Title | IST 195 Final Study Guide |
---|---|
Author | Cathryn Willing |
Course | Information Technologies |
Institution | Syracuse University |
Pages | 20 |
File Size | 266 KB |
File Type | |
Total Downloads | 43 |
Total Views | 139 |
IST 195...
IST 195: Final Exam Study Guide _____________ Exam 1 Concepts → ● MOOC ○ Massive online open course ○ Khan academy ● Showrooming ○ Going into a store physically, then shopping around using a smart device to find a better price ● Webrooming ○ Look online first and then buying it in the store ● Cars as a service (CaaS) ○ Cars as an automated service ● Howard Aiken ○ Created the Mark 1 in 1944 ● Harvard Mark 1 ○ Concept from Howard Aiken ○ 51 ft long ○ 8 feet tall ○ 5 tons ○ 500 miles of wire ○ First real computer put into use ● 305 RAMAC ○ 1956 ○ IBM Supercomputer ○ 5 MB of storage ○ 1 ton 150,000+ ● Moore’s law ○ Observation made in 1965 that the number of transistors on an integrated circuit will double every 24 mos. ○ B/c of this -- the power of the computer is doubled in this time and the cost per transistor decreases ● Types of computers ○ PC ■ Personal computer ○ Server ■ Provides services to other computers or devices on a network ■ Multiple people using a single computer ■ More powerful computer ● Web servers ● Mail servers → gmail ● File servers → share files
●
●
●
●
●
● Game servers ● Media servers ○ Mainframes ■ Large, expensive, powerful computer that can handle billions of transactions a day ■ Process more than 83% of transactions around the world ■ 6 figures (100,000+) ■ Not practical ○ Super Computers ■ Fastest, most powerful computers ■ Processing more than one quadrillion instructions per second ■ 7 figures ■ Mainly used by government → NSA, NOA Green computing ○ Involves reducing the electricity consumed and environmental waste generated when using a computer ○ Strategies ■ Recycling ■ Using energy efficient hardware and energy saving features ■ Extending the life of computers ■ Virtual computing Virtualization ○ A process that allows a single physical computer to support multiple operating systems that operate independently Cambridge Analytica/ Facebook ○ Facebook as a news organization ■ Is it the largest?? ● Grabs users attention and sells attention to advertisers ● Deciding what is newsworthy ○ 2018 data breach ○ Cambridge Analytica Internet Research Agency ○ Russian linked propaganda tied to 2016 presidential election ○ Information warfare → biggest threat globally Facebook Algorithm ○ Facebook's algorithm (how do they decide what shows up?) ■ Relevant to the users ■ 1,500 stories it could show you based on 100,000 variables ○ Inventory → how much content ○ Signals → considerations of content ○ Predictions → considerations of person ■ All equate to overall score ■ #1= signal (commenting) ■ #2 = sharing
● ●
●
●
●
● ● ●
●
●
■ #3= reacting ○ Active v. passive interactions ■ Active ● Commenting ● Sharing ● Reacting ■ Passive ● Clicking ● Watching ● Viewing Brand awareness ○ Attention your brand gets across all platforms Applause Rate ○ Add up all applause from specific post ○ Divide # of followers ○ Multiply by 100 Amplification Rate ○ Add up all times a post was shared ○ Divide by # of followers ○ Multiply by 100 Operator precedence ○ A set of rules that defines which procedures to perform first in order to evaluate a given mathematical expression Formulas vs. Functions ○ Formulas ■ What you write into a function ● Using = sign ■ Functions ● Already built into excel Conditional Formatting ○ Allows you to set rules for cell formatting Pivot Tables ○ Enables someone to easily and quickly analyze large amounts of data Delimited Files ○ Separating the values in each row with specific characters ■ Uses of underscores/dashes instead of spaces ○ Most spreadsheet or database applications are able to import or export data in a delimited format Big Data ○ Taking massive amounts of information from different areas and then analyzing that data First, Second, and Third Party Data ○ First party data ■ Data that your organization owns
