BEC MCQ 4.7 Flashcards Preview

BEC > BEC MCQ 4.7 > Flashcards

Flashcards in BEC MCQ 4.7 Deck (16):
1

Intranet

In order to gain access to intranet user generally must have password
A firewall is needed to ensure that unauthorized internet users cannot organize an organizations intranet
An intranet connects geographically separate lans within an organization

2

Value added network

Value added network are privately owned communications network that provide additional services beyond standard data transmission. Van's provide good security because they are private networks. Van's route data transactions between partners. Routing data within company's multiple network would not normally require a van. Routing data outside the companys network would sometimes use a van

3

LAN

Local area network- Computer network that link buildings or adjacent buildings

4

WAN

WAN allow national and international communications . They usually employ non-dedicated public communication channel as their communication media. WAN communication services may be provided by value added networks or by internet based networks. If the WAN is provided by the internet based network it will not be as secure as van

5

Extranets

are networks that directly links certain intranets of a organization with organization or individuals with which the organization may have a relationship.
Extranets need a password to access
Extranets are not backup intranets.

6

A Data warehouse

is an enterprise wide data base that stores data that has been extracted from various operational and external data bases from within the organization. A data warehouse stores data from both operational and management databases for current and previous years

7

A language processor

known as a compiler is a software that translate source code (human readable) to object code machine readable

8

Application software

application software can be developed or purchased internally. If the application software is purchased it is the license to use the software under certain prescribed terms and conditions. When the application software is purchased the purchaser may or may not receive the source code. the source code may or may not be escrowed. escrow of the source code supposedly protects the purchaser.

9

A communication or network protocol

A communication or network protocol is a set of rules that allows the various pieces of hardware and software that are included in the network to communicate..
Some of the functions of the telecommunication network are to establish an interface between the sender and receiver of the message and to transmit the message

10

Three tier structure

Desktop client, application and database

11

Distributed database

distributed database is a database that is distributed in some manner on different pieces of either local or remote hardware via intranet or extranet

12

End user databases

are databases developed by end users at their workstations. They are not normally implemented through a company local area network and are local to a specific end user work station or to a very limited number of end user work stations

13

Normalization

is the logical process of separating data into logical tables. is the process of organizing columns and tables of a relational database

14

Relational database

the data are stored in two dimensional tables that are releated to each other by stored information

15

Data mining

Is the practice of mining large data for useful information. Data mining involves the process of analyzing the data to show patterns or relations in the data. Thus pattern recognition or the ability of the data mining software to recognize patterns or trends is the critical success for data mining

16

Primary function of DMS

Capacity to create and modify the database