Info magt Final Flashcards

(47 cards)

1
Q

LAN- Local Area Network

A
  • Span area of up to a half mile

- Usually all computers in one building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAN- Metropolitan Area network

A

Spans medium size geographic areas like a city

common use includes college campus or corporate facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN- Wide network area

A

spans large geographic areas like some cities, state, countries, could have global reach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISP- Internet Service provider

A

A commercial organization with a permanent connection to the internet
ISPs sell temporary connection to retail subscribers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Switch- 50 ports

A

connects all devices together on a computer network

forwards data only to computer requesting the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modem

A

converts data signals from digital, a discrete, a binary wave forma to analog and from analog back to digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NOS- Network operating system

A

Software that usually resides in the server but could also co-exist with client software in same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

protocol

A

set of rules and procedures governing transmission of information between points in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transmission control protocol/ internet protocol (Tcp/IP)

A

Universal standard allowing companies to buy best of brand components alleviating concern for compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packet switching

A

A method of slicing a message into panels called packets, creates standard size making the most efficient use of network paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Domain names

A

are used a pseudonyms for numbered address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

domain name system

A

coverts domain name to the numerical representation when presented to the internet network
a domain name is usually a network LAN connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware meaning

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

virus

A

Rough software that attaches itself to data files, email, or programs to be executed by some unknown event without user knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worms

A

Programs that copy themselves from one computer to other computers over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

Requesting confident information from users via face web sites or emails that look like they come from legitimate organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

sniffing

A

A type of eavesdropping program that monitors information traveling over a network communication line, very difficult to detect. When used legitimately they help identify network problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

click fraud

A

Repeatedly clicking on the online adds of competitors to drive up advertising cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Gramm-Leach-Biles Act

A

Financial modernization act, requires financial institutions to ensure the security and confidentiality of consumer data.

20
Q

Data security

A

Monitor for unauthorized access changes and destruction of data

21
Q

MIS Audit

A

Examine the firm’s overall security environment and controls governing individual information system

22
Q

Token

A

Small device that displays a member (passcode) to be used when logging into a system. The number changes every x seconds and is synchronized with the computer system. should be used in conjunction with a password

23
Q

Biometrics

A

system that reads and interprets human traits such as finger prints, irises, voice, retinal images to provide identification

24
Q

fire walls

A

prevents unauthorized communication into and out of the network

25
Antivirus. antispyware software
effective only against malware already known. Hence, updates are required
26
Gantt Chart
Visual representation of timing and duration of tasks, not relationship between task.
27
PERT Chart (program evaluation and review technique)
Graphically depicts tasks, their sequence and interrelationships
28
A device that acts as a connection point between computers and can filter and forward data to specified destination
Switch
29
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called
Packet switching
30
Which signal type represented by a continues form
Analog
31
Which protocol is the internet based on
TCP/ IP
32
In telecommunications network architecture, a protocol is
a standard set of riles and procedures for control of communications in a network
33
A network that covers entire geographical region is most commonly referred to as an
wide area network
34
(T/F) | Telephone networks are fundamentally different from computer networks
True
35
(T/F) | Computer worms spread much moe rapidly than computer viruses
True
36
``` (T/F) An NOS (network operating system) must reside on a dedicated server computer in order to manage a network ```
False
37
(T/F) | The Domain name system (DNS) converts IP addresses to domain names
False
38
(T/F) The larger the system project, the more risk in terms of being completed on time, within budget, and according to project requirments
True
39
(T/F) | A gantt chart graphically depicts project tasks and their interrelationships
False
40
(T/F) | Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers
True
41
Sniffing is a security challenge that is most likely to occur in which point of a network
Communication lines
42
A fire wall allows the organization to
Prevent unauthorized communication both into and out of the network
43
The ______ consist of analyst, specialist from relevant end-user business areas, application programmers, and perhaps database specialists
Project team
44
The worth of systems from financial perspective essentially revolves around the issue of
Return on invested capital
45
Change management is a process that
should be addressed before the project is developed
46
An independent computer program that copies itself from one computer to another over a network is called a
Worm
47
The Gramm-Leach-Bliley act
Requires financial institutions to ensure the security of consumer data.