●
●
●
●
■ Collected by the organization ● Surveys, forms, etc. ○ Second party data ■ Data you may trade with partners ■ Exchanging data back and forth ■ Legal if the consumer is “aware” it is happening ● Normally in terms and conditions section so consumers mau no unconsciously know when agreeing yet doesn't make a legal difference ● Don't know how it was collected/ accuracy of data ○ Third party data ■ Data you purchase ■ Collecting data (public data) ● Credit, buying habits, mortgage 4 Major Types of Data ○ (1) Structured ■ Highly organized and manageable ■ Excel files, database records ■ Easy to analyze ○ (2) Unstructured ■ The structure is not formally defined or anticipated ■ Images, audio, PDFs ■ Hard to analyze ○ (3) Semi-structured ■ Hybrid data ■ Emails, forms, tweets ■ Can see timing, charactered ■ Contents of tweet is harder to analyze (unstructured) ○ (4) Geospatial ■ Includes info on positions ■ Snapchat ● Location services The Four V’s of Big Data ○ Volume = scale of data ○ Variety = different forms of data ○ Velocity = analysis of streaming data ■ How fast the data is coming at you ○ Veracity = uncertainty of data Questions to ask about data ○ What data do we have? ○ What other data should we have? ○ How can we use it? ○ How can we drive value from data? Types of Analytics (acquire and organize data → perform descriptive,
predictive, and discovery analytics → take prescriptive actions based on) ○ Descriptive ■ What happened and why ■ Past and present ○ Predictive ■ What is likely to happen and why ○ Discovery ■ Find something important without asking the question ○ Prescriptive ■ The culmination of the above when it tells what is the solution or action to take ● Data Warehouse ○ Taking data that is typically scattered throughout many applications and systems in a variety of forms ■ Islands of data ○ Building reports of the above is challenging if at all possible ○ Need to transform, merge, and purge ○ Once in uniform it is possible to produce reports and dashboards ● Dashboards ● Marketing Automation ○ Software platforms designed for marketing departments and organizations to more effectively market ● People behind operating systems ○ Bill Gates - Microsoft ○ Ken Thompson - UNIX and AT&T(bell laboratories) ○ Steve Jobs - Apple ○ Linus Torvalds - LINUX ● Functions of Operating Systems ○ Provides user interface (GUI) ○ Managing resources (memory, processing, storage) ○ Coordinated hardware components ○ Runs applications ○ File management ○ Start and shut down a computer ○ Establish an internet connection ○ Automatically update because it is on all the time and push auto updates ● Types of Operating Systems ○ (1) Desktop ■ Windows ■ OSX ■ UNIX ■ LINUX ■ Chrome OS ○ (2) Server
●
●
●
●
■ Windows server ■ Mac OSX server ■ UNIX ■ LINUX ○ (3) Mobile ■ Google android ■ Apple iOS ■ Windows phone Open source ○ Why ■ Social benefits → collaboration creates communities ● Creativity ■ Freedom → developers decide direction ■ Transparency ■ Security ■ Use the community to make a better product ○ How to make money ■ Developer ■ Consulting ■ Support ■ Paid certification ■ Open source acquisitions → IBM acquired RED HAT for 34 Billion LINUX v. UNIX ○ LINUX ■ Most successful project ■ Developed by Linus Torvalds in 1991 -- resembles UNIX ■ Open source software developing system ■ Originally used command line interface ● Now GUI ■ Type of UNIX ○ UNIX ■ Base operating system originally developed for midrange computers Ubuntu ○ Most popular version of LINUX ○ Main goal is security ○ Grapple user interface ○ Makes money off support 4 main computing functions ○ (1) Accept input ○ (2) Process input ○ (3) Produce input ○ (4) Storage ■ Changing ...
