BA 370 After Midterm/Final BIS Flashcards
All types of software
Operating Systems, Application Programs, Programming Languages, and Firmware
1st generation programming language (1GL)
machine level programming language. made of binary numbers, 0 and 1. This makes the language suitable to be understood by the machine/hardware but very much more difficult to be interpreted and learned by the human programmer
2 GL
it is still very difficult to read or write – the programmer specifies memory addresses and special codes to perform only simple functions like compare, add, or subtract.
3GL
high-level because they are closer to human languages and further from machine language. In contrast, assembly language is considered low-level because it is very close to machine language.
SQL
special purpose programming language for retrieving data from an RDBMS and is considered a 4GL. A fourth generation programming language (4GL) attempts to get closer than 3GLs to human languages in terms of thinking and conceptualization.
Declarative Programming Language
you just specify what you want without having to say how to do it. With a Procedural Programming Language, you have to specify exact steps to get the job done. For example, SQL is a declarative language because the queries don’t specify steps to produce the result.
Source Code
computer code as written by humans and that is understandable by humans. Code written in most programming languages discussed above (except 1 GL) is source code but that code is not directly executable on a computer. A special program translates source code into machine/binary code (series of 0s and 1s) that the computer hardware can execute.
Software in two broad categories
System Software and Application Software
Operating System (OS)
system software that provides a platform and services for running different types of application software.They manage input and output devices, CPUs, memory, storage, and networking. Examples include:
•Unix
•Linux – an open source OS that is very similar to Unix
•Windows (several versions including the newest desktop Windows 8 and 10)
•Windows Server (An operating system for Servers)
•OS X (Macs)
•iOS (for IPads and IPhones)
•Android (a mobile OS used on phones and tablets)
firmware
computer software that is installed into specific devices such as printers, print servers, and various data communication devices. It is usually stored in read only form (on a memory chip called ROM - Read Only Memory - in the device’s hardware.
application software
• ERP, CRM, and SCM are examples of large application software.
• Application software also includes:
o General purpose programs with broad horizontal markets like individually focused applications (e.g. MS Office (Word, Excel, Access, Power Point), Phone apps, Audio/Video players/editors …)
o Industry specific programs developed for a specific market (e.g. BlackBoard, EMR, Airline Reservation System) - a vertical-market application
o One of a kind software (Custom Software or Tailor-made software) for very unique needs of a specific client (e.g. a custom e-commerce program for a specific company to sell online or an application that coordinate traffic data for the state of Oregon)
open source software
Open Source means the human readable source code (as explained above) is available to the public. The software may be used, altered and distributed in a variety of ways depending on the license but no royalties are paid to the original authors. The Open Source movement is more about software freedom than it is about free software.
• Richard Stallman founded the open source movement in 1983 and developed the general public license agreement -still widely used today
• Linus Torvalds developed an open source operating system similar to Unix which he called Linux in 1991
• IBM has developed a wide range of enterprise applications that run on Linux. Neither they nor their customers have to pay a licensing fee to use Linux
examples of open source software
- Apache (a web server)
- Python (a programming language)
- OpenOffice (Personal productivity software)
- MySQL (an RDBMS)
- Audacity (music/sound editing software)
- 7Zip (file compression software)
- Linux (an open source operating system)
Q3: software installed on devices such as printers and communication devices, which is usually stored on ROM, is referred to as
firmware
Q3: Software that manages the resources of the computer is called
operating system software
Q3: Which type of software is created and updated by a worldwide community of programmers and (mostly) available for free
open source
Q3: Assembly programming language is an example of a
low level language
Q3: Which of the following includes only the names of operating system software
OS X, Windows, iOS, and Android
information security (infosec)
“is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).”
threat
person or organization seeks to obtain data or other assets illegally, without owner’s permission and often without owner’s knowledge
vulnerability
opportunity for threats to gain access to individual or organizational assets
safeguard
measure individuals or organizations take to block threat from obtaining an asset
target
asset desired by threat
ex of threat: pretexting
a nefarious agent pretends to be someone else and tries to get you to disclose valuable information
ex of threat: phishing
Essentially pretexting via emails which appear to be from a legitimate source to lure a user to click on a damaging link or provide private information.
ex of threat: sniffing
equipment is used to listen in on network traffic (wired or wireless)
ex of threat: hacking
by various means, a nefarious agent breaks into a network or computer to extract or damage information
Not all hackers are malicious
White hat hackers- legitimately probe systems for weaknesses to help with security.
Black hat hackers- attack systems for illegitimate reasons.
Grey hat hackers- are white hat hackers who skirt the edges of the law.
intrusion
into a computer system / network is an attempt by an “outsider” to illegally gain access to the system /network. An intruder is anyone who accesses equipment, electronic data, files, or any kind of privileged information without proper authorization.
There are three groups of individuals (“outsiders”) that could carry out an attack (intrusion) on an information system:
1. IT personnel- are often given a wide range of access privileges to sensitive data and programs, and those privileges can be misused.
2. Users- are given narrow access, but can still find ways to commit fraud.
3. Hackers- are given no access, but are highly capable.
technical safeguards
Identification, Authentication and Authorization
Encryption
Firewalls
Malware protection
identification
username or ID