BA 370 After Midterm/Final BIS Flashcards

1
Q

All types of software

A

Operating Systems, Application Programs, Programming Languages, and Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1st generation programming language (1GL)

A

machine level programming language. made of binary numbers, 0 and 1. This makes the language suitable to be understood by the machine/hardware but very much more difficult to be interpreted and learned by the human programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 GL

A

it is still very difficult to read or write – the programmer specifies memory addresses and special codes to perform only simple functions like compare, add, or subtract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3GL

A

high-level because they are closer to human languages and further from machine language. In contrast, assembly language is considered low-level because it is very close to machine language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL

A

special purpose programming language for retrieving data from an RDBMS and is considered a 4GL. A fourth generation programming language (4GL) attempts to get closer than 3GLs to human languages in terms of thinking and conceptualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Declarative Programming Language

A

you just specify what you want without having to say how to do it. With a Procedural Programming Language, you have to specify exact steps to get the job done. For example, SQL is a declarative language because the queries don’t specify steps to produce the result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Source Code

A

computer code as written by humans and that is understandable by humans. Code written in most programming languages discussed above (except 1 GL) is source code but that code is not directly executable on a computer. A special program translates source code into machine/binary code (series of 0s and 1s) that the computer hardware can execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software in two broad categories

A

System Software and Application Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operating System (OS)

A

system software that provides a platform and services for running different types of application software.They manage input and output devices, CPUs, memory, storage, and networking. Examples include:
•Unix
•Linux – an open source OS that is very similar to Unix
•Windows (several versions including the newest desktop Windows 8 and 10)
•Windows Server (An operating system for Servers)
•OS X (Macs)
•iOS (for IPads and IPhones)
•Android (a mobile OS used on phones and tablets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

firmware

A

computer software that is installed into specific devices such as printers, print servers, and various data communication devices. It is usually stored in read only form (on a memory chip called ROM - Read Only Memory - in the device’s hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

application software

A

• ERP, CRM, and SCM are examples of large application software.
• Application software also includes:
o General purpose programs with broad horizontal markets like individually focused applications (e.g. MS Office (Word, Excel, Access, Power Point), Phone apps, Audio/Video players/editors …)
o Industry specific programs developed for a specific market (e.g. BlackBoard, EMR, Airline Reservation System) - a vertical-market application
o One of a kind software (Custom Software or Tailor-made software) for very unique needs of a specific client (e.g. a custom e-commerce program for a specific company to sell online or an application that coordinate traffic data for the state of Oregon)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

open source software

A

Open Source means the human readable source code (as explained above) is available to the public. The software may be used, altered and distributed in a variety of ways depending on the license but no royalties are paid to the original authors. The Open Source movement is more about software freedom than it is about free software.
• Richard Stallman founded the open source movement in 1983 and developed the general public license agreement -still widely used today
• Linus Torvalds developed an open source operating system similar to Unix which he called Linux in 1991
• IBM has developed a wide range of enterprise applications that run on Linux. Neither they nor their customers have to pay a licensing fee to use Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

examples of open source software

A
  • Apache (a web server)
  • Python (a programming language)
  • OpenOffice (Personal productivity software)
  • MySQL (an RDBMS)
  • Audacity (music/sound editing software)
  • 7Zip (file compression software)
  • Linux (an open source operating system)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q3: software installed on devices such as printers and communication devices, which is usually stored on ROM, is referred to as

A

firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q3: Software that manages the resources of the computer is called

A

operating system software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q3: Which type of software is created and updated by a worldwide community of programmers and (mostly) available for free

A

open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Q3: Assembly programming language is an example of a

A

low level language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Q3: Which of the following includes only the names of operating system software

A

OS X, Windows, iOS, and Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

information security (infosec)

A

“is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

threat

A

person or organization seeks to obtain data or other assets illegally, without owner’s permission and often without owner’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

vulnerability

A

opportunity for threats to gain access to individual or organizational assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

safeguard

A

measure individuals or organizations take to block threat from obtaining an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

target

A

asset desired by threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ex of threat: pretexting

A

a nefarious agent pretends to be someone else and tries to get you to disclose valuable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ex of threat: phishing

