IST 195 Final Study Guide PDF

Title IST 195 Final Study Guide
Author Cathryn Willing
Course Information Technologies
Institution Syracuse University
Pages 20
File Size 266 KB
File Type PDF
Total Downloads 43
Total Views 139

Summary

IST 195...


Description

IST 195: Final Exam Study Guide _____________ Exam 1 Concepts → ● MOOC ○ Massive online open course ○ Khan academy ● Showrooming ○ Going into a store physically, then shopping around using a smart device to find a better price ● Webrooming ○ Look online first and then buying it in the store ● Cars as a service (CaaS) ○ Cars as an automated service ● Howard Aiken ○ Created the Mark 1 in 1944 ● Harvard Mark 1 ○ Concept from Howard Aiken ○ 51 ft long ○ 8 feet tall ○ 5 tons ○ 500 miles of wire ○ First real computer put into use ● 305 RAMAC ○ 1956 ○ IBM Supercomputer ○ 5 MB of storage ○ 1 ton 150,000+ ● Moore’s law ○ Observation made in 1965 that the number of transistors on an integrated circuit will double every 24 mos. ○ B/c of this -- the power of the computer is doubled in this time and the cost per transistor decreases ● Types of computers ○ PC ■ Personal computer ○ Server ■ Provides services to other computers or devices on a network ■ Multiple people using a single computer ■ More powerful computer ● Web servers ● Mail servers → gmail ● File servers → share files











● Game servers ● Media servers ○ Mainframes ■ Large, expensive, powerful computer that can handle billions of transactions a day ■ Process more than 83% of transactions around the world ■ 6 figures (100,000+) ■ Not practical ○ Super Computers ■ Fastest, most powerful computers ■ Processing more than one quadrillion instructions per second ■ 7 figures ■ Mainly used by government → NSA, NOA Green computing ○ Involves reducing the electricity consumed and environmental waste generated when using a computer ○ Strategies ■ Recycling ■ Using energy efficient hardware and energy saving features ■ Extending the life of computers ■ Virtual computing Virtualization ○ A process that allows a single physical computer to support multiple operating systems that operate independently Cambridge Analytica/ Facebook ○ Facebook as a news organization ■ Is it the largest?? ● Grabs users attention and sells attention to advertisers ● Deciding what is newsworthy ○ 2018 data breach ○ Cambridge Analytica Internet Research Agency ○ Russian linked propaganda tied to 2016 presidential election ○ Information warfare → biggest threat globally Facebook Algorithm ○ Facebook's algorithm (how do they decide what shows up?) ■ Relevant to the users ■ 1,500 stories it could show you based on 100,000 variables ○ Inventory → how much content ○ Signals → considerations of content ○ Predictions → considerations of person ■ All equate to overall score ■ #1= signal (commenting) ■ #2 = sharing

● ●







● ● ●





■ #3= reacting ○ Active v. passive interactions ■ Active ● Commenting ● Sharing ● Reacting ■ Passive ● Clicking ● Watching ● Viewing Brand awareness ○ Attention your brand gets across all platforms Applause Rate ○ Add up all applause from specific post ○ Divide # of followers ○ Multiply by 100 Amplification Rate ○ Add up all times a post was shared ○ Divide by # of followers ○ Multiply by 100 Operator precedence ○ A set of rules that defines which procedures to perform first in order to evaluate a given mathematical expression Formulas vs. Functions ○ Formulas ■ What you write into a function ● Using = sign ■ Functions ● Already built into excel Conditional Formatting ○ Allows you to set rules for cell formatting Pivot Tables ○ Enables someone to easily and quickly analyze large amounts of data Delimited Files ○ Separating the values in each row with specific characters ■ Uses of underscores/dashes instead of spaces ○ Most spreadsheet or database applications are able to import or export data in a delimited format Big Data ○ Taking massive amounts of information from different areas and then analyzing that data First, Second, and Third Party Data ○ First party data ■ Data that your organization owns









