1. Cloud Computer - The Elastic leasing of pooled computer resources over the internet
    1. Elastic because it can flex
    2. Computer resources cause you
    3. Pooled -Virtualization
      1. Virtualization - process by which one computer hosts the appearance of many computers. Operates as if installed on one’s own computer
    4. Leasing - don’t own the program, you own a license/right to use the program
    5. Over the internet
  2. SaaS
    1. Software as a service, you don’t install these yet they’re considered software
  3. PaaS
    1. (platform as a service; for big project managers and creators/developer
  4. IaaS
    1. Infrastructure as a service, Most commonly used
  5. Virtual Private Network(VPN)
      1. Lots of question on it
    1. How do Organizations use Cloud Services Securely?
        1. VPN client software that encodes messages
          1. Click on the software, input the key, then it creates a tunnel.
      1. Whenever you need to send something, that VPN encrypts your message, making readable data unreadable. Once it gets to the VPN server, it gets decrypted, making unreadable data readable.
  6. Content delivery network(CDN)
    1. System and hardware and software that stores user data in many different geographical locations and makes it available on demand.
  7. What are the advantages or disadvantages of a content delivery network. (CDN)
    1. Advantages
      1. Provide a specialized type of PaaS
      2. Minimize latency
      3. Gives studios protection from DDOS attacks.
      4. Makes info available on demand
    2. Disadvantages
      1. Impractical for many organizations
      2. Cost
      3. High cost per GB
      4. Support
      5. Maintenance
      6. Verification of the best locations
  8. What are Web-Services
    1. a standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backbone.
  9. What is the private cloud
    1. A cloud that is owned and operated by an organization for its own benefits
  10. Why do some companies like using the private cloud
    1. Creates private internet and designs applications using Web services standards.
    2. Creates a server farm and manages it with elastic load balancing
    3. Secure within organizational infrastructure
      1. Access from outside infrastructure not secure
  11. Why some people think the private cloud is not really a cloud.
      1. Private Cloud implies a hardware, storage or network that is dedicated to one person, client, or company only. This is a definition
  12. What are the advantages and disadvantages of a private cloud
  13. What are the consequences of cloud computing in the future.
  14. What is the difference between HTTP and HTTPS(security)
  15. What is the difference between cloud based and in house hosting?
    1. What are the advantages and disadvantages of each.
  16. What is the difference between database and DBMS
    1. Basic purpose of a database is to organize and keep track of things. Keep track of multiple themes
    2. DBM - used to create, process and administer a database.
    3. What is the difference between the relational and nonrelational. (SQL AND NOSQL)

    4. Why do companies want to have the No SQL database.
    5. Why do some companies will and will not be able to convert to nonSQL database
  17. What are the problems posed by multi user processing of databases
  18. What is SQL(Structured Query Language)
      1. Language used for processing database management systems.
  19. What is Metadata
      1. Data about data
  20. What is a primary key vs secondary/foreign key in database.
      1. Primary key - column or group of columns that identifies unique rows in a tablee
  21. What is the difference between relational and nonrelational database
    1. Relational
  22. In database we talk about files, fields and records
      1. Files - Tables
      2. Field - Column
      3. Record - Row
  23. What is the difference between thin and thick clients.
  24. What is the difference between a client computer and server computer
    1. Client computers for word processing, spreadsheets, database access, etc. Most client computers have software that enables connecting to a network or internet
    2. Servers provide services, such as email, web sites, large and shared databases.

  1. What is a server farm
    1. A large collection of coordinated servers
  2. Each character on your computer is represented by 8 bits, which is 1 byte.
    1. Like a switch. An open switch represents 0 or off, while 1 represents on
  3. Need to know the storage capacity data.
    1. Which is bigger
      1. MGTPEZ
    2. Need to know the order aswell
  4. Vertical, horizontal and one-of-kind software
    1. Vertical - really specific for certain companies, modifiable
    2. Horizontal - broad and for all companies, not modifiable
  5. What is firmware
    1. permanent software programmed into a read-only memory.
  6. What is cloud computing and virtualization
  7. What does open-source mean? What is the software
    1. Open source means the source code itself is not hidden so you can change it how you want to. Popular one is LINUX
  8. What is an operating system and what does it do for you.controls a computer’s resources.
    1. A program that
      1. Client operating systems - Programs that control the client computer’s resources
      2. Server operating system - Programs that control the server computer’s resources
  9. What is an open source operating system.
    1. No license needed to use it
    2. Give examples
      1. Linux kernel. The Linux kernel is a prominent example of free and open source software. ...
      2. 2) GNU Utilities and Compilers. ...
      3. 3) Ubuntu. ...
      4. 4) BSD Operating Systems. ...
      5. 5) Samba. ...
      6. 6) MySQL. ...
      7. 7) BIND. ...
      8. 8) Sendmail.

