Flashcards in BEC MCQ 4.7 Deck (16):
In order to gain access to intranet user generally must have password
A firewall is needed to ensure that unauthorized internet users cannot organize an organizations intranet
An intranet connects geographically separate lans within an organization
Value added network
Value added network are privately owned communications network that provide additional services beyond standard data transmission. Van's provide good security because they are private networks. Van's route data transactions between partners. Routing data within company's multiple network would not normally require a van. Routing data outside the companys network would sometimes use a van
Local area network- Computer network that link buildings or adjacent buildings
WAN allow national and international communications . They usually employ non-dedicated public communication channel as their communication media. WAN communication services may be provided by value added networks or by internet based networks. If the WAN is provided by the internet based network it will not be as secure as van
are networks that directly links certain intranets of a organization with organization or individuals with which the organization may have a relationship.
Extranets need a password to access
Extranets are not backup intranets.
A Data warehouse
is an enterprise wide data base that stores data that has been extracted from various operational and external data bases from within the organization. A data warehouse stores data from both operational and management databases for current and previous years
A language processor
known as a compiler is a software that translate source code (human readable) to object code machine readable
application software can be developed or purchased internally. If the application software is purchased it is the license to use the software under certain prescribed terms and conditions. When the application software is purchased the purchaser may or may not receive the source code. the source code may or may not be escrowed. escrow of the source code supposedly protects the purchaser.
A communication or network protocol
A communication or network protocol is a set of rules that allows the various pieces of hardware and software that are included in the network to communicate..
Some of the functions of the telecommunication network are to establish an interface between the sender and receiver of the message and to transmit the message
Three tier structure
Desktop client, application and database
distributed database is a database that is distributed in some manner on different pieces of either local or remote hardware via intranet or extranet
End user databases
are databases developed by end users at their workstations. They are not normally implemented through a company local area network and are local to a specific end user work station or to a very limited number of end user work stations
is the logical process of separating data into logical tables. is the process of organizing columns and tables of a relational database
the data are stored in two dimensional tables that are releated to each other by stored information
Is the practice of mining large data for useful information. Data mining involves the process of analyzing the data to show patterns or relations in the data. Thus pattern recognition or the ability of the data mining software to recognize patterns or trends is the critical success for data mining