Study Guide Exam II

weepingwaterpickSecurity

Feb 23, 2014 (3 years and 5 months ago)

171 views

Introduction to Information Management

Exam II

Study Guide

Exam:
Friday, April 5, 2013

This exam is made up of multiple choice questions a
nd short answer question and is

worth 100 points.

The exam will
include i
nformation from
Chapters 6
-
10


Chapter concepts
and terms

you should know
:


Chapter 6



Attribute



Field



Record



File



Entity



Database and
Database Management System (DBMS) (also describe the logical view vs physical view of data)



Relational DBMS



Key fields
-

explain what primary and foreig
n keys are



Data dictionary



Normalization



Entity
-
relationship diagram



Data warehouse



Data mart



Data mining (also include the types of information obtainable from data mining)



Information policy



Data cleansing



Query



Also r
eview and study the Database Terms
document that was linked off of th
e database project instructions


Chapter 7



Network



Router



Protocol



Transmission Control Protocol (TCP/IP)



Local Area Network (LAN)



Wide Area Network (WAN)



Physical transmission media (define and identify the different
types)



Wireless transmission media



Bandwidth



Internet Service Provider (ISP)



Domain name system (DNS)



Voice over IP (VoIP)



Unified communications



Virtual private network (VPN)



Hypertext transfer protocol (HTTP)



Uniform resource locator (URL)



Web 2.0 (and s
ome of the different related technologies)



Web 3.0



Radio Frequency Identification (RFID)


Chapter 8



Types of malicious software (malware, virus, worms, trojan horses, spyware, and keylogger)


know what each is
and does



Hackers



Spoofing



Sniffer



Denial
-
of
-
Service (DoS) attack



Distributed denial of service attack (DDoS)



Identity theft



Phishing



Pharming



Click fraud



Social engineering



Risk assessment



Acceptable use policy (AUP)



Disaster recovery planning



Business continuity planning



Smart card



Biomet
ric authentication



Firewall



Secure socket layer (SSL)



Online transaction processing (OLTP)


Chapter 9



Enterprise software
/Enterprise Resource Planning (ERP)



Supply chain



Supply Chain Management (SCM) software



Just
-
in
-
time strategy



Demand planning



Bullwhip
effect



Push
-
based model



Pull
-
based model



Customer Relationship Management (CRM) software



Operational CRM



Analytical CRM



Sales Force Automation (SFA)



Cross
-
selling



Churn rate



Customer lifetime value (CLTV)


Chapter 10



Price discrimination



Price transparency



Cost transparency



Menu costs



Digital goods



Business
-
to
-
consumer (B2C) e
-
commerce



Business
-
to
-
business (B2B) e
-
commerce



Consumer
-
to
-
consumer (C2C) e
-
commerce



Portal



E
-
tailer



Content provider



Transaction broker



Market creator



Service provider



Community
provider



Advertising revenue model



Sales revenue model



Free/Freemium revenue model



Transaction fee revenue model



Affiliate revenue model



Crowdsourcing



Longtail marketing



Behavioral targeting



Electronic data interchange (EDI)



Explain building vs outsourcing

a website