chapter review questions Flashcards

1
Q

What is a network?

A

a group of two or more devices or computers connected together for the exchange of information and for the sharing of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is internet?

A

an internet (lowercase ‘i’) is any group of linked computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four types of networks?

A
  1. personal area network (PAN)
  2. local area network Lan
  3. wide area networks
  4. internets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is internet protocol?

A

(IP) specific software used by the Internet to communicate. An IP address is a number assigned to all connection devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a server?

A

where data on the Internet is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is packets?

A

transferred data from one network to another through this hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a router?

A

transferred data from one network to another through this hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a static IP address?

A

an IP address that is assigned permanently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is dynamic Ip address?

A

a new address is assigned each time a connection is made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is domain name system?

A

translates characters used in IP addresses (either IPv4 or IPv6 format) into words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is TCP/IP

A

stands for Transmission Control Protocol/Internet Protocol. TCP refers to how software applications communicate across networks. IP refers to how to address and route data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is world wide web

A

(WWW or the web)is an interconnected system of webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hypertext transfer protocol

A

(HTTP) governs the transfer of data between a client and server computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is uniform resource locater?

A

(URL) is the address of a resource on the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is hyper text markup language?

A

(HTML) is a commonly used format for publishing web documents and content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is web 2.0

A

the second-generation Internet, based on interactivity and dynamic content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the key features of web 2.0

A

Interactivity
Folksonomy
User participation
Software as a service SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is web 3.0

A

the next evolution in the web and will include many features and tools to allow better use of webpages, smartphone apps, and IoT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is internet of things?

A

(IoT) combines connected devices with automated systems that gather data, analyze the data, and convert the data into usable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is geopgraphic information systems?

A

(GIS)capture, analysis, use, and management of spatial location information to create maps and 3D scenes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the benefits of Cloud computing?

A
  • flexibility
    • Cost savings
    • Collaborations
      • Disaster recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the disadvantages of cloud computing?

A

Downtime
Security
Limited control
Vendor agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is cloud development model

A

a framework that includes storage capacity, accessibility, computing requirements, and network requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is community cloud?