■ Collected by the organization ● Surveys, forms, etc. ○ Second party data ■ Data you may trade with partners ■ Exchanging data back and forth ■ Legal if the consumer is “aware” it is happening ● Normally in terms and conditions section so consumers mau no unconsciously know when agreeing yet doesn't make a legal difference ● Don't know how it was collected/ accuracy of data ○ Third party data ■ Data you purchase ■ Collecting data (public data) ● Credit, buying habits, mortgage 4 Major Types of Data ○ (1) Structured ■ Highly organized and manageable ■ Excel files, database records ■ Easy to analyze ○ (2) Unstructured ■ The structure is not formally defined or anticipated ■ Images, audio, PDFs ■ Hard to analyze ○ (3) Semi-structured ■ Hybrid data ■ Emails, forms, tweets ■ Can see timing, charactered ■ Contents of tweet is harder to analyze (unstructured) ○ (4) Geospatial ■ Includes info on positions ■ Snapchat ● Location services The Four V’s of Big Data ○ Volume = scale of data ○ Variety = different forms of data ○ Velocity = analysis of streaming data ■ How fast the data is coming at you ○ Veracity = uncertainty of data Questions to ask about data ○ What data do we have? ○ What other data should we have? ○ How can we use it? ○ How can we drive value from data? Types of Analytics (acquire and organize data → perform descriptive,

predictive, and discovery analytics → take prescriptive actions based on) ○ Descriptive ■ What happened and why ■ Past and present ○ Predictive ■ What is likely to happen and why ○ Discovery ■ Find something important without asking the question ○ Prescriptive ■ The culmination of the above when it tells what is the solution or action to take ● Data Warehouse ○ Taking data that is typically scattered throughout many applications and systems in a variety of forms ■ Islands of data ○ Building reports of the above is challenging if at all possible ○ Need to transform, merge, and purge ○ Once in uniform it is possible to produce reports and dashboards ● Dashboards ● Marketing Automation ○ Software platforms designed for marketing departments and organizations to more effectively market ● People behind operating systems ○ Bill Gates - Microsoft ○ Ken Thompson - UNIX and AT&T(bell laboratories) ○ Steve Jobs - Apple ○ Linus Torvalds - LINUX ● Functions of Operating Systems ○ Provides user interface (GUI) ○ Managing resources (memory, processing, storage) ○ Coordinated hardware components ○ Runs applications ○ File management ○ Start and shut down a computer ○ Establish an internet connection ○ Automatically update because it is on all the time and push auto updates ● Types of Operating Systems ○ (1) Desktop ■ Windows ■ OSX ■ UNIX ■ LINUX ■ Chrome OS ○ (2) Server









■ Windows server ■ Mac OSX server ■ UNIX ■ LINUX ○ (3) Mobile ■ Google android ■ Apple iOS ■ Windows phone Open source ○ Why ■ Social benefits → collaboration creates communities ● Creativity ■ Freedom → developers decide direction ■ Transparency ■ Security ■ Use the community to make a better product ○ How to make money ■ Developer ■ Consulting ■ Support ■ Paid certification ■ Open source acquisitions → IBM acquired RED HAT for 34 Billion LINUX v. UNIX ○ LINUX ■ Most successful project ■ Developed by Linus Torvalds in 1991 -- resembles UNIX ■ Open source software developing system ■ Originally used command line interface ● Now GUI ■ Type of UNIX ○ UNIX ■ Base operating system originally developed for midrange computers Ubuntu ○ Most popular version of LINUX ○ Main goal is security ○ Grapple user interface ○ Makes money off support 4 main computing functions ○ (1) Accept input ○ (2) Process input ○ (3) Produce input ○ (4) Storage ■ Changing ...

