Beruflich Dokumente
Kultur Dokumente
Protocol: Defines the procedures that different computers follow when they transmit and receive
data
Data Warehouse: A single repository of database information integrated from multiple large
databases and other information sources is called a Data Warehouse
Datamart: A data warehouse that is limited in scope. It contains selected information of the
company’s business, for example, finance data, inventory data
Telecommunications: Refers to the transmission of all types of information including digital data,
voice, fax, sound and video from one location to another over some type of network
Deterministic systems
Stochastic systems
Website: Webpages are formatted using hypertext and have embedded links that connect
documents to one another. A website is a collection of webpages linked to a home page
Portal: Portals are defined as gateways to the web and are those sites which users set as their home
page. Eg: Google, Bing, Yahoo etc.
Authentication: Authentication refers to the ability to know that a person is who he or she claims to
be
Podcasts:
GPS:
GIS:
PDM: Product data management is the business function often within product lifecycle management
that is responsible for the management and publication of product data.
PLM: Product lifecycle management (PLM) is an information management system that can integrate
data, processes, business systems and, ultimately, people in an extended enterprise. PLM software
allows you to manage this information throughout the entire lifecycle of a product efficiently and
cost-effectively from ideation, design and manufacture through service and disposal.
Second life
EAI (Enterprise Application Integration): Enterprise application integration is the use of software and
computer systems' architectural principles to integrate a set of enterprise computer applications.
Database Schema
Virtual Database
Virus: A rogue software program that attaches itself to other software programs or data files in
order to be executed, usually without user knowledge or permission
Worms: Independent computer programs that copy themselves to from one computer to another
over a network; rely less on human behaviour
Trojan Horse: This is something that appears to be benign but then does something other than
expected. Not a virus but a way for viruses to be introduced into a computer system
Fuzzy Logic: It is a rule based technology that that can prevent imprecision by creating rules that use
approximate or subjective values. It can describe a particular phenomenon or process linguistically
and then represent that description in a small number of flexible rules. Used to create software
systems that use tacit knowledge where there is linguistic ambiguity
IPS (Intrusion Detection system): This features full time monitoring tools placed at the most
vulnerable points or hotspots of corporate networks to detect and deter intruders continuallyAn
Tacit Knowledge: Knowledge residing in the minds of employees that has not yet been documented
OLTP: Online transaction processing is information systems that facilitate and manage transaction-
oriented applications, typically for data entry and retrieval transaction processing
OLAP (Online Analytical Processing): Uses multidimensional data analysis that allows users to view
the same data in different ways using multiple dimensions.
DSS
Artificial Intelligence: Consists of computer based systems that attempt to emulate human
behaviour like learning languages, accomplish physical tasks etc.
Expert Systems: These are an intelligent technique for capturing tacit knowledge in a very specific
and limited domain of human expertise. These systems capture the knowledge of skilled employees
in the form of a set of rules in a software system that can be used by others in the organization
Machine Learning: It is the study of how computer programs can improve the their performance
without explicit programming.
Neural Networks: These are used for solving complex, poorly understood problems for which large
amounts of data have been collected. They find patterns and relationships in massive amounts of
data that would be too complicated for humans to analyze
EDI – Electronic Data Interchange: This enables computer-to-computer exchange between two
organizations of standard transactions such as invoices, bills etc. These are automatically transmitted
eliminating printing and handling of paper.
Non-repudiation
Phishing: Involves setting up fake websites or sending email messages that look like those of
legitimate businesses to ask users for confidential information
Pharming: Pharming redirects users to a bogus webpage, even when the individual types the correct
web page address into his or her browser.
Click Fraud: Occurs when an individual or computer program fraudulently clicks on an online ad
without any intention of learning about the advertiser or making a purchase
Evil Twins: These are wireless networks that pretend to offer trustworthy WiFi connections over the
internet such as those in airports.
Dumpster diving: a popular form of modern salvaging of waste in large commercial, residential,
industrial and construction containers to find items that have been discarded by their owners, but
that may prove useful to the picker. It is not confined to dumpsters specifically, and may cover
standard household waste containers, landfills or small dumps.
Rootkit
Keylogger: Record every keystroke made on a computer to steal serial numbers for software
DOS (Denial Of service): Hackers flood a network server or Web server with many thousands of false
communications or requests for services to crash the network
DDOS (Distributed Denial of Service): Uses numerous computers to inundate and overwhelm the
network from numerous launch points
Botnet: Perpetrators of DOS use ‘zombie’ PCs affected with malicious software without their owners’
knowledge and organized into a Botnet. They are created by using bot malware. The infected
computer then becomes a slave, helping launch into DOS
War Driving: Eavesdroppers drive by buildings or parks outside and try to intercept wireless network
traffic
Firewall: A firewall is a combination of hardware and software that control the flow of incoming and
outgoing network traffic. It prevents unauthorized users from accessing private networks
Types of Models:
Narrative
Physical
Schematic
Mathematical
Attacks:
Interruption
Interception
Modification
Fabrication
Cryptography:
Encryption
Plaintext
Cyphertext
Algorithm
Data Mining: Provides insights into corporate data that cannot be obtained with OLAP by finding
hidden patterns and relationships in large databases and inferring rules from them to predict future
behaviour
Data cleansing: Also known as data scrubbing, consists of activities for detecting and correcting data
in a database that are incorrect