Computer Structure Final 2 Flashcards Preview

Computer Science > Computer Structure Final 2 > Flashcards

Flashcards in Computer Structure Final 2 Deck (51)
Loading flashcards...
1

An OS is a program which acts as an...... between what and what ?

interface between computer system users and the computer hardware

2

The OS provides a .......in which a user may ......

It provides a user friendly environment in which a user may easily develop and execute programs

3

If not for the OS Hardwar knowledge would be....

Mandatory for computer programming

4

The OS hides...

the complexity of hardware from uninterested users!

5

What is an Operating System?

Software which manages the overall operation of the computer system including:
Hardware( CPU, RAM, I/O)
Security
System interface
application interface

6

What is First Generation ?

Vacuum tube, single user, early operating systems

7

What is Second Generation?

Job scheduling, JCL, faster I/O, spooling, batch, files

8

What is Third Generation?

Shared processing, multiprogramming, virtual memory, DBMS

9

What is Fourth Generation?

Distributed computing, personal computers, high-speed communication, multi-media

10

What are the functions of an operation system? name 4

Manages and interacts with computer hardware
Provides and manages system security
Provides the system interface
Provides the interface for application software

11

Who created Linux

Linus Torvalds

12

Tell me three important features of Linux

1. Scientific cooperation model
2. Open source implications
3. Matured over 14 years

13

What is the internet?

The largest network of networks in the world
Uses TCP/IP protocols and packet switching
Runs on any communications substrate

14

Name two examples of Social engineering

1.An attacker calls a user on a network and claims they are from the computer support division of the network.
2.The attacker tells the user that they are having trouble with their account and then ask for the user's name and password

15

Define a dictionary attack

uses know passwords and many variations (upper and lower case and combinations ) to try to log in to your account

16

Define brute force attack

means the attackers uses every possible combination of characters for the password

17

Name some ways to prevent password cracking name 6

1.Don't use passwords that are dictionary words
2.Don't use your user name
3.Don't use your user name backwards
4Limit the number of log in attempts
5.Make your password sufficiently long with an alpha numeric combination
6. Change passwords often

18

name a way to enhance security with strong passwords

A sentence

19

Biometrics technology can be used for what two different purposes

Verification and identification

20

Name five different biometric verifications

1.Fingerprinting matching
2.hand geometry
3.Iris or retinal scans
4.Speech recognition
5.Face recognition

21

What is a Hacker?

Anyone who unlawfully accesses a computer system

22

Name the types of Hackers?

White hat " just helping"
Black hat " give me that"
Script Kiddies " show me"

23

What do hacker do?

Steal information from computers
Internet packer sniffing
Commit identity theft

24

What are some Hacker tool?

Worms
Trojan Horses
Bombs

25

Name some Denial of Service Attacks

Back door program: Trojan horse-Zombies
Denial of service attacks

26

What is a Virus?

A Virus is a piece of malicious piece of code that when run on you machine will open a backdoor to the machine, might start a program that attacks other applications.

27

What are worms?

Are a type of computer virus that typical proliferate by themselves

28

Today how are most viruses exchanged?

Via attachments via email

29

What is Antivirus Software?

Programs designed to detect viruses
detect know viruses

30

What is a Firewall?

Acts as a security gateway between two networks: usually between trusted and untrusted networks