- Cloud Computer - The Elastic leasing of pooled computer resources over the internet
- Elastic because it can flex
- Computer resources cause you
- Pooled -Virtualization
- Virtualization - process by which one computer hosts the appearance of many computers. Operates as if installed on one’s own computer
- Leasing - don’t own the program, you own a license/right to use the program
- Over the internet
- SaaS
- Software as a service, you don’t install these yet they’re considered software
- PaaS
- (platform as a service; for big project managers and creators/developer
- IaaS
- Infrastructure as a service, Most commonly used
- Virtual Private Network(VPN)
- Lots of question on it
- How do Organizations use Cloud Services Securely?
- VPN client software that encodes messages
- Click on the software, input the key, then it creates a tunnel.
- Whenever you need to send something, that VPN encrypts your message, making readable data unreadable. Once it gets to the VPN server, it gets decrypted, making unreadable data readable.
- Content delivery network(CDN)
- System and hardware and software that stores user data in many different geographical locations and makes it available on demand.
- What are the advantages or disadvantages of a content delivery network. (CDN)
- Advantages
- Provide a specialized type of PaaS
- Minimize latency
- Gives studios protection from DDOS attacks.
- Makes info available on demand
- Disadvantages
- Impractical for many organizations
- Cost
- High cost per GB
- Support
- Maintenance
- Verification of the best locations
- What are Web-Services
- a standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backbone.
- What is the private cloud
- A cloud that is owned and operated by an organization for its own benefits
- Why do some companies like using the private cloud
- Creates private internet and designs applications using Web services standards.
- Creates a server farm and manages it with elastic load balancing
- Secure within organizational infrastructure
- Access from outside infrastructure not secure
- Why some people think the private cloud is not really a cloud.
- Private Cloud implies a hardware, storage or network that is dedicated to one person, client, or company only. This is a definition
- What are the advantages and disadvantages of a private cloud
- What are the consequences of cloud computing in the future.
- What is the difference between HTTP and HTTPS(security)
- What is the difference between cloud based and in house hosting?
- What are the advantages and disadvantages of each.
- What is the difference between database and DBMS
- Basic purpose of a database is to organize and keep track of things. Keep track of multiple themes
- DBM - used to create, process and administer a database.
- What is the difference between the relational and nonrelational. (SQL AND NOSQL)
- Why do companies want to have the No SQL database.
- Why do some companies will and will not be able to convert to nonSQL database
- What are the problems posed by multi user processing of databases
- What is SQL(Structured Query Language)
- Language used for processing database management systems.
- What is Metadata
- Data about data
- What is a primary key vs secondary/foreign key in database.
- Primary key - column or group of columns that identifies unique rows in a tablee
- What is the difference between relational and nonrelational database
- Relational
- In database we talk about files, fields and records
- Files - Tables
- Field - Column
- Record - Row
- What is the difference between thin and thick clients.
- What is the difference between a client computer and server computer
- Client computers for word processing, spreadsheets, database access, etc. Most client computers have software that enables connecting to a network or internet
- Servers provide services, such as email, web sites, large and shared databases.
- What is a server farm
- A large collection of coordinated servers
- Each character on your computer is represented by 8 bits, which is 1 byte.
- Like a switch. An open switch represents 0 or off, while 1 represents on
- Need to know the storage capacity data.
- Which is bigger
- MGTPEZ
- Need to know the order aswell
- Vertical, horizontal and one-of-kind software
- Vertical - really specific for certain companies, modifiable
- Horizontal - broad and for all companies, not modifiable
- What is firmware
- permanent software programmed into a read-only memory.
- What is cloud computing and virtualization
- What does open-source mean? What is the software
- Open source means the source code itself is not hidden so you can change it how you want to. Popular one is LINUX
- What is an operating system and what does it do for you.controls a computer’s resources.
- A program that
- Client operating systems - Programs that control the client computer’s resources
- Server operating system - Programs that control the server computer’s resources
- What is an open source operating system.