● Motherboard ○ Main circuit board of a computer ○ All communication is wired through the motherboard ■ System board, mainboard ○ All components are connected ● CPU- central processing unit ○ Contained a single chip called a microprocessor ■ Intel/amd ○ Cores ■ (CPUS) ■ Multiple cores per chip ■ Dual core processor → 1 physical chip operating as 2 CPUS ■ Cores and parallels ● Multicore processors = 2 or more separate or independent CPUS within a system unit ● Parallel processing → allows computers to do multiple things at 1 time (not systematic) ○ Control Unit ■ Instructions ■ Tells the computer how to carry out a task ○ ALU ■ Arithmetic login unit ■ Execute it ■ Performs arithmetic and logical operations ○ Transistors ■ On a chip and uses nanotechnology ■ The more transistors on a chip the faster it goes ○ Nanotechnology ■ Study of manipulating matter on an atomic or molecular level ● Ports ○ USB, HDMI, Thunderbolt, Ethernet ○ USB-- universal serial bus ■ Can connect up to 127 different peripherals ○ USB-- universal serial bus ○ USB A/B ○ USB-C ○ USB 3.1 v. USB 3.0 ● RAM - random access memory ○ Chips hold programs and data that the CPU is presently processing ■ Volatile or temporary contents are lost when the computer is powered off ○ Volatile v. Non-volatile ● CPU Memory Cache ○ Speeds up the process of the computer because it stores frequently used

instructions and data ● Traditional Hard Drives vs. SSD ○ Traditional ■ Analog ■ Mechanical becomes fragmented and eventually moves slower ○ SSD ■ Digital that has no moving parts ■ Moves faster but is more expensive ○ Today's hard drives use solid state with no moving parts ● Bit v. byte ○ The bit = binary digit ○ 1 bit = 2 values (1 or 0) ○ 2 bit = 4 values (10 01 11 00) ○ 3 bit= 8 values (000 010 001 100 110 111 101) ○ 8 bit = 256 values aka byte ● Decimal v. binary ○ Decimal = base 10 ■ There are 10 digits because we have 10 figures ○ Binary = base ■ We only have 1’s and 0’s ● Storage capacities ○ Kilo thousand ○ Mega billion ○ Giga billion ○ Tera billion ○ Peta quadrillion ○ Exa quintillion ● Binary arithmetic ● ASCII v. Unicode ○ ASCII ■ 7 bit (128 values) ● This takes care of 0-9 A-Z and punctuation ● Standard reference table for the english language to have it represented by a binary conversation ● How computers talk ○ UNICODE ■ Every character in the world is included ■ More than 100,000 characters represented ● Includes ASCII- universal character set Exam 2 Concepts → ● RFID Technology ○ Radio frequency identification ■ System that transmits the identity of an object or person wirelessly using radio waves

Ex: hotel cards, ezpass tag Tags→ consists of an antenna and a microchip Less than half of a millimeter in size and can be mounted on paper, etc. ○ Passive tag ■ Does not need battery power ■ Activates itself and transmits data using power generated by the ratio waves from the RFID reader ■ Usually less than 3 meter in range ■ Ex: package tag on Hanes T Shirt ○ Active tag ■ Battery powered ■ Its has an improved operating range ■ Costs more than passive tags ■ Range is greater than 100m ■ Ex: Ezpass Barcodes ○ 1 at a time ○ Requires a line of sight ■ Retail → inventory intelligence and accuracy move to RFID readers ● Radio signals with RFID tags NFC - near-field communications ○ Uses same frequency as RFID ○ Typically requires communication within 5 cm ○ Two way communication ○ Popular use for payments ■ Ex: apple pay, google wallet Bluetooth Low Energy BLE ○ Uses beacons (wall mounts) ○ Requires no pairing ○ Continuous low power connection ○ Indoor GPS alternative ■ Beacons → broadcast a unique identifier ■ Phone enters the region and triggers the app to open in the background Internet of Things (IoT) ○ Mark Weiser -- ubiquitous computing 1991 ■ A world of which objects of all kinds could sense, communicate, and act ○ 1. Sensors ○ 2. Connectivity ○ 3. People and processes: cloud computing ■ Big industry and growing ■ Impacts all industry ○ 4 billion consumer “things” are connected to the internet ● ●











