BMIS300 Revision Sheet - Final - Fall 2023-2024
BMIS300 Revision Sheet - Final - Fall 2023-2024
Chapter 5
Defining IT Infrastructure
IT infrastructure is the shared technology resources playing a major role in the business today. It is
a set of physical devices and software required to operate an enterprise. But IT infrastructure is also
a set of firm-wide services including the following:
- Computing platforms: provide computing services that connect employees, customers, and
suppliers into a coherent digital environment, including large mainframes, midrange computers,
desktop and laptop computers, and mobile handheld devices.
- Telecommunications services: provide data, voice, and video connectivity to employees,
customers, and suppliers.
- Data management services: store and manage corporate data and provide capabilities for
analyzing the data.
- Application software services: including online software services, that provide enterprise-wide
capabilities such as enterprise resource planning, customer relationship management, supply
chain management, and knowledge management systems that are shared by all business units.
- IT management services: plan and develop the infrastructure, coordinate with the business units
for IT services, manage accounting for the IT expenditure, and provide management services.
- IT education services: provide training in system use to employees.
- IT standard services: provide the firm with IT policies and standards.
Page 1 of 11
Current Trends in Computer Hardware
The main current hardware trends are the following:
- Emerging mobile digital platform: the new mobile digital computing platforms have emerged as
alternatives to PCs and larger computers. Smartphones have taken on many functions of
handheld computers, including transmission of data, surfing the Web, transmitting e-mail and
IM, displaying digital content, and exchanging data with internal corporate systems. They also
include: smartphones, netbooks, tablet computers, digital e-books, and wearable devices.
- Consumerization of IT & BYOD: the availability and ease of use of mobile devices (phones,
pads, etc.) helped employees to work from any location, leading to the concept of BYOD.
Consumerization of IT: Any new technology in the market spreads automatically to business
organizations. Forces businesses and IT departments to rethink how IT equipment and services
are acquired and managed.
- Virtualization: allows a single physical resource to act as multiple resources (i.e., run multiple
instances of OS). Allows access to resources without any restriction to physical configuration or
geographical location. Reduces hardware and power expenditures. Facilitates hardware
centralization. Server virtualization is an example to host multiple systems on a single machine.
- Cloud computing: model in which computer processing, storage, and software are provided as a
pool of virtualized resources over the Internet. Main characteristics: on demand self-service,
ubiquitous network access, location independent, rapid elasticity and measured service.
Cloud computing consists of 3 main types: Infrastructure as a service (IaaS) - Software as a
service (SaaS) - Platform as a service (PaaS). Clouds can be public or private. Allows companies
to minimize IT investments.
- Edge computing: is a method of optimizing cloud computing systems by performing some data
processing on a set of linked servers at the edge of the network, near the source of data. This
reduces the amount of data flowing back and forth between local computers and other devices
and the central cloud data center.
- High performance processors: another way to reduce power requirements, is the use of more
efficient power saving processors. Multicore processor: circuit where two or more processor
cores attached for better performance and reduce power consumption. Working on minimized
power consumption processors to extend battery life on mobile devices.
Page 2 of 11
- Java & HTML: Java is an operating system independent, processor independent programming
language designed to run on any computer or device. Java is used in Web browsers. A Web
browser: tool for displaying Web pages and other Internet resources (Ex: Google Chrome,
Mozilla Firefox, Internet explorer….).
HTML: Hyper Text Markup Language. It is a Web page description language to display text,
graphics, video, sound and links to other Web pages creating dynamic pages with multimedia.
- Software packages: prewritten commercially available set of software applications. Main
vendors include SAP and Oracle. Powerful software packages to support the firm’s primary
business processes. Example: Payroll system, Accounting system, Invoicing system.
- Cloud-based software: software hosted on powerful servers that could be reached with an
Internet connection. Access to cloud software through Web browsers from any location and any
hardware device.
Page 3 of 11
Chapter 6
A database is a group of related files. A File is a group of records of same type. A Record is a group
of related fields. A Field is a group of characters as word(s).
Page 5 of 11
Chapter 7
Types of Networks
There are many kinds of networks and many ways of classifying them. One way for classifying the
different types of networks is in term of their geographic scope.
- Local Area Network (LAN): designed to connect personal computers and other digital
devices within an office, or a building (around 500-meter scope). LANs are also used to link
to long distance wide area networks around the world, using the Internet. Usually, one of
the computers in a LAN is a dedicated server to control all the devices on the network
(client/server architecture). The server determines who gets access to what and how. The
router is used to connect a LAN to another network. LANs may use a peer-to-peer
architecture without the use of a server.
- Metropolitan Area Network (MAN): a network that spans a metropolitan area, usually a city
and its major suburbs. Its geographical scope falls between a LAN and a WAN.
The basic idea is to start with a LAN, then connecting many LANs in large area forms a
MAN.
- Wide Area Network (WAN): a network that spans a broad geographical distances (states,
regions, countries, or the entire globe). The most universal and powerful WAN example is
the Internet. Computers connect to a WAN through public networks, such as the telephone
system, or through private cable systems and leased lines…
Page 6 of 11
Wireless Computer Networks and Internet
Access
- Bluetooth: popular name for the 802.15 wireless networking standard. Useful for personal
area networks (PAN) linking up to 8 devices maximum in a very short range (10 meters).
