1st Six Weeks Flashcards

1
Q

Employee monitoring

A

using technology to monitor the work of employees using a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do companies filter their internet connections?

A

to block common sources of distractions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three examples of distractions:

A

Social networks, games, pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can companies be held legally responsible for?

A

for material sent using their computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet monitoring software

A

makes it very easy for network administrators to monitor the websites accessed by users along with the downloaded files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is monitoring most network traffic possible?

A

because it passes through a company server (LAN) before traveling to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Desktop Monitoring Software

A
  1. has remote viewing and remote desktop features which allows for interaction with another computer
  2. reports any aspect of a computer’s use: disk space use, instant message chat logs, key strokes (Key Logging).
  3. Software key loggers run in the background, silently recording key presses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acceptable Use Policy

A

 Employer’s expectations are made clear and clarify to what extent to which monitoring will occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Teleworking

A
  1. Also called telecommuting is work away from the office – either working from home or while traveling.
  2. Small percentage of employees do this because of opposition from employers
  3. Teleworkers use collaborative software to increase their productivity and maintain communication with other workers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of collaborative software in teleworking:

A

Group calendars, video conferencing, instant messaging, cloud based software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware

A

The tangible, physical parts of the computer which work together to input, process, store

and output data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware affects?

A

the performance and the way in which IT systems are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supercomputers

A

the largest, fastest, and most powerful computers available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Most supecomputers have…

A

thousands of gigabytes of primary storage and many terabytes of

secondary storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mainframes

A

also very powerful computers which share many of the same features

with supercomputers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Supercomputers are optimized for…?

A

high speed calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

mainframes are optimized for?

A

high data throughput (rate at which data is processed and output by a system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

desktop computer

A

a typical computer system with a separate screen and system unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Laptop computers

A

portable computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Input devices

A

items of hardware that allow entry of information into the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Keyboards

A

Qwerty

Dvorak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Qwerty vs Dvorak

A

Qwerty – on most standard machines

Dvorak – different layout to increase speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Concept Keyboards

A

Programmed to perform a custom function. These are often in restaurants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

List of input devices (give at leat 5)

A

 Mouse

 Numeric keypad

Bree – ITGS SL – 4TH 2

 Touchpads

 Commonly on laptops

 Touchscreens

 Commonly on ATM machines/kiosks in the mall

 Microphones

 Magnetic Stripe Readers

 Commonly on hotel key cards

 Sensors

 Used to measure some aspect of the physical world (i.e light,

 Optical Mark Recognition (OMR)

 Used for reading multiple choice-style answers i.e lottery tickets)

 Scanners

 Digital Cameras

 Web cams

 Radio Frequency Identification (RFID)

sound, vibration, temperature)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Magnetic Stripe Readers

A

Commonly on hotel key cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Sensors

A

Used to measure some aspect of the physical world (i.e light,
sound, vibration, temperature)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Optical Mark Recognition (OMR)

A

Used for reading multiple choice-style answers i.e lottery tickets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Radio Frequency Identification (RFID)

A

the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Output devices

A

 Screens/Monitors

 Speakers

 Printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Types of Storage Devices

A

Primary - inside of the computer

secondary - external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Primary storage devices

A

RAM and ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

RAM

A

temporary storage that loses its contents when the

computer is turned down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

ROM

A

primary storage that cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Secondary storage devices

A

External hard drives

 Flash drive

 Optical storage – CD’s, DVD’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Netbooks

A

laptop computers with lower specifications than normal because it is
designed for maximum portability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Internet

A

a network of all networks from schools, businesses, organizations,
universities, and homes to create one large network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Intranet

A

a network that shares information privately among the employees of an
organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Extranet

A

Allows information to be shared outside of the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Internet Service Providers (ISP).

A

Local networks such as home or business users are connected via Internet Service Providers (ISP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Network Service Providers (NSP)

A

large companies that sell access to the Internet backbone – the series of high speed links which connect major geographical areas.

41
Q

Internet Backbone

A

the series of high speed links which connect major geographical areas.

42
Q

Backbone cables often run where?

A

oceans and are usually high speed fiber optic cables

43
Q

IP addresses

A

help computers identify each other on a network, but are hard to remember.

44
Q

URL (Universal Resource Locator)

A

specifies the location of a web page on the Internet.

45
Q

Domain names

A

human readable names given to web sites.

46
Q

Domain Name System (DNS)

A

responsible for translating domain names that people type into their web browsers into IP addresses that computers use to locate each other.

47
Q

HyperText Transfer Protocol (HTTP)

A

protocol that governs communication between web servers as web browsers.

48
Q

HyperText Transfer Protocol Secure (HTTPS)

A

version of the HTTP protocol

designed to encrypt data to provide secure communication.

