Final exam study guide.
In general, on the final exam you will be responsible for understanding all the material covered so far. I will not however ask multiple choice or short answer questions on chapters or material covered before the mid-term exam.
The following topics from the materials since the mid-term exam may be covered by multiple choice, short-answer, and essay questions:
· Components of a network
· Differences between peer-to-peer, LANs, WANs.
· Media types – cable, fiber optic, coaxial, wireless.
· Internet servers - Web, Mail, FTP, IRC
· Internet communications protocols - FTP, HTTP, TCP/IP
· Web addresses (URLs vs. IP addresses)
· Internet backbone
· Internet communications hardware
· Types of e-commerce - B2B, B2C, what each is, their differences, differences in marketing to customers in each.
· Electronic marketplaces – remember the site we visited – Alibaba.com (there are many others like SteelLink.com) – and the various services offered by these marketplaces (horizontal and vertical).
· Product / service type offerings and their suitability to B2C or B2B business.
· Marketing a website – the three general objectives (optimize, publicize, monetize), search engines (indexing and ranking) , factors influencing rankings in search engines, bid-for-placement, keywords, content.
· Website design - features that are good / things to avoid (for some interesting examples visit webpagesthatsuck.com).
· Selecting a website host - the most important features / functions for site building and ongoing management to consider.
· E-commerce transaction security – encryption, secure socket layer, Secure Electronic Transaction (SET) protocol.
· EDI – what it is, what it is used for, how it works (for example, refer to the ‘Message Flow’ diagram in the PowerPoint slide).
· Client / Server infrastructure – tiered architecture (1, 2, 3, n), thin client.
· Cloud infrastructure – IaaS, SaaS, PaaS, advantages.
· Disaster recovery planning (aka business continuity planning).
Ethics, privacy and security:
· Ethics - ethical structure, ethical computer use.
· Intellectual property - copyright, pirated digital content, including movies, music, books, software and other digital content.
· Privacy - rights, individuals, employees, consumers, monitoring technologies, employer monitoring policy, European Union vs. US information privacy standards / Safe Harbor (remember our discussion about http://export.gov/safeharbor/).
· Security - information as resource to be protected, threats from employees, threats from outside the firm, precautions, types of threats (viruses, worms, denial of service attacks) types of hackers, social engineering, weblog protection.
· Bot net malware – Storm, Conficker, Stuxnet.
· Computer forensics – forensic technology for recovering hidden / lost data, places to look for data (e.g., view the Encase video about searching ‘unallocated disk space’ from the PowerPoint slide), the Sedona principles.
Emerging technology issues:
· Personal software as a service (also related to the ‘Bring-your-own-device’ group report).
· Push vs. pull technologies
· Automatic speech recognition (e.g., Dragon software)
· Virtual assistants
o For example the Denise video.
· Computing everywhere:
o For example the Sixth sense technology from the TED video we watched.
o For example display anywhere by Corning glass.
I will ask one or two questions from the group presentations. I won’t ask anything about the histories of the technologies. For each technology discussed (e.g., medial information systems, RFID, wearable computers, etc.) you should be able to describe the technology, explain some of the business benefits and problems, and recall some of the examples given. Review presentation slides at: http://www.uhh.hawaii.edu/~kburke/courses/362/362_group_presentations.html