Chapter 10: Wireless, Mobile Computing, and Mobile Commerce
Wireless: A term that is used to describe telecommunications in which electromagnetic waves,
rather than some form of wire or cable, carry the signal between communicating device
Chapter 11: Information Systems Within the Organization
11.1: Transaction Processing Systems
Transaction: Any business event that generates data worthy of being captured and
stored in a database. Millions and billions occur in large orgs every day. Ex. Pr
Professor Scott McClintock
Film Studies 104
February 23, 2013
The Lure of Disaster: The Iliad to Modern Blockbusters
Humans have always been fascinated by stories about terrible things happening
to other humans. One of the oldest stories in
Souce data automation example is a barcode scanner
Know the parts of the Central Processing Units: Microprocessor ( Control Unit, ALU, Registers)
Data registers and Primary storage is volatile with respect to data. Secondary storage is nonvolatile
Enables comp to be more flexible, share computer resources throughout org, allow geo diverse
ppl to work together, and be a critical link between entities and partners.
Lan: Network in a limited geographic area
Wan: larger geographic area, much higher cap
1 GB = 1024 MB
1 TB = 1024 GB
1 PB = 1024 TB
1 EB = 1024 PB
1 Zetabyte = 1024 EB
1 Yottabyte = 1024 ZB
Decisions made about data are very far reaching and difficult to undo once they have been made.
No questions on enterprise diagram (mod
Steps in ethical decision
Differentiate between responsibility,
accountability, and Liability.
Is everything that is unethical illegal?
Issues involving IT. (Pg 216)
Identify and define the four general
makes wireless devices more
convenient? Pg 357
is often overlooked when it comes
to smart phones and security?
of microwave transmission
systems. High-volume, long distance but
requires line of sight.
is a sat
The Intelligent Path to Fitness
Wednesday, March 26, 2014
To report on the 2011 and 2012 sales of the X310 heart rate monitor
The Intelligent Path to Fitness
X310 Yearly Sales Analysis
Getting the Look You Want
Are you intimidated by the prospect of decorating your home? If so, you definitely
are not alone. The endless choices available to todays consumer can be
overwhelming. Here are some suggestions from Pembrooke Community College
iabetes is a disease in
which the body fails to
produce or properly use
insulin. We need insulin to
convert food into the energy we
expend each day. Over 20 million
Americans suffer from this very seriou
3545 Route 18
Brandon, MS 39875
The enclosed document is an informational newsletter published by Shepherd Bay Medical
Center. We would like to make this a regular publication that focuses on health-related topics. To
Chapter 7: Information Security
7.1: Introduction to Information Security
Security: Defined as the degree of protection against criminal activity, danger, damage, and/or
Information Security: Means protecting an organizations information and info
Hardware consist of: Central processing unit, Primary storage, secondary storage, input tech,
output tech, communication tech.
Plug IT in 2: Hardware and Software
PI2.1: Introduction to Hardware
Hardware refers to the physical equipment used for the inp
RipCity Digital Customer Orders
To record orders from RipCity Digital customers
135 College Ave
What are the stages of the IS planning process?
Steps of Info Systems Planning: 1. Organization Mission 2. Organizational Strategic Plan
3. IS Strategic Plan 4. New Info Technology Architecture IS Operational Plan IS
A computer network is a system that connects computers and other devices via communications
media so that data and information can be transmitted among them.
o In a computer network, connected computers: work together, are interdependent, and
A computer network is a system that connects computers and other devices via
communications media so that data and information can be transmitted among them.
o In a computer network, connected computers: work together, are interdependent,
QUESTIONS 2 AND 3
AUTHOR. J. S. SANDOVAL.
INSTALLATION. AUDI, INC.
SECURITY. AUTHORIZED PERSONNEL ONLY.
* this program will identify the
DEBUGGING EXERCISES (1-4)
1. Line 3:
COMPUTER AVERAGE = (AMT1 + AMT2) / 2
COMPUTE AMT4 ROUNDED = AMT1 + AMT2
DIVID INTO AMT1 (or) DIVIDE AMT1 BY 2 GIVING AMT1
MULTIPLY AMT1 BY AMT3
2. From Line 3, the average of AMT1 and AMT 2 can
CHAPTER 1 INTRODUCTION
1.1 What is computer security?
1. Protection of item you value called assets of a computer system.
a. Computer systems such as hardware, software, data have value and deserve
Value of Assets:
1. Value depends on
Chapter 10 Mangement and Incidents
-document that describes how organization will address its security needs
Security Plan address seven issues
Backbone Networks (BNs)
High-speed networks that connect other networks together (LANS & BNs)
1. Access layer LANs
2. Distribution layer
a. Backbone network that connects the LANs within a building (access layer)
3. Core layer
14.1: Planning for and Justifying IT Applications
Organizations must analyze the need for the IT application.
Each IT application must be justified in terms of costs and benefits
Application portfolio: a prioritized list of both existing and pot
2.1: Business Pressures, Organizational Responses, and IT Support
*Competitive Advantage An advantage over competitors in some measure such as cost, quality, or
speed; to control of a market and to larger-than-average profits
Competitve advantages from te
Homo Conexus Most connected generation in history.
Practices continuous computing via pervasive internet.
Digital nomad - Someone who uses information technologies such as smart phones, wireless Internet
access, and Web-based applications to work remotely
Chapter 3: Data and Knowledge Management
3.1: Managing Data
The Difficulties of Managing Data
Amount of data increases exponentially with time. Most historical data must be kept for
long periods of time, and new data are added rapidly.
Chapter 8: Web 2.0 and Social Networks
8.1: Web 2.0 Underlying Technologies
Key developments of Web 1.0 were the creation of Web sites and the commercialization
of the web. Users typically have minimal interaction in 1.0. Rather, they passively receive