It Era Finals Reviewer
It Era Finals Reviewer
It Era Finals Reviewer
COMPUTER SIMULATIONS
The use of a computer to represent the
dynamic responses of one system by the
behavior of another system modeled after it.
USES OF SIMULATION
- Computer simulations have been used to
design nuclear weapons, search for oil,
create pharmaceuticals, and design safer,
more fuel efficient cars.
- A second use of computer simulations is to
understand the world around us .
GIG ECONOMY - refers to service workers who make
- Computer simulations are also used to
a living by completing these types of short-term jobs
predict the future.
for clients.
VALIDATION OF SIMULATION
MONITORING - Its principal purpose is to identify
inappropriate use of company resources.
VERIFICATION - is the process of
- Monitoring can help detect illegal activities of
determining if the computer program
employees as well. By monitoring instant
correctly implements the model.
messaging conversations.
VALIDATION - is the process of determining
- Monitoring is also used to ensure that
if the model is an accurate representation of
customers are getting the products and
the real system.
services they need. Reviewing customer
phone calls to help desks can reveal if the
company ought to be providing its customers
with better documentation or training.
SOFTWARE ENGINEERING
- Monitoring can help an organization assess
- is the process of designing, creating, testing
the quality of the work done by its
and maintaining software.
employees.
- The term software engineering became
prominent when Margaret Hamilton used it to
MULTINATIONAL TEAMS - also known as
describe her work on the Apollo spaceflight
international teams or cross-border teams, are groups
program in the 1960s.
of people from various national
and cultural backgrounds who work together within an
SOFTWARE PROCESS - a set of related activities
organization on projects, tasks, or objectives.
that will lead to the creation of a software product.
SNS FEATURES:
- Persistence
- Replicability
- Scalability
- Searchability
IDENTITY THEFT - the misuse of another person’s TRADEMARKS - distinguish products or services
identity, such as name, Social Security number, from competitors and can include logos, names, and
driver’s license, credit card numbers, and bank symbols.
account numbers. (Dorothy Denning)
SERVICE MARKS - are specific to services rather
IDENTITY THIEVES: than physical products. They represent the quality
and standards associated with a particular service
1. DUMPSTER DIVING - looking for personal provider.
information in garbage cans or recycling
bins. COPYRIGHT - protects original works of authorship.
2. SHOULDER SURFING - looking over the
shoulders of people filling out forms. PATENT - provides investors with exclusive rights to
3. SKIMMERS - waiters or store clerks match their inventions for a limited period.
each legal swipe through a cash register with
an illegal swipe through a skimmer, a small,
battery powered credit card reader.
4. PHISHING - gathering financial information TRENDS
via spam is called phishing (pronounced
“fishing”). INTERNET OF THINGS - network of physical objects
–”things”--that are embedded with sensors, software,
FAKE REVIEWS - Some businesses try to boost and other technologies for the purpose of connecting
sales by posting fake positive reviews of their and exchanging data with other devices and systems
enterprises or posting fake negative reviews of their over the internet.
competitors.