● Motherboard ○ Main circuit board of a computer ○ All communication is wired through the motherboard ■ System board, mainboard ○ All components are connected ● CPU- central processing unit ○ Contained a single chip called a microprocessor ■ Intel/amd ○ Cores ■ (CPUS) ■ Multiple cores per chip ■ Dual core processor → 1 physical chip operating as 2 CPUS ■ Cores and parallels ● Multicore processors = 2 or more separate or independent CPUS within a system unit ● Parallel processing → allows computers to do multiple things at 1 time (not systematic) ○ Control Unit ■ Instructions ■ Tells the computer how to carry out a task ○ ALU ■ Arithmetic login unit ■ Execute it ■ Performs arithmetic and logical operations ○ Transistors ■ On a chip and uses nanotechnology ■ The more transistors on a chip the faster it goes ○ Nanotechnology ■ Study of manipulating matter on an atomic or molecular level ● Ports ○ USB, HDMI, Thunderbolt, Ethernet ○ USB-- universal serial bus ■ Can connect up to 127 different peripherals ○ USB-- universal serial bus ○ USB A/B ○ USB-C ○ USB 3.1 v. USB 3.0 ● RAM - random access memory ○ Chips hold programs and data that the CPU is presently processing ■ Volatile or temporary contents are lost when the computer is powered off ○ Volatile v. Non-volatile ● CPU Memory Cache ○ Speeds up the process of the computer because it stores frequently used
instructions and data ● Traditional Hard Drives vs. SSD ○ Traditional ■ Analog ■ Mechanical becomes fragmented and eventually moves slower ○ SSD ■ Digital that has no moving parts ■ Moves faster but is more expensive ○ Today's hard drives use solid state with no moving parts ● Bit v. byte ○ The bit = binary digit ○ 1 bit = 2 values (1 or 0) ○ 2 bit = 4 values (10 01 11 00) ○ 3 bit= 8 values (000 010 001 100 110 111 101) ○ 8 bit = 256 values aka byte ● Decimal v. binary ○ Decimal = base 10 ■ There are 10 digits because we have 10 figures ○ Binary = base ■ We only have 1’s and 0’s ● Storage capacities ○ Kilo thousand ○ Mega billion ○ Giga billion ○ Tera billion ○ Peta quadrillion ○ Exa quintillion ● Binary arithmetic ● ASCII v. Unicode ○ ASCII ■ 7 bit (128 values) ● This takes care of 0-9 A-Z and punctuation ● Standard reference table for the english language to have it represented by a binary conversation ● How computers talk ○ UNICODE ■ Every character in the world is included ■ More than 100,000 characters represented ● Includes ASCII- universal character set Exam 2 Concepts → ● RFID Technology ○ Radio frequency identification ■ System that transmits the identity of an object or person wirelessly using radio waves
Ex: hotel cards, ezpass tag Tags→ consists of an antenna and a microchip Less than half of a millimeter in size and can be mounted on paper, etc. ○ Passive tag ■ Does not need battery power ■ Activates itself and transmits data using power generated by the ratio waves from the RFID reader ■ Usually less than 3 meter in range ■ Ex: package tag on Hanes T Shirt ○ Active tag ■ Battery powered ■ Its has an improved operating range ■ Costs more than passive tags ■ Range is greater than 100m ■ Ex: Ezpass Barcodes ○ 1 at a time ○ Requires a line of sight ■ Retail → inventory intelligence and accuracy move to RFID readers ● Radio signals with RFID tags NFC - near-field communications ○ Uses same frequency as RFID ○ Typically requires communication within 5 cm ○ Two way communication ○ Popular use for payments ■ Ex: apple pay, google wallet Bluetooth Low Energy BLE ○ Uses beacons (wall mounts) ○ Requires no pairing ○ Continuous low power connection ○ Indoor GPS alternative ■ Beacons → broadcast a unique identifier ■ Phone enters the region and triggers the app to open in the background Internet of Things (IoT) ○ Mark Weiser -- ubiquitous computing 1991 ■ A world of which objects of all kinds could sense, communicate, and act ○ 1. Sensors ○ 2. Connectivity ○ 3. People and processes: cloud computing ■ Big industry and growing ■ Impacts all industry ○ 4 billion consumer “things” are connected to the internet ● ●
