COMP FLUENCY ONLINE
COMP FLUENCY ONLINE CGS 2060
Popular in Course
verified elite notetaker
verified elite notetaker
verified elite notetaker
verified elite notetaker
Econ 2304 - Microeconomic Principles
verified elite notetaker
Popular in Computer General Studies
This 6 page Class Notes was uploaded by Edwina Schroeder on Thursday September 17, 2015. The Class Notes belongs to CGS 2060 at Florida State University taught by David Gaitros in Fall. Since its upload, it has received 50 views. For similar materials see /class/205366/cgs-2060-florida-state-university in Computer General Studies at Florida State University.
Reviews for COMP FLUENCY ONLINE
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 09/17/15
Concepts Exam 2 Study Guide Know the difference between Offshoring and Outsourcing Outsourcing is a business use of an outside company to take over portions of its workload Offshoring relocates an entire production line to another location typically in another country with cheaper labor lower taxes or other financial benefits Know what ContentFiltering software Spam Filtering and Surveillance Software are Content filtering software works with the Web browser to check each Web site for indecent materials defined by the installer of the software and only allows quotdecentquot Web pages to be displayed What is the study of Ethics Computer Ethics deals with what is generally considered right or wrong in regards to computer use What is Globalization Globalization refers to changes in societies and the world economy resulting from dramatically increased international trade and cultural exchange The largest contributors to globalization are computers a global telecommunication infrastructure and the Internet Know that blogs vlogs and podcasts are consumer generated medias Be aware of the issues concerning censorship and electronic surveillance on the internet Censorship is when a government or authority controls speech and other forms of expression Issues Protestors strikes Surveillance is the close monitoring of behavior Computercontrolled surveillance technologies combined with ubiquitous networks and powerful information processing systems have made it possible to gather huge quantities of information video audio and communications signals and process them to reveal personal information Companies like Choice Point gather personal information and sell it to other companies What is a Zombie Computer A computer that carries out actions often malicious under the remote control of a hacker either directly or through spyware or a virus is called a zombie computer Know these terms Virus Spyware and Worm Firewall Popup blocker A virus is a program that attaches itself to a file spreads to other files and delivers a destructive action called a payloadThere are many types of viruses A worm does not attach itself to other files but rather acts as a free agent replicating itself numerous times in an effort to overwhelm systems Worms and viruses are often spread through the Web email chat and filesharing networks Spyware is software installed on a computer without the user s knowledge to either monitor the user or allow an outside party to control the computer Afirewall is network hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous Know some ofthe causes of Carpal Tunnel Syndrome Keyboard use for example Carpel tunnel syndrome is the aggravation of the pathway for nerves that travel through the wrist What are phishing scams A phishing scam combines both spoofed email and a spoofed Web site in order to trick a person into providing private information What security levels are available on wi networks and what the default settings are Use the Access Points configuration utility to 0 Disable the Access Point s broadcasting to make the access point invisible to the general public 0 Change the Access Point s password from the default 0 Set the Access Point to only allow certain computers MAC addresses to connect O Encrypt data being sent over the network with WEP or WPA Newly purchased access points typically have no security features enabled making it easy for any wireless device to connect What is quotWar Drivingquot in reference to wireless networks War drivers cruise neighborhoods looking for accessible wifi networks Know routine safeguards for protection against data destroyed by malicious software and hacking attempts Back up data and information What is encryption Encryption uses highlevel math functions and computer algorithms to encode data How does biometrics work and how can they be used to secure computers Biometrics is the science and technology of authentication by scanning and measuring a person s unique physical features such as fingerprints retinal patterns and facial characteristics How to select a safe password For a password to be effective it should be strong by including words that are unrelated to your interests and include upper and lowercase letters numbers and symbols 0 unique don t use the same password for your bank account as you do for your email account 0 changed regularly change your password twice a year Ethics and laws concerning sharing of MP3 and other copyright material Piracy involves the illegal copying use and distribution ofdigital intellectual property such as software music and movies The annual cost of piracy in is estimated to be 42 billion for the music industry 61 billion for the motion picture industry 33 billion for the software industry Plagiarism involves taking credit for someone else s intellectual property typically a written idea by claiming it as your own Read about Security Holes Software Patches and Cryptography Security holes are software bugs that allow violations of information security Software patches are corrections to the software bugs that cause security holes What is considered intellectual property Intellectual property refers to a product of the mind or intellect over which the owner holds legal entitlement Know about identity theft and internet fraud Identity theft is the criminal act of using stolen information about a person to assume that person s identity typically for financial gain Internetfraud is the crime of deliberately deceiving a person over the Internet in order to damage them and to obtain property or services from him or her unjustly What is Total Information Security Total Information Security involves securing all components of the global digital information infrastructure 0 Personal Computers 0 Business Computer Systems 0 Government Systems 0 International Systems Five steps of new information systems development Hardware acquisition software acquisition user preparation personnelhiring and training site preparation data preparation installation testing startup user acceptance How many thoughts can the human brain carry out per second A million billion What is Al Artificial Intelligence is an area of computer science that deals with simulating human thought and behavior in computers Study Group Decision Support systems Know the good and bad points GDSS or computerized collaborative work system is designed to