Introduction to Information Management Exam II Study Guide Exam: Monday, November 5, 2012 This exam is made up of multiple choice questions and at least one short answer question. The exam is worth 100 points. The exam will include information from Chapters 6-10 and will also include database questions. Chapter concepts and terms to you should know: Chapter 6 Fields, records, files, database, entity, attribute Data redundancy and data inconsistency Data cleansing Database Management System (DBMS) Relational DBMS Primary keys, foreign keys, tuples Data definition Data dictionary Structured Query Language (SQL) Normalization Entity relationship diagram (and know what the different diagram symbols mean) Referential integrity Data warehouse Data mart Online analytical processing (OLAP) Data mining and related terms Text mining and web mining Data governance Review and study the Database Terms document that was linked off of the database project instructions. Chapter 7 Network NIC card Broadband Hubs, switches, routers, and modems Clint/Server computing Packets and packet switching Protocol TCP/IP Know the different types of networks we discussed and be able to explain the different ones. Know the different types of Physical Transmission Media we discussed and be able to explain the different ones Know the different types of Wireless transmission media and be able to explain them. Bandwidth Internet definition Internet Service Provider (ISP) IP address Domain Name System (DNS) and what different extensions mean Voice over IP (VOIP) Unified Communications Virtual Private Network (VPN) Hypertext and hypertext transfer protocol (HTTP) Search Engine, search engine marketing, and search engine optimization Web 2.0 Web 3.0 Bluetooth, Wi-Fi, Wi-Max – be able to explain and know the distances of each RFID Chapter 8 Security Controls (and know types such as general and application) War Driving Malware, Viruses, Worms, spyware, Trojan horses – be able to explain what each does Keyloggers Hackers and crackers Denial of Service (DoS), DDoS, and Botnet – be able to explain each Cyberterrorism Phishing and Pharming Identity theft Social engineering Sarbanes-Oxley Act Computer forensics Risk assessment Authentication, passwords, token, biometrics, smart cards Secure Socket Layer (SSL) Public key Encryption (PKE) Digital certificates Online transaction processing system (OLTP) Fault-tolerant computer systems Downtime High-availability computing Recover-oriented computing Deep packet inspect in (DPI) Chapter 9 Enterprise systems Enterprise software (be able to explain) Key features of an Enterprise system and business value of Supply chain Upstream Downstream Just-in-time strategy Bullwhip effect Supply chain planning systems Demand planning Supply chain execution systems Push-based model Pull-based model Business value of supply chain management systems Customer Relationship Management (CRM) Systems and different components/software for each (be able to explain) Cross-selling UP-selling Operational CRM Analytical CRM Churn Rate Chapter 10 E-Commerce How the Internet and WWW are a commercial medium for e-commerce – know all of the different reasons on pages 374-378 Information density Price transparency Cost transparency Price discrimination Customization Information asymmetry Dynamic pricing Menu costs Digital goods Types of E-commerce – know what they are and be able to explain each Know the different E-commerce business models (on pages 382-384) and related terms Know the different e-commerce revenue models Know the different types of e-commerce marketing Behavioral targeting Long tail marketing Electronic data interchange Private industrial networks Private exchange Net marketplaces Exchanges M-Commerce and some of the services and applications discussed Know the steps of building an e-commerce website (know what to look for and how they are built) Co-location