1st Six Weeks Flashcards

1
Q

Employee monitoring

A

using technology to monitor the work of employees using a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do companies filter their internet connections?

A

to block common sources of distractions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three examples of distractions:

A

Social networks, games, pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can companies be held legally responsible for?

A

for material sent using their computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet monitoring software

A

makes it very easy for network administrators to monitor the websites accessed by users along with the downloaded files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is monitoring most network traffic possible?

A

because it passes through a company server (LAN) before traveling to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Desktop Monitoring Software

A
  1. has remote viewing and remote desktop features which allows for interaction with another computer
  2. reports any aspect of a computer’s use: disk space use, instant message chat logs, key strokes (Key Logging).
  3. Software key loggers run in the background, silently recording key presses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acceptable Use Policy

A

 Employer’s expectations are made clear and clarify to what extent to which monitoring will occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Teleworking

A
  1. Also called telecommuting is work away from the office – either working from home or while traveling.
  2. Small percentage of employees do this because of opposition from employers
  3. Teleworkers use collaborative software to increase their productivity and maintain communication with other workers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of collaborative software in teleworking:

A

Group calendars, video conferencing, instant messaging, cloud based software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware

A

The tangible, physical parts of the computer which work together to input, process, store

and output data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware affects?

A

the performance and the way in which IT systems are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supercomputers

A

the largest, fastest, and most powerful computers available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Most supecomputers have…

A

thousands of gigabytes of primary storage and many terabytes of

secondary storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mainframes

A

also very powerful computers which share many of the same features

with supercomputers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Supercomputers are optimized for…?

A

high speed calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

mainframes are optimized for?

A

high data throughput (rate at which data is processed and output by a system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

desktop computer

A

a typical computer system with a separate screen and system unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Laptop computers

A

portable computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Input devices

A

items of hardware that allow entry of information into the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Keyboards

A

Qwerty

Dvorak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Qwerty vs Dvorak

A

Qwerty – on most standard machines

Dvorak – different layout to increase speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Concept Keyboards

A

Programmed to perform a custom function. These are often in restaurants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

List of input devices (give at leat 5)

A

 Mouse

 Numeric keypad

Bree – ITGS SL – 4TH 2

 Touchpads

 Commonly on laptops

 Touchscreens

 Commonly on ATM machines/kiosks in the mall

 Microphones

 Magnetic Stripe Readers

 Commonly on hotel key cards

 Sensors

 Used to measure some aspect of the physical world (i.e light,

 Optical Mark Recognition (OMR)

 Used for reading multiple choice-style answers i.e lottery tickets)

 Scanners

 Digital Cameras

 Web cams

 Radio Frequency Identification (RFID)