●
●
●
●
○
● ● ●
●
●
■ By 2020 each person will own and average of 7 connected devices Potential IoT ■ Education ● Fitness ● Meal plan ● Lights ● Attendance ■ Agriculture ● Smart farming ● Sensors in fields ■ Infrastructure / transportation ● Self driving cars ■ IoP - people ● Smart beds for hospitals ● Smart buildings
Zigbee Mesh Network ○ Network topology that does not use a physical network Creating value → info value loop ○ Create - use sensors to gather info ○ communicate - transfer info from one place to another ○ Aggregate - gathering info from one or more sources at one or more times ○ Analyze - look for patterns, relationships, discoveries ○ Act - create change based on findings Cloud computing ○ How data is stored and computed ■ Application ■ Platform ■ Infrastructure ● Foundation ● Cloud hosting ○ Hosting = more servers and more success ○ Cloud computing gives you access to computing power when you need, scaling up instantly ■ Can release servers back into cloud if not using it ■ Focus on software not the hardware ○ Popularity ■ Scalability → easy to grow and shrink demand ■ Instant → availability ■ Save money → only pay for what you sue Why move to the cloud? ○ Lower cost of operations ○ Better competition and address market demands ○ Lower downtime
●
●
●
● ● ●
●
●
○ Always up to date ○ Security and compliance IaaS v. SaaS ○ IaaS - infrastructure as a service ■ You manage applications, data, runtime, middleware ○ SaaS - software as a service ■ Using software without thinking of it ■ Other managers Virtualization ○ Foundational element of the cloud ■ Simulating a hardware platform, operating system, storage and network resources ■ Transforms hardware → software ■ Ability to run multiple operating systems as virtual machines Amazon EC2 and S3 ○ Amazon Web Services ○ Amazon S3- simple storage (SaaS) ○ Amazon EC2 - elastic compute cloud (IaaS) Steganography ○ Technique of hiding secret data within an ordinary, non-secret, file or message Symmetric v. asymmetric cryptosystems Cryptography ○ Can immediately tell something has been tampered ○ Based on mathematics ○ Methods for transforming info in order to hide its contents ○ Keys encrypt and decrypt info ■ Cleartext → encryption technique → ciphertext → encryption key → decryption → cleartext
Caesar Ciphers ○ Shift cipher -- shift letters x numbers of places ■ +2 so decrypt -2 A=C B=D ○ Numbers as keys ○ Words as keys ■ Remove duplicate letters; start with work then remove original Caesar shift ○ NEW YORK ○ +5
●
●
●
● ● ● ● ●
●
○ SJBDTWP ○ HTHGVU ○ +7 ○ AMAZON Numbers as a key ○ APPLE ○ 623= Key APPLE 62362 GRSRG A-- 6 spaces = G P -- 2 spaces = R P -- 3 spaces = S L -- 6 spaces = R E -- 2 spaces = G Words as key ○ SYRACUSE ○ Key=Light ABCDEFGHIJKLMNOPQRSTUVWXYZ LIGHTABCDEFJKMNOPQRSUVWXYZ RYQLGURT Authentication ○ Do not just rely on a password ○ Two factor is the most common ■ Multifactor ● Something you know ● Something you have ● Something you are Privacy ○ Concerns the collection and use of your information and data Accuracy ○ Responsibility of those who collect data Property ○ Relates to who owns the data → we don’t own our own data Access ○ Responsibility of those who control and use that data Information brokers ○ Collect and sell person data ■ Acxiom ● Combined access from different companies, use and sell to 3rd parties (Acxiom) ● Sell this combined data back to the company Cookies ○ Small data files that are deposited on your hard disk from websites you visit
○
●
●
●