● ● ●





■ By 2020 each person will own and average of 7 connected devices Potential IoT ■ Education ● Fitness ● Meal plan ● Lights ● Attendance ■ Agriculture ● Smart farming ● Sensors in fields ■ Infrastructure / transportation ● Self driving cars ■ IoP - people ● Smart beds for hospitals ● Smart buildings

Zigbee Mesh Network ○ Network topology that does not use a physical network Creating value → info value loop ○ Create - use sensors to gather info ○ communicate - transfer info from one place to another ○ Aggregate - gathering info from one or more sources at one or more times ○ Analyze - look for patterns, relationships, discoveries ○ Act - create change based on findings Cloud computing ○ How data is stored and computed ■ Application ■ Platform ■ Infrastructure ● Foundation ● Cloud hosting ○ Hosting = more servers and more success ○ Cloud computing gives you access to computing power when you need, scaling up instantly ■ Can release servers back into cloud if not using it ■ Focus on software not the hardware ○ Popularity ■ Scalability → easy to grow and shrink demand ■ Instant → availability ■ Save money → only pay for what you sue Why move to the cloud? ○ Lower cost of operations ○ Better competition and address market demands ○ Lower downtime







● ● ●





○ Always up to date ○ Security and compliance IaaS v. SaaS ○ IaaS - infrastructure as a service ■ You manage applications, data, runtime, middleware ○ SaaS - software as a service ■ Using software without thinking of it ■ Other managers Virtualization ○ Foundational element of the cloud ■ Simulating a hardware platform, operating system, storage and network resources ■ Transforms hardware → software ■ Ability to run multiple operating systems as virtual machines Amazon EC2 and S3 ○ Amazon Web Services ○ Amazon S3- simple storage (SaaS) ○ Amazon EC2 - elastic compute cloud (IaaS) Steganography ○ Technique of hiding secret data within an ordinary, non-secret, file or message Symmetric v. asymmetric cryptosystems Cryptography ○ Can immediately tell something has been tampered ○ Based on mathematics ○ Methods for transforming info in order to hide its contents ○ Keys encrypt and decrypt info ■ Cleartext → encryption technique → ciphertext → encryption key → decryption → cleartext

Caesar Ciphers ○ Shift cipher -- shift letters x numbers of places ■ +2 so decrypt -2 A=C B=D ○ Numbers as keys ○ Words as keys ■ Remove duplicate letters; start with work then remove original Caesar shift ○ NEW YORK ○ +5







● ● ● ● ●



○ SJBDTWP ○ HTHGVU ○ +7 ○ AMAZON Numbers as a key ○ APPLE ○ 623= Key APPLE 62362 GRSRG A-- 6 spaces = G P -- 2 spaces = R P -- 3 spaces = S L -- 6 spaces = R E -- 2 spaces = G Words as key ○ SYRACUSE ○ Key=Light ABCDEFGHIJKLMNOPQRSTUVWXYZ LIGHTABCDEFJKMNOPQRSUVWXYZ RYQLGURT Authentication ○ Do not just rely on a password ○ Two factor is the most common ■ Multifactor ● Something you know ● Something you have ● Something you are Privacy ○ Concerns the collection and use of your information and data Accuracy ○ Responsibility of those who collect data Property ○ Relates to who owns the data → we don’t own our own data Access ○ Responsibility of those who control and use that data Information brokers ○ Collect and sell person data ■ Acxiom ● Combined access from different companies, use and sell to 3rd parties (Acxiom) ● Sell this combined data back to the company Cookies ○ Small data files that are deposited on your hard disk from websites you visit









