TEST #2 Flashcards

1
Q

Web 2.0

A

1) user generated content
2) users can respond directly to ads by clicking on them
3) free content and software
4) pay per click
5) use increases value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of Social Media Marketing

A
  • instant
  • creates a sense of belonging/community
  • widespread access of information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disadvantages of Social Media Marketing

A
  • same problems as in person interactions such as honesty, jealousy and resentment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goal of Marketers

A

make you feel apart of a/their community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computer network

A

system that connects 2 or more entities together to exchange data

1) people directly talking or thru printed materials
2) people and devices thru electronic means
3) must have infrastructure to connect
4) must have common language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of Packet Switched Networks

A
  • more efficient than circuit switched networks
  • multiple paths
  • multiple packets on the same network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP (Transmission Control Protocol)

A
  • guarantees transmission/delivery of packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP (Internet Protocol)

A
  • methods for packets to find their way from sending to receiving and vice versa
  • assigns an IP address to different things on a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Difference between LAN vs. WAN

A
  • 2 different types of computer networks

- local vs. wide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LAN (Local Area Network)

A
  • limited geographic scope

- computers that connect to an internal router/switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WAN (Wide Area Network)

A
  • uses a telecom provider

- connects LANs together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS (Domain Name System)

A
  • helps map domain names to their IP address

- internets equivalent to a phone book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 different levels of cloud computing

A
  • saas
  • paas
  • iaas
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Saas

A

software as a service

- running somebody elses software such as office 365

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Paas

A

Platform as a service

- uses cloud vendors computers with pre installed operating systems such as Azure or EC2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Iaas

A

Infrastructure as a service

  • use cloud vendors computers to install your operating system/applications
  • most basic -> just the computer
17
Q

Foundation technologies of cloud computing

A

networking and databasing

18
Q

Advantages of Cloud Computing

A
  • little upfront capital cost
  • pay for what you use (subscription based fees)
  • faster development
  • scalability
19
Q

Disadvantages of cloud computing

A
  • dependency on vendor -> may be hard to switch
  • loss of control over security
  • loss of control over data
20
Q

3 constraints for project management

A

1) time
2) scope
3) cost

21
Q

groupthink

A

group members that think the same way and never challenge each other to think differently

22
Q

process effectiveness

A

how well a process achieves an organizational strategy

23
Q

process efficiency

A

ratio of outputs to inputs

24
Q

how to improve a process

A
  • change process structure
  • change process resources
  • change both of the above
25
Q

business buyers vs. consumer buyers

A

business buyers are more rational

26
Q

goal of IT security

A

manage/minimize risk

27
Q

assets to protect

A
  • hardware
  • software
  • policy
  • people
  • procedures
28
Q

greatest threat to security

A

employees/humans

29
Q

defense in depth

A
  • a priciple that is characterized by the use of multiple, different defense mechanisms to protect from threats
  • multiple levels of safegaurds
30
Q

social engineering factors

A
  • immediate danger

- quick resolution

31
Q

data protections

A
  • don’t store data you don’t have to
  • don’t give people access if you don’t have to
  • encryption
32
Q

PKI (Public Key Infrastructure)

A
  • allows you to encrypt sensitive data that goes over the internet
  • 2 key lock box
33
Q

firewall

A
  • computing device that prevents unauthorized network access

- where data came from and where its going to

34
Q

malware

A

broad category of software that includes viruses, spyware and adware used for malicious activity

35
Q

security plan

A
  • systematic -> run by a senior leader
  • continuous training of all personel
  • continuously review and update plan/policy