A

infrastructure designed for exclusive use by a specific community of consumers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is public cloud?
infrastructure is provisioned for open use by the general public and these are often used for file sharing and email.
26
What is a content delivery model?
(CDN) geographically distributed network server groups that work together to deliver web content to users.
27
What is cache?
a storage location where active data is placed to make it easier to access.
28
What is web services?
a set of software technologies that exchange information with each other using standardized web communication protocols and languages.
29
What is platform as a serivce?
(PaaS) providers offer hardware and software tools needed for application and software development via the Internet.
30
What is infrastructure as a service?
(IaaS) an instant computing infrastructure composed of processing, data storage, and other resources provided by a vendor.
31
What is a serverless computer?
occurs when a Cloud service provider offers backend services on an as-used basis.
32
what is cloud services security?
(Cloud security) includes policies, procedures, controls, and hardware that work together to ensure that Cloud-based systems are secure.
33
What is a virtual private network?
(VPN) hides your IP address by running your communications through a secure network.
34
what is a block chain?
stores transaction data in blocks that are linked together to form a chain.
35
what is cyrpto currency?
digital currencies that only exist on computers without any intermediary such as a bank or other financial institution.
36
who was john locke?
John Locke 1632- 1704- John locke is considered the father of liberalism. He developed the labor theory of property
37
who was adam smith?
Adam Smith 1723-1790- Considered the father of economics. He developed prinicpeles of labor division and free enterprise as the keys to an individuals wealth.
38
Who was frederick taylor?
Father of scientific management. Wrote a book called the principles of scientific management.
39
who was henri fayol?
Henri Fayol 1841-1925- | Was a frenchy engineer who delveloped principles of administration. Determined five major roles for managers
40
who was max weber?
Published the book puritan ethic and the spirit of capitalism in 1905 which aruges the basic tenents of protestantism. Wrote the nine principles of how organizations should be organized.
41
what are main fram computer?
initially used by businesses for reliable transaction processing systems
42
what is a client server network?
commonly used in businesses today with a server designed for a specific purpos
43
What is a POS or point of sale system?
cash registers, square payments
44
what is Decision Support system DSS
assist middle managers with organizational processes when a large number of inputs are changing rapidly.
45
What is the bullwhip affect?
(also known as the Forrester effect) a small error in demand forecasting can result in large errors in inventory and production.
46
What is a marketing information system?
(MKIS) integrate numerous processes related to marketing management into a single computer system.
47
What is a learning management software?
LMS) used to manage academic processes at nearly all large educational organizations.
48
what is enterprise resource planning?
incorporates a suite of business applications into a unified system.
49
What is an executive support system?
(ESS) software (or Executive Information System software, EIS) is used to extract enterprise data and transform it into executive-level reports.
50
What is flex time?
allowing employees to control their work schedules through flexible start and stop times.
51
What is a database?
a collection of data organized in a manner that allows a computer to quickly search for and retrieve information.
52
Database management systems (DBMS)
:used to store and classify information.
53
What is data reduncy?
duplication of data in a database.
54
What is data inconsistency?
when data is changed in one place in a database but not changed everywhere that data exists or changed incorrectly.
55
What is data security?
keeps data and users from identity theft, data leaks, and the misuse of data.
56
What is record
a row in a database table that includes a collection of fields.
57
What is a field?
a column in a database table that represents a characteristic of something or someone.
58
What is a foreign key?
is a field linked to another table's primary key field in a relationship between two tables in a database.
59
what is a primary key?
unique to each item in each row in a database.
60
What is referential integrity?
the accuracy and consistency of data within a table relationship.
61
What is a column?
a column in a database table that represents a characteristic of something or someone.
62
What is data dictonary?
a file or set of files containing a database's metadata.
63
what is a form?
used to control how data is entered into a database
64
What is a report?
a way to view, format, and summarize the information in a database.
65
What is SQL
(structured query langauge) the standard programming database language used for human interface and communication with relational databases.
66
What is a query
SQL statements that are generated to get information from a database are called a query.
67
What is normalizaiton?
an organized approach to breaking down and/or simplifying tables to eliminate data redundancy and undesirable data characteristics.
68
ERD (Entity Relationship Diagram)
a method used to structurally represent a database design via the use of diagrams.
69
what is NoSQL databases?
designed to handle huge data sets across many platforms.
70
What is cloud database?
built and accessed via a Cloud platform.
71
What are the four V's of big data?
Volume:a characteristic of Big Data, refers to the scale of data. Variety: a characteristic of Big Data, refers to the different forms of data. Veracity a characteristic of Big Data, attempts to ensure that the data is meaningful, true, and useful. Velocity: a characteristic of Big Data, refers to the need of Big Data to analyze data as it is changing with unprecedented speed.
72
What is business intelligence?
the software and processes that allow organizations to capitalize on the power of big data and predictive analytics.
73
what is a data warehouse?
a repository of data and information used by organizations for analysis and decision-making.
74
what is a data mart?
a subsection of a data warehouse designed and built specifically for individual departments or business functions.
75
what is in memory computing?
uses middleware software to help store data across a group of different computers.
76
OLAP(Online Analytical Processing)
included in BI software applications for report creation and analysis, complex calculations, forecasting, budgeting, planning, and predictive analysis.
77
data cubes?
OLAP stores information in these multi-dimensional structures.
78
slicing?
an OLAP tool that refers to the analysis of one level of information.
79
analytic platforms
assist large data-driven companies to analyze and interpret data.
80
data minning?
accessing external databases and internal data.
81
web minning?
uses the principles of data mining to uncover and extract information from various places on the web.
82
Web content mining (WCM)
extraction of information from web pages and documents.
83
Web structure mining(WSM)
analysis of hyperlinks, nodes, and related web pages.
84
Web usage mining (WUM
analysis of web access logs, the When, How, and Frequency websites are accessed.
85
Data administration
is responsible for the policies and procedures that are used to manage an organization’s data.
86
Data governance(DG)
includes the personnel, processes, and technology needed to oversee an organization’s data and data assets.
87
Database Administrator (DBA)
monitor and troubleshoot the database to ensure it is functional and available when needed.
88
Data quality (DQ)
the planning, implementation, and control of activities that apply quality management techniques to data, in order to assure it is fit for consumption and meets the needs of data consumers.
89
quality assesment
part of a quality audit, analyzes the quality of source data.
90
Data design