- No license needed to use it
- Give examples
- Linux kernel. The Linux kernel is a prominent example of free and open source software. ...
- 2) GNU Utilities and Compilers. ...
- 3) Ubuntu. ...
- 4) BSD Operating Systems. ...
- 5) Samba. ...
- 6) MySQL. ...
- 7) BIND. ...
- 8) Sendmail.
- What is the difference between volatile and nonvolatile memory.
- Volatile - main memory, requiring it to save frequently
- Nonvolatile - Permanent memory, hard disk
- What is the memory Cache.
- What is memory swapping
- When RAM is too small to hold all open programs and data, the CPU Loads new program segment into free memory
- What is the rule of a main memory
- What is a CPU
- (Central Processing Unit, like the brain of your computer
- How does a computer work?
- Run a program, move from secondary to main.
- What are porter’s five forces(tons of questions on it, at least 6)
- Competitive forces
- Competition from substitutes
- Competition from new competitors
- Competition from existing rivals
- Bargaining Forces
- Bargaining power of suppliers
- Bargaining power of customers
- What is Porter’s five forces used for?
- To identify sources of strong competition
- Use that knowledge to create a competitive strategy to combat those forces
- What is the business process.
- A network of activities for accomplishing a business function.
- How do we create linkage between business processes.
- What are the symbols we used in drawing a process map.
- What are the strategies organizations use to establish high switching cost
- What is the value chain
- the process or activities by which a company adds value to an article, including production, marketing, and the provision of after-sales service.
- What is the primary vs support activity of the value chain
- Primary activity - add value
- Support activity - facilitate efficiency
- What is the difference between margin, profit, price and value.
- Porter’s competitive strategies. What are the strategies deployed by firms
- Cost + Industry wide (Lower Cost across the industry)
- What are the difference strategies out there.
- PORTERS IS MUI IMPORTANTE(THERE ARE 6 Questions)
- What is the difference between data and information.
- Knowledge derived from data, where data are recorded facts or figures.
- What are the characteristics of good quality information?
- What are the components of an information system and you must understand the definitions of each.
- People vs process, software and hardware, bridged with data
- There are two sides to an information system
- Computer and human side
- Moving the work to the human side to the technology side.
- What is the business process modeling notation.
- What are the characteristic of a strong password
- What makes it a strong password
- Security systems and what they depend on
- Depends on behavior of users, if security procedures not followed, then hardware, software, and data components of security system are a wasted expense.
- Security systems have five IS components
- What is the difference between information systems and information technology
- Information technology drives development of new information systems.
- Products
- Methods
- Invention
- Standards
- Components = hardware + software + data.
- Information system = Information Technology + Procedures + People
- IS VS IT
- Avoid a common mistake: IS cannot be bought. IT can be bought because its hardware, software and databases as well as predesigned procedures.
- What is MIS
- Management
- What is it about
- Key elements
- Management and use
- Information systems
- Strategies
- Goal - Managing IS to achieve business strategies.
- Why is it critical for businesses to use information system(Three reasons)
- Future business professionals need to be able to assess, evaluate, and apply emerging information technology to business.
- Job security, therefore you need non-routine cognitive skills.
- Why is MIS a critical task for businesses
- What is the difference between a process system
- Why is it called a system;
- What makes a system a system
- Many components which are working together to complete a common goal.
- What are the cognitive non-routine skills
- Collaboration
- Abstract reasoning
- System thinking
- Ability to experiment
- Moore’s Law
- every 18 months the processing power of computer systems doubles
- How does it affect our job security and such
- Any routine skill can and will be outsourced to lowest bidder, so those with organization favor those with strong non-routine cognitive skills
- Components of a Business Process
- Activity - Specific task to be accomplished in a process
- Decision - quested to be answered, Yes or No
- Role - Sets of procedures
- Actor - person, group, department, organization, or information system
- Resource - people, or facilities, or computer programs assigned to roles
- Repository - collection of business records
Comments
Post a Comment