1st party -- giving computer a UUID ■ Generated only by websites you are visiting (weather location) ○ 3rd party -- tracking cookies ■ Generated by an advertising company that is affiliated with the website you are visiting ■ Ad tags used on almost every website through Google ■ Product following Privacy laws ○ Gramm-Leach-Bliley Act ■ Protects personal financial info ○ HIPAA ■ Protects medical records ○ FERPA ■ Resist disclosure of education ○ CCPA ■ Known as the GDPR (EU general data protection regulation) law for CA ■ California Consumer Privacy Act ● More transparent ● Computer crimes ○ Identity theft → illegal assumption of a person’s identity for economic gain ○ Data manipulation → unauthorized access of a computer network and copying files from that server ○ Ransomware → malicious software that encrypts your computer’s data and ransoms the passwords to the user ○ Denial of Service (DoS) → attempts to slow down/stop a computer system or ntwk by flooding a computer or ntwk with requests for info and data ○ Phishing → attempts to trick internet users into thinking a fake by official looking website or email is legit Malware ○ Software designed to infiltrate or damage a system without the owner’s actual knowledge ○ Virus v. worm ■ Virus = migrate through networks and attach to diff programs ■ Worms = files the computer with self -replicating information ■ Trojan horse = programs disguised as something else ACM ○ Association of Computing Machinery ■ Committee on professional ethics ■ Code of conduct



● ●













ARPANET ○ How to build redundancy ○ 4 nodes for communication (1969) ■ Allows for traffic even if node is broken Packets Application / Transport / Network Layer protocols ○ Communication protocol ■ Includes syntax and semantics ■ Consists of small acts ■ Protocols can rely on others in terms of layers ○ Internet protocol suite ■ Application ■ Transport ■ Network ■ Link ■ Physical ● Regardless of the protocol the internet works by sending out info through packets (packets switch networks) HTTP ○ Hypertext transfer protocol ○ Websites ○ 4 step process between client and web server ■ Step 4 browser closes connection ■ Connectionless or state protocol ● If it didn’t close the connection then you would have a connection to all the tabs open SMTP ○ Simple mail transfer protocol ■ Way mail servers communicate SSL/TLS ○ Secure socket layers ○ Regardless of protocol the use TCP or IP TCP ○ Transmission control protocol ○ Guarentees delievery of data IP ○ Internet protocol ○ Finds packets route that they take over the internet ○ Packets take different routes IPV4 v. IPv6 ○ Every device on the internet needs an IP address ○ First 2 #s belong to network address (SU)





● ●









○ Subnet (place and building) Domain Names ○ A text based name that corresponds to the IP address of a server that hosts the webite ICANN ○ Internet Corporation For Assigned Names and Numbers ○ Helps define how a domain system grows and expands ○ Registries and registrars WIPO ○ Deals with domain name disputes Blockchain ○ Way of keeping records ○ Blockchain came out of Bitcoin digital currency ■ Can be used for any digital transaction ■ Limitless possibilities when the focus is just on blockchain ■ No longer needed clearinghouse (bank) to manage transactions ● With blockchain its personal; uses a distributed ledger to make and verify transactions ● Block A → B (500) cannot take away a block ● Group of block transactions brought together = chain Decentralized ledger ○ Synchronized records ○ Every participant in the network keeps a copy of all the transactions ○ Transactions are secured by encryption to prevent tampering ○ Secure and transparent way to digitally tack the ownership of assets Public v. private chains ○ Public ■ Permissionless ■ Bitcoin ○ Private ■ Companies are experimenting Food safety ○ IBM Food Trust ○ Leverage several technologies: ○ RFID – trace the origin of food using simple RFID tags attached to food containers. Scanned at each point on the supply chain ○ Blockchain – Records every transaction (scan) ○ IOT – would allow consumers to have an interface into this data eBusiness v. eCommerce ○ eCommerce is a part of e business but ebusiness is larger than eCommerce ○ eCommerce→ infrastructure and data that allow one or more types of online or electronic transaction ○ eBusiness → a business activity that creates value with the assistance of networking and telecommunications technolo...


Similar Free PDFs