customer can directly order on the app and does not have to wait (value: comfort, time)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What exactly is Value Creation?

A
  • what is the value for e.g. the company (value: less personnell required when customer orders per app)?
  • improvement of internal processes
  • digitalisation of business processes, e.g.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What exactly is customer interaction?

A
  • imporved interface to the customer
  • e.g. new communication channel between customer and company
  • digital communication
  • e.g. internet banking, university providing online support 24/7 through chats, forum or email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four challenges of digital transformation?

A
  • IT (handling data, latest trends and enablers)
  • organisation (alignment of IT and Orga, silo-thinking of companies & disconnected management)
  • value added (earning money with dig. trans.?)
    -compliance (legal problems that arised: data privacy, ethical issues)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are bits and bytes used for and is it 1000 or 1024?

A
  • 8 bits = 1 byte
    Bit: Bandwith, i.e. capacity for sending data
    Byte: size of files and storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the Epochs of IT?

-1
0
1
2
3
4
5

A

-1: First Ideas
0: On the way to the computer
1: Mainframe- and Minicomputer (start of commercial usage of mainframes, all components offered by ONE company; using mini-computer, IT could be decentralized)
2: Personal Computer (no stand alone, connected to internet
3: Client Server (several clients connected to one server through LAN/ internet - companies can distribute computing services on several small servers / today: multi-layered client-server architecture)
4: Internet Computing (increasing networks, that are interconnected, distribution of TCP/IP standarts - global internet; company wide networks -> company wide software, integrated functions also now supported)
5: Cloud Computing (data no longer stored on local hardware, storage and processing services offered through internet, scalable and flexible cloud-services, services executed wihtin company can now be taken from internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is E-Commerce so successful?

A
  • ubiquity /omnipresence
  • 24/7
  • global coverage: no borders
  • universal standards: same performance all over the world
  • richness and desnity
  • personalization of marketing
  • social networking
  • ## customization of products
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Five forces of Porter

A
  1. supply power (supplier can bypass retailer and sell products directly to customer)
  2. buyer power (easier research on prices, not regional)
  3. threat of new entry (entry barriers become smaller)
  4. threat of subsitution (e.g. e-books)
  5. competitive rivalry (e.g. markets get bigger, more rivalry)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the steps of the conversion funnel?

A
  • awareness
  • interest
  • consideration
  • purchase
  • loyalty
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are…
1. impressions?
2. clicks?
3. conversions?

A
  1. how often is a page or an ad requiested and shown
  2. how often is a page clicked/ an ad (Clicks= CTR*Impressions)
  3. how often is a service bought/ does the customer what you want him to (conversions=CR*Clicks)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the…
1. CTR?
2. CR?

A

1.click-through-rate / relation between clicks and impressions = Clicks:impressions
2. conversion rate / relation between conversion and clicks = conversions:clicks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which damage can occur from IT attacks?

1.
2.
3.
4.

A
  • computer (software changes, damage, manipulation, deletion)
  • data (theft, deletion, manipulation, …loss of confidentality and integrity)
  • embedded systems - devices with embedded IT (demolition of infrastructure)
  • loss of common reality (society has to agree on reality, otherwise it is in danger)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Motivations of Attackers

1.
2.
3.
4.

A
  • professional hackers
  • terrorism
  • cyberwar
  • non-commercial hacker (robin-hood- mentality)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the most important goals of data security

A
  • confidentality (no one allowed to see, protection against unauthorized data)
  • integrity (must not be anipulated or changed)
  • availability (authorized people should be able to access data from anywhere)
  • accountability (creation or change can be assigned to a person, e.g. who is the author of a blog)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Root causes for Data Security

A
  • technical reasons (there is no fault free software (bigger, more complex, internet based on standard for communicating -> easy for hackers to analyze protocols… only try to limit)
  • organisational reasons (in need of rules and competent people, huge grey are in terms of data security/ privacy = CAN be changed!)
  • human reasons (stupid, naive, ignorant, comfort, e.g. not reading terms and conditions; would have to change mindset)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GDPR from the people´s perspective

1.
2.
3.
4.
5.
6.
7.
8.

A
  • in principle, processing of data is forbidden (personal data can only be stored if required to fulfill contract, or user gives permission)
  • prohibition of coupling (companies must not depend a contract on other/massive data processing/ only because newsletter, trader cannot depend selling a product on it)
  • compensation (not only specific damages but stress, inconvenience)
  • transparancy is a must (must provide what is stored about people)
  • sensitive data (sensitive data like sexual orientation must only be handled in excpetional cases)
  • right to erasure (under circumstances, people can ask companies to erase data)
  • right to explanation of algorithmic decisions (can ask why computer has decided sth/ feedback)
  • right to obtain a portable copy of stored data (e.g. moving from amazon to otto)
17
Q

Challenges in Data Privacy

1.
2.
3.
4.

A
  • data privacy conflicts with other goals (data orivacy vs data transparency - which data must be published?)
  • data privacy and costs (to which grade can customer data be used within a company)
  • data privacy and fight against criminality (surveillance state vs constitutional state)
  • data privacy and research (sometimes research is possible using anonymised data, sometimes there are additional regulations)
18
Q

Encryption Methods

A
  1. Casear
  2. Vignere
  3. Enigma
19
Q

What is the public key encryption?

A
  • asymmetric encryption, wehere one key is oublic and the other is private
  • problem of key distribution is solved
  • best known method RSA
19
Q

What is the public key encryption?

A
  • asymmetric encryption, wehere one key is oublic and the other is private
  • problem of key distribution is solved
  • best known method RSA
20
Q

What is the Diffie Hellman Key Exchange?

A
  • each party creates secret key that is used ONCE
  • common public key is exchanged
  • each party creates a new key based on the secret and public key, these are exchanged again
  • based on this a third key is created

!! third key identical for both !! no secret key was exchanged !!

20
Q

What is the Diffie Hellman Key Exchange?

A
  • each party creates secret key that is used ONCE
  • common public key is exchanged
  • each party creates a new key based on the secret and public key, these are exchanged again
  • based on this a third key is created

!! third key identical for both !! no secret key was exchanged !!