Professional Documents
Culture Documents
What is IT infrastructure?
Set of physical devices and software required to operate
enterprise.
2 What are the components/elements of IT Infrastructure?
a. Computing platforms providing computing services
b. Telecommunications services
c. Data management services
d. Application software services
e. Physical facilities management services
f. IT management, education, and other services
3 Service platform perspective?
Technical view and Behavioral view.
4 To develop better IT infrastructure technology, what are
factors/you consider what things?
a. Business Strategy
b. IT Strategy
c. Information Technology
5 What are the computing sources available now?
In Moors low, he said that:
a. The power of Microprocessor double in every 18
months
b. Computing power double every 18 months
c. The price of computing falls by half every 18 months
6 Traditional Economies VS. Network Economies/ Metcalfs
law?
Traditional economy maintain law of diminishing return
and the other side Network economy maintain law of
increasing returns.
7 Declining Communication cost?
As communication costs fall toward a very small number
and approach 0, utilization of communication and
computing facilities explodes.
8 What is Standards and network effects?
a. Specifications that establish the compatibility of
products and the ability to communicate in a network
b. Unleash powerful economies of scale and result in
Chapter: 6
1
If You maintain the file traditionally, what kind of problems you should
face?
a. Data redundancy
b. Data inconsistence
c. Program data dependent
d. Lack of flexibility
e. Poor security
f. Lack of data sharing and availability
What is Database?
Serves many applications by centralizing data and controlling
redundant data
What is DBMS?
A database management system (DBMS) is system software for
creating and managing databases.
Relational DBMS?
RDBMS is the basis for SQL. Represent data as twodimensional tables, Each table contains data on entity and
attributes
What is Operations of a Relational DBMS?
a. Select
b. Join
c. Project
What is Big data?
Massive sets of unstructured/semi-structured data
from Web traffic, social media, sensors, and so on
Write down contemporary tools of business intelligence infrastructure?
9
1
0
1
1
a. Data warehouses
b. Data marts
c. Hadoop
d. In-memory computing
e. Analytical platforms
What is Data warehouse?
Stores current and historical data from many core operational
transaction systems
What is Data marts?
Subset of data warehouse
Describe about the analytical tools from business intelligence?
a. OLAP
b. Data mining
c. Text mining
d. Web mining
How do you manage on your establishing database an information
policy?
a. Data administration
b. Data governance
c. Database administration
Chapter: 7
1
TCP/IP Model?
a. Application layer
b. Transport layer
c. Internet layer
d. Network interface layer
How does internet work? Write the features of IAB, W3C & ICANN?
a. IAB- Internet Architecture Board is responsible for the
1
0
1
1
1
2
1
3
1
4
3G VS 4G ?
1
5
CDMA Vs GSM ?
1
6
Chapter: 8
1
unauthorized changes)
d. Disasters
e. Use of networks/computers outside of firms control
f. Loss and theft of portable devices
Types of Malware?
a. Viruses - Rogue software program that attaches itself to other software
b.
c.
d.
e.
f.
Hackers Vs Crackers ?
Computer Crime ?
any violations of criminal law that involve a knowledge of computer
Identity theft
Phishing
Evil twins
Pharming
Click fraud
Cyberterrorism and Cyberwarfare
1
0
1
1
1
2
1
3
Software controls
Hardware controls
Computer operations controls
Data security controls
Implementation controls
f. Administrative controls
Application controls ?
a. Specific controls unique to each computerized application, such as
payroll or order processing
b. Include both automated and manual procedures
c. Ensure that only authorized data are completely and accurately
processed by that application
d. Others:
1) Input controls
2) Processing controls
3) Output controls
Security policy ?
a. Acceptable use policy (AUP)
b. Authorization policies
c. Identity management
Authentication ?
a. Password systems
b. Tokens
c. Smart cards
1
4
1
5
1
6
d. Biometric authentication
Types of Encryption ?
a. Symmetric key encryption
b. Public key encryption
Security in the cloud ?
a. Responsibility for security resides with company owning the data
b. Firms must ensure providers provides adequate protection
c. Service level agreements
Securing mobile platforms ?
a. Security policies should include and cover any special requirements for
mobile devices
b. Mobile device management tools
1. Authorization
2. Inventory records
3. Control updates
4. Lock down/erase lost devices
5. Encryption
c. Software for segregating corporate data on devices