New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here

IST 195 Final Exam

by: Ryan Ratty

IST 195 Final Exam IST 195 - M001

Ryan Ratty
Information Technologies
J. Rubin

Almost Ready


These notes were just uploaded, and will be ready to view shortly.

Purchase these notes here, or revisit this page.

Either way, we'll remind you when they're ready :)

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

Final review sheet for IST 195 Rubin final. Exam on Monday at 3:00 PM in Watson.
Information Technologies
J. Rubin
Study Guide
50 ?




Popular in Information Technologies

Popular in Information technology

This 7 page Study Guide was uploaded by Ryan Ratty on Wednesday December 9, 2015. The Study Guide belongs to IST 195 - M001 at Syracuse University taught by J. Rubin in Fall 2015. Since its upload, it has received 42 views. For similar materials see Information Technologies in Information technology at Syracuse University.

Similar to IST 195 - M001 at Syracuse

Popular in Information technology


Reviews for IST 195 Final Exam


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 12/09/15
Lecture topics on the lST195 Final Exam 1 MOOC Massive Online Open Course Lynda Khan Academy Coursera 2 Showrooming Going into retail stores and price comparing on your smart phone and then purchasing online 3 Howard AikenMark 1 First computer created made in 1944 4 305 RAMAC Second computer created made in 1956 5 Moore s law 1965 number of transistors on a chip doubles every 24 months while increasing computing power while cost stays the same 6 Types of Computers PC Server Mainframes Super Computers Embedded Computers 7 4 main computing functions Access input process input produce output storage 8 Motherboard Hardware 9 CPU Brain of the computer 10 Control Unit vs ALU 11 TransistorsNanotechnology the more transistors the faster processing power compared to nanotechnology which is used to add transistors to chips 12 RAM Temporary memory volatile vs nonvolatile 13 CPUMemoryCache L1 closest to the CPU faster communication 14 Traditional Hard Drives vs SSD Traditional Hard Drives moving parts less expensive SSD No moving parts all digital more expensive 15 Bit vs Byte Bit Binary digit Byte 1 Bit 2 values 16 Decimal vs Binary Decimal is base 10 Binary is 2 17 Storage Capacities 18 BinaryArithmetic 19 ASCll vs UNICODE ASCll is 7 bit 128 values UNICODE more than 100000 values 20 RFlD Technology Radio Frequency Identification 21 Passive vs Active Tags Passive Occasionally on Active Longer batter always on 22 RFlD vs Barcode RFlD cannot be on metal scans multiple items saves time Barcode More accurate 23 BTLEiBeacons BTLE Bluetooth Low Energy doesn t consume a lot of battery no need to pair with device iBeacon Protocol that utilizes BTLE needs an app to receive the BTLE signal and wakes up the phone 24 People behind Operating Systems Bill Gates Ken Thompson Steve Jobs Linus Torvalds 25 Functions of Operating Systems Security GUI Backup File Storage Searching 26 Types of OS s Single User Multi User Real Time Embedded 27 SleepHibernate Sleep Saves to RAM Hibernate Saves to hard drive 28 Open source Typically free code can be redistributed and modified by anyone 29 Operator precedence PEMDAS 30 Formulas vs Functions Formulas ex 510X5 Functions built in formulas like SUM COUNT 31 VLOOKUP Searching through files for data 32 Pivot Tables Quickly analyze lots of data 33 Delimited Files Separate by characters like tabs comma 34 The four V s of Big Data Volume variety velocity veracity 35 4 Types of Data Unstructured Not formally defined or formatted Semistructured Emails because of the subject but the body is unstructured Structured Highly organized and manageable excel files Geospatial Positions of geographical info foursquare snapchat 36 ARPANET Original internet works with packets 37 Protocols HTTPSMTP SSL TCP IP HTTP Hypertext Transfer Protocol SMTP Simple Mail Transfer Protocol SSL Secure Sockets Layer TCP Transmission Control Protocol IP Internet Protocol 38 Domain NamesIP Addresses Domain Names alias for IP addresses 39 WIPO World Intellectual Protocol Organization 40 Internet of Things Nest nodes connect to base system 41 IPv6 Billions of connected devices 42 Mesh Network Each node cooperates and relays data for the network 43 Zigbee Nonprofit open wireless standard to provide foundation for Internet of Things 44 Cloud Computing Scalability instant save money 45 Storage Options External Hard Drive Solid State Drive Network Attached Storage USB CDDVD Cloud Storage 46 3 Types of Cloud computing PaaS Platform as a Service IaaS Infrastructure as a Service SaaS Software as a Service 47 Amazon EC2 and S3 EC2 Elastic Compute Cloud IaaS or PaaS S3 Simple Storage Service SaaS 48 Steganography Hides a message inside something else making the message nonobvious 49 Symmetric vs Asymmetric cryptosystems Symmetric where the same key is used to encrypt and decrypt the message Asymmetric where a pair of keys are used to encrypt and decrypt a message so that it arrives securely 50 Kryptos A sculpture that exists at CIA HQ that is one of the hardest cryptographies to figure out encrypted message 51 Substitution vs Transformation Cipher Substitution when you replace each letter with another letter in an encrypted algorithm Transformation when characters are shifted according to a regular system 52 EncryptionDecryption Encryption Scrambling up some information so it is not readable until decrypted Decryption Unscrambling information to restore it to its original form 53 Multi Factor Authentication Do not rely just on a username amp password passwords are compromised all the time two factor authentication is most common 54 Malware Rogue toolbars performance issues browser hijacking data missingcharged key logging theft of account information ransomware mobile malware rootlet hacker control 