  10. What is the difference between volatile and nonvolatile memory.
    1. Volatile - main memory, requiring it to save frequently
    2. Nonvolatile - Permanent memory, hard disk
  11. What is the memory Cache.
  12. What is memory swapping
    1. When RAM is too small to hold all open programs and data, the CPU Loads new program segment into free memory
  13. What is the rule of a main memory

  14. What is a CPU
    1. (Central Processing Unit, like the brain of your computer
  15. How does a computer work?
      1. Run a program, move from secondary to main.
  16. What are porter’s five forces(tons of questions on it, at least 6)
    1. Competitive forces
      1. Competition from substitutes
      2. Competition from new competitors
      3. Competition from existing rivals
    2. Bargaining Forces
      1. Bargaining power of suppliers
      2. Bargaining power of customers
  17. What is Porter’s five forces used for?
    1. To identify sources of strong competition
    2. Use that knowledge to create a competitive strategy to combat those forces
  18. What is the business process.
    1. A network of activities for accomplishing a business function.
  19. How do we create linkage between business processes.
  20. What are the symbols we used in drawing a process map.
  21. What are the strategies organizations use to establish high switching cost

  22. What is the value chain
    1. the process or activities by which a company adds value to an article, including production, marketing, and the provision of after-sales service.

  1. What is the primary vs support activity of the value chain
    1. Primary activity - add value
    2. Support activity - facilitate efficiency
  2. What is the difference between margin, profit, price and value.
  3. Porter’s competitive strategies. What are the strategies deployed by firms
    1. Cost + Industry wide (Lower Cost across the industry)
  4. What are the difference strategies out there.
    1. PORTERS IS MUI IMPORTANTE(THERE ARE 6 Questions)
  5. What is the difference between data and information.
    1. Knowledge derived from data, where data are recorded facts or figures.
  6. What are the characteristics of good quality information?
  7. What are the components of an information system and you must understand the definitions of each.
    1. People vs process, software and hardware, bridged with data
    2. There are two sides to an information system
      1. Computer and human side
    3. Moving the work to the human side to the technology side.

  8. What is the business process modeling notation.
  9. What are the characteristic of a strong password
    1. What makes it a strong password
  10. Security systems and what they depend on
    1. Depends on behavior of users, if security procedures not followed, then hardware, software, and data components of security system are a wasted expense.
    2. Security systems have five IS components

  11. What is the difference between information systems and information technology
    1. Information technology drives development of new information systems.
      1. Products
      2. Methods
      3. Invention
      4. Standards
        1. Components = hardware + software + data.
    2. Information system = Information Technology + Procedures + People
    3. IS VS IT
      1. Avoid a common mistake: IS cannot be bought. IT can be bought because its hardware, software and databases as well as predesigned procedures.

  12. What is MIS
    1. Management
      1. What is it about
        1. Key elements
          1. Management and use
          2. Information systems
          3. Strategies
        2. Goal - Managing IS to achieve business strategies.
    2. Why is it critical for businesses to use information system(Three reasons)

      1. Future business professionals need to be able to assess, evaluate, and apply emerging information technology to business.
      2. Job security, therefore you need non-routine cognitive skills.
    3. Why is MIS a critical task for businesses
  13. What is the difference between a process system
    1. Why is it called a system;
    2. What makes a system a system
      1. Many components which are working together to complete a common goal.
  14. What are the cognitive non-routine skills
      1. Collaboration
      2. Abstract reasoning
      3. System thinking
      4. Ability to experiment
  15. Moore’s Law
      1. every 18 months the processing power of computer systems doubles
    1. How does it affect our job security and such
      1. Any routine skill can and will be outsourced to lowest bidder, so those with organization favor those with strong non-routine cognitive skills
  16. Components of a Business Process
    1. Activity - Specific task to be accomplished in a process
    2. Decision - quested to be answered, Yes or No
    3. Role - Sets of procedures
    4. Actor - person, group, department, organization, or information system
    5. Resource - people, or facilities, or computer programs assigned to roles
    6. Repository - collection of business records

Comments

Popular posts from this blog

database