sound, vibration, temperature)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Magnetic Stripe Readers
Commonly on hotel key cards
26
Sensors
Used to measure some aspect of the physical world (i.e light, sound, vibration, temperature)
27
Optical Mark Recognition (OMR)
Used for reading multiple choice-style answers i.e lottery tickets)
28
Radio Frequency Identification (RFID)
the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information.
29
Output devices
 Screens/Monitors  Speakers  Printers
30
Types of Storage Devices
Primary - inside of the computer | secondary - external
31
Primary storage devices
RAM and ROM
32
RAM
temporary storage that loses its contents when the | computer is turned down
33
ROM
primary storage that cannot be changed
34
Secondary storage devices
External hard drives  Flash drive  Optical storage – CD’s, DVD’s
35
Netbooks
laptop computers with lower specifications than normal because it is designed for maximum portability.
36
Internet
a network of all networks from schools, businesses, organizations, universities, and homes to create one large network.
37
Intranet
a network that shares information privately among the employees of an organization.
38
Extranet
Allows information to be shared outside of the organisation
39
Internet Service Providers (ISP).
Local networks such as home or business users are connected via Internet Service Providers (ISP).
40
Network Service Providers (NSP)
large companies that sell access to the Internet backbone – the series of high speed links which connect major geographical areas.
41
Internet Backbone
the series of high speed links which connect major geographical areas.
42
Backbone cables often run where?
oceans and are usually high speed fiber optic cables
43
IP addresses
help computers identify each other on a network, but are hard to remember.
44
URL (Universal Resource Locator)
specifies the location of a web page on the Internet.
45
Domain names
human readable names given to web sites.
46
Domain Name System (DNS)
responsible for translating domain names that people type into their web browsers into IP addresses that computers use to locate each other.
47
HyperText Transfer Protocol (HTTP)
protocol that governs communication between web servers as web browsers.
48
HyperText Transfer Protocol Secure (HTTPS)
version of the HTTP protocol | designed to encrypt data to provide secure communication.
49
Asynchronous data transfer
the sender and the receiver are not synchronized on a time to receive data
50
Synchronous data transfer
when the sender and receiver are synchronized which allows for faster data transfer.
51
Servers
– computers that “serve” or provide services to other computers
52
Client
computer on a network that uses services provided by a server
53
Hub
– receives data and broadcasts it to all other computers on the network
54
Switches
smarter version of the hub, picks which computers to send the data to
55
Routers
connect two separate networks
56
Peer-to-Peer Network
all computes are equal and there are no centralized servers
57
Local Area Network (LAN)
– occupies a very small geographical area i.e home, office, building, school
58
Wide Area Network (WAN)
larger network covering countries by connecting LANs | together. Internet is the best example of a WAN
59
Virtual Private Network
Uses encryption to allow access to a private network.
60
Encryption
(system of encoding plain text so it cannot be understood) protects all data sent back and forth through the network
61
Security
The process of protecting hardware, software, and data from unauthorized access.
62
Authentication
requires users to prove their identity so a system knows they are genuine authorized users.
63
Passwords
are one of the most common ways of securing data, hardware, and systems.
64
Biometrics
is the process of using part of a person’s body to identify them.
65
Commonly used in biometrics
Fingerprints, iris patterns, face shape, and voice patterns are commonly used.
66
The clear advantage of using biometrics
is that it cannot be lost, stolen, or forgotten.
67
One disadvantage of biometrics
never 100% accurate due to lighting, environment, and changes in the body.
68
Hacking
also known as cracking is used to gain access to computer systems.
69
Password Cracking
Using software to crack or guess people’s passwords.
70
brute force
which is trying every single combination of letters and numbers until they guess the password.
71
Viruses
malicious programs that cause damage to computer systems
72
Trojan horses
 Trick the user into downloading  Spread by the user
73
Spyware
Copies the user’s information
74
Denial of Service attacks
Bombarding of a computer with so many requests so that it does not perform and eventually crashes.
75
Distributed Denial of Services
Many computers attack one computer
76
Avoid Malicious Software (at least 3)
Install up to date anti-virus software  Have high web browser security settings  Only download software from trusted sites  Don’t open any unexpected email attachments
77
Spam
 Sending unwanted messages  419 scams or Nigerian Scams – entices user to send money to overseas bank account  Software known as spam bots look for email addresses on the internet
78
Spam Filters
 Reduce the amount of spam received  Spam blocking services monitor global spam email and make available the IP address, so it can be blacklisted by email software.
79
Phishing
Worse than spam  Pose as genuine businesses  Try to get your login information  Try to get personal information
80
Encryption
Changing the text to fit a key so that others do not know what it is.  Effective when sending over and unsecured network.
81
Wireless Security/Wi-Fi Protected Access
need a password to get on a wireless network.
82
Physical security
Lock office doors, computer cabinets, use security cables to anchor computers to a solid object.
83
Operating System
responsible for managing and controlling all of the computer’s hardware
84
User interface
allows the user to interact with and operate the computer
85
Command Line Interface
user types a series of commands using the keyboard
86
Graphical User Interface
is using the mouse or similar pointing devices
87
Application Software
Allows the user to perform tasks to solve problems i.e. creating documents, editing images. Sometimes called productivity software
88
Commercial software
licensed or sold for profit by the companies that create it
89
Shareware
distributed at no cost and is free to use for a limited period of time
90
Free and Open Software (FOSS)
allows users to use the software as they please
91
Web 2.0 tools provide...
a way to create, edit, and share digital information.
92
Web 2.0 describes...
a set of next-generation Internet technologies.
93
These protocols and tools make it easier to (Web 2.0)
create online applications that behave dynamically, much like traditional PC software.
94
Allows groups of people to (Web 2.0)
work on a document or spreadsheet simultaneously, while in the background a computer keeps track of who made what changes where and when.
95
Web-based applications can be accessed from
anywhere.
96
How quickly can data be shared?
Readily
97
Social tools encourage people to
create, collaborate, edit, categorize, exchange, and promote information.
98
Why are network efforts encouraged?
the more people who contribute, the better the content gets.