with Complete Solutions33
Virtual Private Network (VPN) - ANSWERS -a private network that uses a public network (usually
the internet) to securely connect users by using encryption
WAP (Wireless Access Point) - ANSWERS -A device that provides a connection between wireless
devices and can connect to wired networks.
Web 2.0 - ANSWERS -Web 1.0: static web - focus on static "catalog/brochure" pages of HTML
Web 2.0: interactivity; social media, user generated content; create own applications
Web 3.0: about data, searching, structures; introducing the semantic web; not just a picture-
where it was taken, what setting were used-has the metadata behind it (can search this instead
of just the picture)
WEP (Wired Equivalent Privacy) - ANSWERS -A key encryption technique for wireless networks
that uses keys both to authenticate network clients and to encrypt data in transit.
WPA2 (Wi-Fi Protected Access 2) - ANSWERS -A data encryption standard compliant with the
IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. WPA2 is
currently the strongest wireless encryption standard.
WPA (Wi-Fi Protected Access) - ANSWERS -security standard that improves on older security
standards by authenticating network users and providing more advanced encryption
techniques; generally used for wireless communications
,Acceptable Use Policy - ANSWERS -a policy that a user must agree to follow in order to be
provided access to a network or to the internet
Big Data - ANSWERS -a broad term for data sets so large or complex that traditional data
processing applications are inadequate.
data so large and complex that it can't be managed by traditional systems. Characteristic:
velocity, variety, volume, and complexity. includes structured, unstructured, and semi-
structured data. Concerns: data overload, quality (where did it come from), analysis paralysis
(where do we start), scalability, tool complexity, ROI (high cost). Big data includes inaccurate,
incomplete, incorrect, duplicate, and erroneous data. Big data can change, especially in data
streams.
Types:
Traditional Enterprise Data: customer info for example
Machine generated/sensor data
social data: customer feedback, social media sites
images from billions of devices
To manage: silos -> databases -> data warehouses
Biometrics - ANSWERS -the identification of a user based on a physical characteristic, such as a
fingerprint, iris, face, voice, or handwriting
something the user is - biometrics [facial recognition]
Bluetooth - ANSWERS -Wireless PAN technology that transmits signals over short distances
between cell phones, computers, and other devices
,Short Range (30m or less): Bluetooth (used to create small personal area networks, used for
wireless headsets, etc)
BPR (Business Process Reengineering) - ANSWERS -radical redesign of an org's business
processes; assumes things aren't working and calls for a clean sheet approach (risky). Could
mean firing people, hiring new people, replacing people with automation. It is time consuming,
expensive, can cause analysis paralysis, needs support from upper management, and has a high
failure rate. Put industry best practices in place. Top down - starts at upper management
BPM (Business Process Management) - ANSWERS -system that includes methods and tools to
support the design, analysis, and implementation, management, and continuous optimization of
core business processes throughout the org.
-Layer that manages all the BPI initiatives.
-gives techniques and tools to do monitoring, managing, optimization, allocation of resources.
-Use IT to help manage multiple BPI projects to ensure consistency and alignment.
-use BAM - business activity monitoring and BPMS - business process management suites.
BPI Business Process Improvement - ANSWERS -focus on reducing variation in the process
outputs by searching for root cause. cycle of continuously improving the org (not radical change,
just incremental improvement).
Use the six sigma model - focus on eliminating defects in processes.
DMAIC:
- define what you need to measure (existing process activities resources, inputs/outputs),
- measure it (using metrics),
- analyze the results (benchmarking, simulations, other applications)
- improving the process (identifying solutions and implementing)
, - controlling it (establish metrics and monitor).
Examples: determining bottlenecks, eliminating duplication, streamlining/combining activities -
less risky than BPR.
Bottom up - employees can identify improvements.
Business Process - ANSWERS -an ongoing collection of related activities that create a product or
a service of value to the organization, its business partners, and/or its customers.
Has three elements: inputs, resources, and outputs.
Measure efficiency and effectiveness to asses processes.
Business Process Modeling Notation (BPMN) - ANSWERS -Maps what is currently occurring to
look for inefficiencies. correct through automating, streamlining, or changing peoples roles, etc.
Circles for Events: decide to see a movie
Diamonds for decisions: purchase ticket online or in theater
Rectangle for activities using systems: buy the ticket using a computer
Rounded rectangle for activities using people: buy the ticket in person at the kiosk.
Use arrows to map the flow from event to decision to activity, etc.
Use swim lanes to organize the locations at which the events/activities/decisions take place.
CIO (Chief Information Officer) - ANSWERS -Oversees all uses of IT and ensures the strategic
alignment of IT with business goals and objectives