A

Essentially pretexting via emails which appear to be from a legitimate source to lure a user to click on a damaging link or provide private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

ex of threat: sniffing

A

equipment is used to listen in on network traffic (wired or wireless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ex of threat: hacking

A

by various means, a nefarious agent breaks into a network or computer to extract or damage information
Not all hackers are malicious
White hat hackers- legitimately probe systems for weaknesses to help with security.
Black hat hackers- attack systems for illegitimate reasons.
Grey hat hackers- are white hat hackers who skirt the edges of the law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

intrusion

A

into a computer system / network is an attempt by an “outsider” to illegally gain access to the system /network. An intruder is anyone who accesses equipment, electronic data, files, or any kind of privileged information without proper authorization.
There are three groups of individuals (“outsiders”) that could carry out an attack (intrusion) on an information system:
1. IT personnel- are often given a wide range of access privileges to sensitive data and programs, and those privileges can be misused.
2. Users- are given narrow access, but can still find ways to commit fraud.
3. Hackers- are given no access, but are highly capable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

technical safeguards

A

 Identification, Authentication and Authorization
 Encryption
 Firewalls
 Malware protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

identification

A

username or ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Authentication

A

verifies the person
– Password or PIN (“what you know”)
– Smart cards with chip and PIN (“what you have”)
– Biometric authentication (“who you are”)

32
Q

authorization

A

determines what a person can access

33
Q

encryption

A

the process of transforming clear text into coded, unintelligible text for secure storage or communication.

34
Q

firewall

A

simply a filter that prevents unauthorized network access. It can be a special-purpose computer or a program on a general-purpose computer or on a router.

35
Q

malicious software (malware)

A

An antivirus program can help in protecting, detecting and/or removing malware from a computer system. ex: Viruses, Trojan horses, Worms, Spyware and Adware

36
Q

symmetric encryption

A

Uses same key for encoding and decoding

37
Q

asymmetric encryption

A

Uses two keys – one for encoding, the other for decoding
Asymmetric Encryption is a form of encryption where keys come in pairs. What one key encrypts, only the other can decrypt.
A type of asymmetric encryption is also known as Public Key Cryptography, since one key is made “public” (open) while the other is kept “private” (secret).

38
Q

Two common models of intrusion detection mechanisms

A
  • Signature-based detection

* Anomaly-based detection

39
Q

Signature-based intrusion detection

A

method is very effective at detecting known threats but largely ineffective at detecting unknown threats because it compares observed events to existing threat signatures.

40
Q

Anomaly-based intrusion detection

A

method compares observed activity against expected “normal” usage profiles. When measured activity is outside baseline parameters, the system triggers an alert. Anomaly-based detection can detect new types of attacks

41
Q

Two common types of Intrusion Detection Systems (IDS)

A
  • Host-based IDS

* Network-based IDS

42
Q

Host-based IDS

A

monitors the characteristics of a single computer/host and the events occurring within that host, such as monitoring network traffic (only for that host), system logs, running processes, file access and modification, and system and application configuration changes.

43
Q

Network-based IDS

A

analyzes network traffic to identify and stop suspicious activity. They are typically deployed like a network firewall.

44
Q

RAID

A

Redundant Array of Inexpensive Disks

45
Q

RAID mirroring

A

every bit of data is written on two disks to protect against data loss

46
Q

RAID Striping

A

an individual file is spread out in “stripes” on multiple disks to improve access times (multiple read heads get parts of the file)

47
Q

RAID 5

A

redundant data with less storage. Three disks store two disks worth of data but any one disk can fail without data loss.

48
Q

cloud computing

A

“Elastic leasing of pooled computer resources over the Internet” Organizations pay for just the resources that they use. Many different organizations are able to share the same physical hardware through the use of virtualization.

49
Q

Three variations of cloud computing

A

o SaaS – Software as a Service
o PaaS – Platform as a Service
o Iaas – Infrastructure as a Service

50
Q

SaaS

A

allows users to run existing software applications by getting a subscription. Examples include:
Salesforce.com, iCloud, and Office 365.