55 Virus vs Worm Virus Software program installed without permission or knowledge of user that alters the way the computer operates replicates itself to other mediacomputers Worm Like a virus but doesn t infect other files it creates copies of itself and sends them across the network 56 DDoS Attack that prevents legitimate access to a web server 57 Phishing Spoofing email from a legitimate source to trick recipient int sharing personal data 58 Ransomware when a hacker encrypts your hard drive and gets you to pay money for your files even though he still wont give back the files 59 Client vs Server Side vs Mobile Languages Client Side Scripting HTML CSS JavaScript NEED ALL 3 Server Side Programming PHP ASPNET JavaScript Ruby Python Mobile Development Java Objective C JavaScript Swift 60 Structure of a Document DTD HTML Head Title Body 61 Title Tag First thing you see SEO bookmarksfavorites use this on top of your tabs 62 Heading Tags Very important use headings to organize pages into section uses header effect to specify which distinctive font you wish to use 63 Image Types GIF Memes JPEG Pictures PNG Millions of colors 64 CSS Cascading Styles Sheets provides customization to websites through controlling each pixel separates design from content content goes to HTML 65 Div vs Span Div Change style of a set of characters or region box element you can control every pixel Span lnline event change style of a set of characters 66 eCommerce eBusiness eCommerce infrastructure and data that allow one or more types of online or electronic transactions eBusiness larger a business activity that creates value with the assistance of networking and telecommunications technologies 67 B2C B2B C2C C2B B2E G2B B2C Business to Consumer B2B Business to Business C2C Consumer to Consumer C2B Consumer to Business B2E Business to Economy G2B Government to Business 68 Venture Capital Money provided by investors to startup firms and small businesses with perceived longterm growth potential 69 PipelineDue Diligence Pipeline a process of pipelining with business Due Diligence Hardest process most paperwork see how much the company is worth based off a multiplelegal auditing customer reviews product reviewers 70 SDLC and Phases SDLC Software Development Life Cycle Phases Implementation Phase Operation Phase Support Phase Security Phase 71 Project Management The process of planning scheduling and then controlling the activities during system development 72 Gantt Chart A popular took used to plan and schedule the time relationships among project activities 73 DFD Data Flow Diagram a tool that graphically shows the flow of data in a system 74 DB Terminology Database Scheme how a database is organizedconstructed Database set of tables Table collection of related records Records collection of related fields in a database Fields every table consists of fields Primary key a unique attribute for each table Foreign key the heart of the relation 75 DB Normalization A set of principles that DB designers follow to avoid making design mistakes 76 Functions of an RDBMS Relationship Database Model Information about the data Data storage Data transformation transforms data to correct structure Security management who has access to which data Multiuser access control many users access to data 77 Data Dictionary contains attributes and characteristics for all tables 78 3 ways to look at data Physical how data is stored how it is accessed how data is modified Conceptual what we want the data to express and what relationships between data we must express View what part of the data is seen by a specific application 79 Database Keys Relations One to One Entity Relationships One entity is related to only one other entity of a particular type Not a common type of relationship One to Many Entity Relationships Most common type of relationship One entity can be related to more than one other entity A supplier can supply more than one product to company Many to Many One entity can be related to more than one other entity and those entities can be related to multiple entities of the same type as the original entity 80 SQL Structured Query Language Based on work done by IBM in 1974 for mainframes 81 Stereotypes of IT jobs Activities of an IT job Stereotypes IT people work in a cubicle Need to know code Google is the only place to get a job Activities Meetings Working within groups Proposing solutions lnterviewssurverys Training Direct interaction with CEO CIO 82 Careers in IT Ouadrants of Jobs Careers in IT Information Systems ApplicationsProduction IT Management Operations and Support Quadrants of Jobs Technical Have one or more specialty areas such as distributed databases web applications or network security Managerial People planning budgetary components Production Create make engineer or build something new chips software devices products etc Operations Keep processes running make them efficient and productive 83 Outsourcing Giving positions outside the companyto a foreign supplier Less money Focus on core of company Gives IT staff time for more strategic work


Buy Material

Are you sure you want to buy this material for

50 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Jim McGreen Ohio University

"Knowing I can count on the Elite Notetaker in my class allows me to focus on what the professor is saying instead of just scribbling notes the whole time and falling behind."

Kyle Maynard Purdue

"When you're taking detailed notes and trying to help everyone else out in the class, it really helps you learn and understand the I made $280 on my first study guide!"

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"


"Their 'Elite Notetakers' are making over $1,200/month in sales by creating high quality content that helps their classmates in a time of need."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.