part of a quality audit, involves the creation of quality processes used to manage data.
91
Quality transformation
part of a quality audit, incorporates correction maps that correct issues in source data.
92
Quality monitoring:
part of a quality audit, examines data over a given amount of time to ensure data rules are being followed and that data is valid.
93
Data scrubbing:
also known as data cleansing, detects, removes, and corrects errors in data sets to ensure data validity.
94
Computer:
a digital device that consists of hardware and software that create data and process information.
95
Hardware:
Hardware: refers to the physical components of any computer or device.
96
Software:
refers to the programs, applications, and other instructions used by a computer
97
Four basic computing functions-
1. Computers accept input computer accept data from many sources like keyboard microphones and other sources 2. Computer compile and transform data into useful information. This is called the process function 3. Computers also provide output which means the ability to display information. This comes in the form of video audio and images. A computer must be able to store data for future use
98
Embedded computers-
a digital device that accepts inputs processes data information provides output and can store but it is part of a larger device or system. Examples digital watches programable thermostats
99
servers
a computer system in a network that is shared by multiple users
100
Two components of the Processor-
1. ALU- arithmetic logic unit performs arithmetic, comparison, and logistical operations. 2. Control unit
101
machine cycle?
the four steps that a computer goes through every time a processor executes an instruction.
102
4 steps of the machine cycle-
4 steps of the machine cycle- 1. Fetch 2. Decode 3. Execute 4. store
103
clock speed
the speed at which the processor performs operations, measured in the number of machine cycles processed per second.
104
core
on a CPU refers to the components on the chip that are needed for processing.
105
single core processor
has one ALU and one CPU
106
multi core processor
a core with two or more cores for processing.
107
hyperthreading
execute two or more instructions at the same time has to be done on multi core processor
108
cache
high-speed storage in a computer.
109
memory cache
high-speed memory used by the CPU to store frequently accessed instructions.
110
disk cache
high-speed memory used by the hard drive to store frequently accessed data.
111
ROM
(read-only memory)contains the device's boot instructions.
112
protocol
set of rules for communication between devices.
113
hot spot
a Wi-Fi transmission site.
114
IRDA
a wireless connection that uses infrared radio waves to transmit data. Used in wireless mouses and TV remotes
115
graphics
the depiction of image data on a display or output device.
116
video card
(graphics card or graphics adapter) allows you to see video on a display device.
117
pixel
the smallest element in an electronic image.
118
resolution
the clarity of an image with more pixels equaling better clarity.
119
native resoltion
the maximum resolution of a display device.
120
byte
a group of 8 bits or a multiple of 8.
121
hertz
used to measure frequency. One hertz equals one cycle per second
122
BUS
in a computer it is the channel over which information flows.
123
Address bus:
transfers information and instructions about where the data should go inside the digital device.
124
Data bus:
transmits actual data.
125
Bus width:
the amount of data that can be transmitted at a given time.
126
ASCII:
(American Standard Code for Information Interchange)this code is capable of representing letters, numbers, and symbols, for a total of 256 characters.
127
6 major roles of information systems:
1. Managing operations- payroll, human resources, finance 2. Supporting customer interactions- shopping cart software, CRM, Information technology infrastructure library ITIL 3. Making decisions- 4. Collaborating on a team 5. Gaining a competitive advantage- how do we make it strategic, it doesn’t matter, does it matter 6. Improving individual productivity- productivity software, office design, internet of things, BYOD bring your own device
128
4 components technology-
People Process Technology Data
129
cyber security
an event or condition that has the potential for accusing set loss and undesirable consequences or impact from such loss
130
Cybersecurity vulnerabilities
- weaknesses or flaws in the system security procedures design implementation and control that could be compromised accidentally or intentionally
131
Cyber security exploit.
- identification of a system vulnerability. An exploits is the means for which the vulnerability can be used by a hacker
132
A cybersecurity breach
occurs when a hacker gains unauthorized access to an organization’s systems, data, and information.
133
Spyware:
collects information about Internet surfing habits and behaviors.
134
Adware:
collects a user's web browsing history and displays targeted advertisements, redirects user's searches, and collects marketing-type data.
135
Bots :
Malicious bots self-propagate malware that infects its host and connects back to a central server.
136
Ransomware:
malware that makes a computer’s data inaccessible until a ransom is paid.
137
Rootkit:
malware that hides in the operating system and is triggered each time a computer is rebooted.
138
Keylogger:
(keystroke loggers) spyware/surveillance technology that records all actions typed on a keyboard.
139
Computer virus:.
a computer program that infects the host
140
Trojan horse:
a program that appears legitimate but executes an unwanted activity when activated.
141
MitM(man-in-the-middle) attack
is a general term for when a perpetrator positions himself in a conversation between a user and an application, either to eavesdrop or to impersonate one of the parties.
142
MitMo:
(man-in-the-phone) attacks uses a mobile device like a MitM attack
143
CIA triad:
1. Confidentiality 2. Integrity 3. Availability:
144
Data in transit:
data that is passing through networks or is located in RAM.
145
Data at rest:
data in computer storage that is rarely or never changed or changed regularly but not constantly.
146
Data in process:
data that is actively being processed and transmitted and is not stored in permanent memory.
147
Computer Fraud and Abuse Act (CFAA):
Federal act that prohibits a variety of activities.
148
Electronic Communications Protection Act (ECPA):
provides protections for communications in storage and transit.
149
Stored Communications Ac
(Title II of the ECPA) makes the intentional unauthorized access of an organization that provides electronic communication services (ECS) a criminal violation.
150
National Institute of Standards Technology Cybersecurity Framework (NIST):
assists organizations in the development of cybersecurity policies and procedures.
151
cybercrime
a crime in which a computer is the object of the crime or is used to commit a criminal or offense.
152
cyber attack
a deliberate misuse of computers and networks via the Internet.
153
Cyberwarfare:
refers to cyberattacks that come from a foreign government.
154
Penetration testing:
involves activities where white hat hackers are paid to hack into private networks and applications.
155
Crackers:
another word for hackers.
156
Malware:
(short for malicious software) is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user.
157
Computer virus:
a computer program that infects the host.
158
Trojan horse:
a program that appears legitimate but executes an unwanted activity when activated.
159
Packet sniffers:
(analyzers)capture packets transmitted over a network and can be legitimate for routine examination and problem detection or unauthorized which are used to steal information.
160
Packet capture:
the process done when packet sniffers record the data packets as they are sent over a network and copy the information to a designated file.
161
Zombie:
a computer that is controlled by a hacker in a DoS or DDoS attack and is also known as a bot.
162
Botnet: .
Botnet: a group of computers under the control of a hacker.
163
Spear phishing:
a type of email scam that is directed toward a specific person or organization.
164
Risk=
Threat X vulenrabiltiy X asset