51
Q

PaaS

A

allows users to create their own cloud applications using supplier-specific tools and services
o Vendors provide hosted computers, an OS, and possibly a DBMS
o Organizations/Individualscan develop their own apps on top of the hosted computers using the vendor provided software tools. Examples include: Microsoft Azure and Oracle on Demand

52
Q

IaaS

A
allows users to run any applications they prefer on cloud software of their own choice. Examples include:
Amazon EC2 (Elastic Cloud Computing), Amazon S3 (Simple Storage Service)
53
Q

Q4: BLANK refers to the process of transforming clear text into unintelligible text for secure storage or communication

A

encryption

54
Q

Q4: When personal characteristics such as fingerprints or retinal scans are used to authenticate users, it is called

A

biometric authentication

55
Q

Q4: Amazon.com allows organizations to use (or rent) over the Internet some of amazons computing resources in a “pay as you go” business model. This type of IT service delivery model is referred to as

A

cloud computing

56
Q

Q4: Which of following statements not an advantage commonly associated with cloud computing?

A

works equally well with or without access to a network connection

57
Q

Q4: Certain online CRM service providers let the orgs use their software remotely…

A

software as a service (Saas)

58
Q

LAN (Local Area Network)

A

supports a “single location” (although there are many other more acceptable definitions of a LAN).

59
Q

WAN (Wide Area Network)

A

supports different geographical locations.

The distinction is important because a WAN has to use others’ wires/cables to connect various devices

60
Q

internets (lowercase i)

A

are networks of networks (e.g., LANs and/or WANs that have been connected)

61
Q

The Internet (capital I)

A

is the biggest internet

62
Q

Intranets

A

are organizational internets - organizations link their networks together but don’t allow others access - public shared cables might be used but transferred data is protected for internal use only

63
Q

Extranet

A

are mostly used for business-to-business (B2B) data and information exchange

64
Q

The application layer (communication function)

A
(a web browser like Chrome or Mozilla) connects users to the network - application layer protocols formulate user tasks with a network in mind
o SMTP (Simple Mail Transfer Protocol ) manages email between clients and servers
o HTTP (Hypertext Transfer Protocol) manages requests and responses for web pages 
o FTP (File Transfer Protocol) is used to transfer files from one computer to another
65
Q

The transport and Internet layers (communication function)

A

break the message into packets, address them to the right target, and reassemble received packets into usable data

66
Q

Ethernet

A

a data link layer protocol that allows computers connected to the same hub or connected by a shared cable to talk to each other whenever they are ready

67
Q

802.11

A

wireless protocol used almost everywhere (although cellular data is different). Widely deployed versions include b, g, and n each of which is faster than the last

68
Q

Transmission speeds are most often measured in

A

in bps (bits per second); they use similar prefixes to memory sizes but it is bits (lowercase b) for speed and Bytes (capital B) for memory, e.g. kbps (kbps = kilobits per second, mbps = megabits, gpbs = giga, tbps = tera).

69
Q

Copper wires transmit at speeds up to

A

1 Gbps (Coaxial and twisted pair)

70
Q

ISP (Internet Service Provider)

A

Connects subscribing organizations to the Internet for a fee

71
Q

ICANN (Internet Corporation for Assigned Names and Numbers

A

coordinates IP addresses

72
Q

DNS (Domain Name System)

A

manages a database of domain names and associated IP Addresses. ICANN is the final authority on names. Servers all over the world work together to provide DNS resolution (i.e., finding the IP address for a website, e.g. NBA.com)

73
Q

W3C (World Wide Web Consortium)

A

Fosters standards such as HTTP (hypertext transfer protocol) and HTML (hypertext markup language)

74
Q

HTML

A

Hypertext Markup Language
describing how a document should look
Everything is mixed together and Data items are not clearly marked

75
Q

XML

A

Extensible Markup Language
allows us to create our own tags
lets organizations more easily share data across different platforms.
Structured, Clear, Understandable

76
Q

XBRL

A

Extensible Business Reporting Language
Provides an XML-based framework that can be used to create, exchange, and analyze financial reporting information. An extension to XML.