provide effective support in group decisionmaking settings GDSS software called groupware helps with joint work group scheduling communication and management Flexibility Support for anonymous input Reduction of negative group behavior Support of positive group behavior No meeting or direct face to face interaction Know Transaction Processing System TPS Management Information SystemMS Decision Support SystemDSS and Expert SystemsES A Transaction Processing System TPS is an information system that supports and records transactions Capture and update databases that provide the largest source of input to management information systems MIS is an information system designed to provide routine information to managers and decision makers Sheds light on a widerange of common daytoday business decisions Management information systems filter and process the data to output reports that help users plan control organize and monitor operations more efficiently and effectively Management information systems also create summary or application databases containing data that has been processed or summarized into a form useful to managers DSS supports decision making for specific unique and difficult decisions ES is a computerized system that acts or behaves like a human expert in a field or area an information system that can make suggestions and reach conclusions in much the same way that a human expert can a subfield ofartificial intelligence What is a Virtual Reality System Virtual reality is a computer simulated environment or event Review Scheduled Reports Demand Reports Exception Report Drill Down Report Scheduled Reports are produced periodically on a schedule daily weekly monthly quarterly annually etc Demand Reports are developed to get certain information at a person s request Exception Reports are automatically produced when a situation is unusual or requires action Drill down clilcking links through a series of web pages to find additional information Know the component of an Arti cial Intelligence System What are ECommerce and Mcommerce systems E Commerce refers to systems that support electronically executed business transactions M commerce is a form of ecommerce that takes place over wireless mobile devices such as handheld computers and cell phones Popular mcommerce products and services include ring tones games music videos messaging services etc Know what a proximity payment system is Proximity payment systems make use of Infrared Near Field Communication NFC or RFID technologies to support contactless payments using a cell phone Know what 323 C2C and C23 systems are Businesstoconsumer BZC Businesstobusiness BZBused the most Consumertoconsumer CZC Database Topics DBMS Distributed Database Relational Database Data Mining SQL and Object Oriented DBMS consists of a group of programs that manipulate the database and provide an interface between the database and the user or the database and application programs Distributed Database Example Goes from headquarters to retail warehouse research and user ReIationaI database tables are linked related through common fields Data Manipulation Language DML is a specific language provided with the DBMS that allows people and other database users to access modify and make queries about data contained in the database and to generate reports Structured Query Language SQL The most popular DML Data Mining the process of extracting information from a data warehouseconnecting the dots Object Oriented 00 development follows a defined system development life cycle much like the SDLC The life cycle phases can be and usually are completed with lots of iterations CGSZO6O Concept Exams 2 Study Guide Chapter 7 Topics Know the functions of a DBMS include Protecting data organizing data storing important data and performing routine tasks Individuals use personal databases to store addresses and contact information keep track of important dates and keep track of valuables That a table in a Relational Database has rows and columns Know that an Attribute is a column in a table and contains values of the same type Know what a key and primary key is The Relational Model is the most popular type Know the definition ofa Data Manipulation Language Data mining is the process of extracting data from a data warehouse Know the definition of a distributed database Chapter 8 Topics Know that WiFi technologies helped move ecommerce from desktops to mobile devices The iPhone is credited with having created a market for online mobile apps Be able to recognize examples of Transaction Processing Systems TPS Be able to recognize examples of BusinesstoBusiness BusinesstoConsumer and Consumer toConsumer systems Shopping by the web allows consumers to comparison shop and read customer reviews Near Field Communications NFC RFID Infared and Bluetooth are all examples of private close range communications Know the definition of MCommerce Chapter 9 Topics Decision making involves three steps Intelligence Design and Choice Know what each of the different stages of design involve Programmed decisions involve routine situations with known solutations NonProgrammed decisions involve unusual or exceptional situations An optimization model finds the best solution An MIS pulls data from one or more databases sifts through the data and produces useful reports Another term for MIS is Business Intelligence A Decision Support System DSS focuses on unstructured and semistructured problems Chapter 10 Topics Know the definition of Project Leader Project Coordinator and Project Manager Know the definition of a Software Engineer Know the definition of Offshoring Outsourcing and Globalization A Request for Proposal is generated when an organization wants in IT Vendor to submit a bid for a new or modified system Chapter 11 Topics Know the definition of Total Information Security Know that Credit Card fraud makes up for 20 percent of the ID theft cases Protection of individual property can take many forms including copyrights trademarks trade secrets and patents A copyright projects the rights of an individual for life plus 70 years Know the definition of a Trademark patent and trade secret Software patches are corrections to software errors or vulnerabilities The most common cause of data loss is hardware failure A backup that stores the files that have changed since the last backup is called an incremental Know the definition of War driving Chapter 12 Topics Carpal Tunnel Syndrome is an example of Repetitive Stress Disorder Solid State Drives have no moving parts and are faster and use less energy than regular hard drives Know the definition of censorship Know that content filtering software works with a web browser to limit the what a user can access Privacy issues that you should be concerned with include freedom from intrusion freedom from surveillance and control over the information collected about one s self Know the definition of cookies and what they are used for Know the P2P peertopeer networks are used to share files Digital divides can be based upon sex ethnicity race age income location and disability