1st party -- giving computer a UUID ■ Generated only by websites you are visiting (weather location) ○ 3rd party -- tracking cookies ■ Generated by an advertising company that is affiliated with the website you are visiting ■ Ad tags used on almost every website through Google ■ Product following Privacy laws ○ Gramm-Leach-Bliley Act ■ Protects personal financial info ○ HIPAA ■ Protects medical records ○ FERPA ■ Resist disclosure of education ○ CCPA ■ Known as the GDPR (EU general data protection regulation) law for CA ■ California Consumer Privacy Act ● More transparent ● Computer crimes ○ Identity theft → illegal assumption of a person’s identity for economic gain ○ Data manipulation → unauthorized access of a computer network and copying files from that server ○ Ransomware → malicious software that encrypts your computer’s data and ransoms the passwords to the user ○ Denial of Service (DoS) → attempts to slow down/stop a computer system or ntwk by flooding a computer or ntwk with requests for info and data ○ Phishing → attempts to trick internet users into thinking a fake by official looking website or email is legit Malware ○ Software designed to infiltrate or damage a system without the owner’s actual knowledge ○ Virus v. worm ■ Virus = migrate through networks and attach to diff programs ■ Worms = files the computer with self -replicating information ■ Trojan horse = programs disguised as something else ACM ○ Association of Computing Machinery ■ Committee on professional ethics ■ Code of conduct
●
● ●
●
●
●
●
●
●
ARPANET ○ How to build redundancy ○ 4 nodes for communication (1969) ■ Allows for traffic even if node is broken Packets Application / Transport / Network Layer protocols ○ Communication protocol ■ Includes syntax and semantics ■ Consists of small acts ■ Protocols can rely on others in terms of layers ○ Internet protocol suite ■ Application ■ Transport ■ Network ■ Link ■ Physical ● Regardless of the protocol the internet works by sending out info through packets (packets switch networks) HTTP ○ Hypertext transfer protocol ○ Websites ○ 4 step process between client and web server ■ Step 4 browser closes connection ■ Connectionless or state protocol ● If it didn’t close the connection then you would have a connection to all the tabs open SMTP ○ Simple mail transfer protocol ■ Way mail servers communicate SSL/TLS ○ Secure socket layers ○ Regardless of protocol the use TCP or IP TCP ○ Transmission control protocol ○ Guarentees delievery of data IP ○ Internet protocol ○ Finds packets route that they take over the internet ○ Packets take different routes IPV4 v. IPv6 ○ Every device on the internet needs an IP address ○ First 2 #s belong to network address (SU)
●
●
● ●
●
●
●
●
○ Subnet (place and building) Domain Names ○ A text based name that corresponds to the IP address of a server that hosts the webite ICANN ○ Internet Corporation For Assigned Names and Numbers ○ Helps define how a domain system grows and expands ○ Registries and registrars WIPO ○ Deals with domain name disputes Blockchain ○ Way of keeping records ○ Blockchain came out of Bitcoin digital currency ■ Can be used for any digital transaction ■ Limitless possibilities when the focus is just on blockchain ■ No longer needed clearinghouse (bank) to manage transactions ● With blockchain its personal; uses a distributed ledger to make and verify transactions ● Block A → B (500) cannot take away a block ● Group of block transactions brought together = chain Decentralized ledger ○ Synchronized records ○ Every participant in the network keeps a copy of all the transactions ○ Transactions are secured by encryption to prevent tampering ○ Secure and transparent way to digitally tack the ownership of assets Public v. private chains ○ Public ■ Permissionless ■ Bitcoin ○ Private ■ Companies are experimenting Food safety ○ IBM Food Trust ○ Leverage several technologies: ○ RFID – trace the origin of food using simple RFID tags attached to food containers. Scanned at each point on the supply chain ○ Blockchain – Records every transaction (scan) ○ IOT – would allow consumers to have an interface into this data eBusiness v. eCommerce ○ eCommerce is a part of e business but ebusiness is larger than eCommerce ○ eCommerce→ infrastructure and data that allow one or more types of online or electronic transaction ○ eBusiness → a business activity that creates value with the assistance of networking and telecommunications technolo...