Widely used for smart devices (earphones, sensors…).
- Wi-Fi: popular name for the 802.11 wireless technology standard. Can connect many
devices at longer distances (50 to 100 meters) and at higher communication speed. In most
Wi-Fi networks, wireless devices communicate using a device called an access point.
- WiMAX: popular name for the 802.16 wireless standard known as Worldwide
Interoperability for Microwave Access. Has a very long access range (30 to 50 miles) with
high transmission speeds. Requires powerful antennas to transmit high speed Internet
connections to rooftop antennas of homes and businesses.
In inventory control and supply chain management, RFID systems capture and manage more detailed
information about items in warehouses or in production much more than a traditional barcode system.
Page 7 of 11
Chapter 8
- Internet vulnerabilities: Large public networks such as the Internet, are more vulnerable than
internal networks because they are virtually open for everyone. When the Internet links to the
corporate network, the organization’s systems are even more vulnerable to actions from
outsiders. Vulnerability has also increased from widespread use of email, instant messaging, and
file sharing programs.
- Wireless security challenges: Both Bluetooth and Wi-Fi networks are subject to hacking by
eavesdroppers. Networks are easily penetrated by outsiders armed with laptops, wireless cards,
and hacking software. Hackers use these tools to detect unprotected networks, monitor network
traffic, and gain access to corporate networks.
- Viruses: A computer virus is a rogue software program that attaches itself to other software
programs or data files to be executed, usually without the knowledge or permission of the user.
Most computer viruses deliver a payload. The payload may be relatively benign (not harmful),
such as displaying unwanted messages or images, or it may be highly destructive (destroying
programs and data). Viruses typically spread from one computer to another when users take
actions like exchanging data (sending emails, copying files, etc…).
- Worms: Worms are independent programs that copy themselves from one computer to another
on the network without being attached to other programs and thus they less depend on user
actions. Worms destroy data and programs as well as disrupt or even halt the operations of
computer networks.
- Trojan Horses: Many malware infections are Trojan Horses. A Trojan Horse is a software
program that appears to be benign but then it starts to do something other than expected. It is
not itself a virus because it does not replicate, but it is often a way for viruses to be introduced
into a computer.
Page 8 of 11
- Spyware: Some types of spyware also act as malicious software. These small programs install
themselves on computers to monitor user web surfing activities and serve up advertising.
Thousands of forms of spyware exist and many users find them annoying and invading their
privacy. Keyloggers record every keystroke made on a computer to steal vital information
(passwords, credit card numbers, etc.).
- Spoofing and sniffing: Hackers attempting to hide their true identities often spoof, or
misrepresent, themselves by using fake email addresses or masquerading as someone else.
Spoofing may also involve redirecting a web link to a different address. A sniffer is a type of
eavesdropping program that monitors information travelling over a network.
- Denial of service attacks: When hackers flood a network server with many thousands of false
communications or requests for services to crash the network.
- Computer crime: Most hacker activities are criminal offenses, and the vulnerabilities of systems
we just described makes them targets for other types of computer crimes. A computer crime is
defined as any violations of criminal law that involve a knowledge of computer technology for
their prosecution.
- Identity theft: With the growth of the Internet and e-commerce, identity theft has become a major
concern. Identity theft is a crime in which an imposter obtains key pieces of personal information
(social security number, credit card number, etc.) to impersonate someone else. The information
is mostly used to obtain credit, merchandise, or services in the name of the victim.
Page 9 of 11
Chapter 10
Why E-commerce is Different
E-commerce has many unique features including the following:
- Ubiquity: in traditional commerce, the market place is physical (you have to visit to buy).
E-commerce is ubiquitous, meaning that it is available online everywhere and at all times.
- Global reach: e-commerce technology permits commercial transaction to cross cultural and
national boundaries. The potential market size is almost equal to the size of the world.
- Universal standards: the standards of the Internet used in e-commerce are universal
standards. Any computer or software in any place in the world can communicate with any
other one.
- Richness: refers to the complexity and content of a message. The web permits to deliver
rich commercial messages with text, audio, video, and animation.
- Interactivity: e-commerce technologies are interactive, they allow for two-way
communication between merchant and consumer like face-to-face communication.
- Information density: the Internet and the Web increase the information density, total amount
and quality of information available. Price and cost transparency refers to the ease with
which consumers can find a variety of prices in the market with their related costs.
Types of E-commerce
The three major electronic commerce categories are business-to-consumer (B2C) e-commerce,
business-to-business (B2B) e-commerce, and consumer-to-consumer (C2C) e-commerce.
- E-tailer: Online retail stores in all sizes (like Amazon, Ali express…). Customers connect
to e-tailers online through the Internet. They provide low-cost shopping 24 hours over 7
days.
- Content provider: content is defined as to include all forms of intellectual properties
(tangible and intangible products of the mind for which the creator claims property rights).
- Transaction broker: sites that process transactions for consumers normally handled in person
are called transaction brokers (mostly for financial services).
- Market creator: sites that build a digital environment in which buyers and sellers can meet
for business transactions (Airbnb).
- Service Provider: offer services online like data backup, photo sharing, etc. Software is no
longer a physical product but rather it became a service that can be shared online.
- Community provider: sites that create a digital online environment where people with
similar interests can transact (buy and sell), share ideas, interests, photos, videos…
Page 11 of 11