49
Q

Asynchronous data transfer

A

the sender and the receiver are not synchronized on a time to receive data

50
Q

Synchronous data transfer

A

when the sender and receiver are synchronized which allows for faster data transfer.

51
Q

Servers

A

– computers that “serve” or provide services to other computers

52
Q

Client

A

computer on a network that uses services provided by a server

53
Q

Hub

A

– receives data and broadcasts it to all other computers on the network

54
Q

Switches

A

smarter version of the hub, picks which computers to send the data to

55
Q

Routers

A

connect two separate networks

56
Q

Peer-to-Peer Network

A

all computes are equal and there are no centralized servers

57
Q

Local Area Network (LAN)

A

– occupies a very small geographical area i.e home, office, building, school

58
Q

Wide Area Network (WAN)

A

larger network covering countries by connecting LANs

together. Internet is the best example of a WAN

59
Q

Virtual Private Network

A

Uses encryption to allow access to a private network.

60
Q

Encryption

A

(system of encoding plain text so it cannot be understood) protects all data
sent back and forth through the network

61
Q

Security

A

The process of protecting hardware, software, and data from unauthorized access.

62
Q

Authentication

A

requires users to prove their identity so a system knows they are genuine authorized users.

63
Q

Passwords

A

are one of the most common ways of securing data, hardware, and systems.

64
Q

Biometrics

A

is the process of using part of a person’s body to identify them.

65
Q

Commonly used in biometrics

A

Fingerprints, iris patterns, face shape, and voice patterns are commonly used.

66
Q

The clear advantage of using biometrics

A

is that it cannot be lost, stolen, or forgotten.

67
Q

One disadvantage of biometrics

A

never 100% accurate due to lighting, environment, and changes in the body.

68
Q

Hacking

A

also known as cracking is used to gain access to computer systems.

69
Q

Password Cracking

A

Using software to crack or guess people’s passwords.

70
Q

brute force

A

which is trying every single combination of letters and numbers until they guess the password.

71
Q

Viruses

A

malicious programs that cause damage to computer systems

72
Q

Trojan horses

A

 Trick the user into downloading

 Spread by the user

73
Q

Spyware

A

Copies the user’s information

74
Q

Denial of Service attacks

A

Bombarding of a computer with so many requests so that it does not perform and eventually crashes.

75
Q

Distributed Denial of Services

A

Many computers attack one computer

76
Q

Avoid Malicious Software (at least 3)

A

Install up to date anti-virus software

 Have high web browser security settings

 Only download software from trusted sites

 Don’t open any unexpected email attachments

77
Q

Spam

A

 Sending unwanted messages

 419 scams or Nigerian Scams – entices user to send money to overseas bank

account

 Software known as spam bots look for email addresses on the internet

78
Q

Spam Filters

A

 Reduce the amount of spam received

 Spam blocking services monitor global spam email and make available the IP address, so it can be blacklisted by email software.

79
Q

Phishing

A

Worse than spam

 Pose as genuine businesses

 Try to get your login information

 Try to get personal information

80
Q

Encryption

A

Changing the text to fit a key so that others do not know what it is.

 Effective when sending over and unsecured network.

81
Q

Wireless Security/Wi-Fi Protected Access

A

need a password to get on a wireless network.

82
Q

Physical security

A

Lock office doors, computer cabinets, use security cables to anchor computers to a solid object.

83
Q

Operating System

A

responsible for managing and controlling all of the computer’s hardware

84
Q

User interface

A

allows the user to interact with and operate the computer

85
Q

Command Line Interface

A

user types a series of commands using the keyboard

86
Q

Graphical User Interface

A

is using the mouse or similar pointing devices

87
Q

Application Software

A

Allows the user to perform tasks to solve problems i.e. creating documents, editing images. Sometimes called productivity software

88
Q

Commercial software

A

licensed or sold for profit by the companies that create it

89
Q

Shareware

A

distributed at no cost and is free to use for a limited period of time

90
Q

Free and Open Software (FOSS)

A

allows users to use the software as they please

91
Q

Web 2.0 tools provide…

A

a way to create, edit, and share digital information.

92
Q

Web 2.0 describes…

A

a set of next-generation Internet technologies.

93
Q

These protocols and tools make it easier to (Web 2.0)

A

create online applications that behave dynamically, much like
traditional PC software.

94
Q

Allows groups of people to (Web 2.0)

A

work on a document or spreadsheet simultaneously, while in the background a
computer keeps track of who made what changes where and when.

95
Q

Web-based applications can be accessed from

A

anywhere.

96
Q

How quickly can data be shared?

A

Readily

97
Q

Social tools encourage people to

A

create, collaborate, edit, categorize, exchange, and promote information.

98
Q

Why are network efforts encouraged?

A

the more people who contribute, the better the content gets.