BEC IT Flashcards
network
two or more computing devices connected by a communication channel to exchange data
what are networks used for?
file sharing, links to email systems, enabling connections to printers
Node
device connected to a network
T/F client nodes provide network resources
F - server node provides services and resources
T/F end users generally use the server directly
F - digitally or virtually
A client server network presides as the _______ of communication and grants _______ to network resources.
Used by the _______ and lacks ______ or ______.
mediator, access, internet, video screen or keyboard
peer to peer network (requires/doesn’t required) a central server.
require
in a client server environment, the “client” is likely to be the
workstation of various users
NIC/NAC
circuit boards and software that translate between network language and computer language.
T/F computers contain NIC/NACs already so they can communicate with the network out of the box?
T
Transmission media
communication link between nodes on the network
twisted pair is what kind of transmission media?
wired
satellite microwave transmission is what kind of transmission media?
wireless
what are the wired transmission media?
twisted pair, coaxial cable, fiber optic cable
which is the most reliable, fastest, most expensive, and highest capacity wired cable?
fiber optics
which is the least reliable, slowest, cheapest, and lowest capacity wired cable?
twisted pair
what are satellite microwave transmissions used for?
cell phone and WANs
What networks are bluetooth used in?
PAN
T/F bluetooth uses the same radio frequency as WIFI but with lower power consumption resulting in weaker connection
T
what are the advantages of wireless vs wired?
wireless networks are scalable, flexible, often lower cost, mobile
wired communications are reliable, more secure, and faster
what is wifi used for?
spectrum radio transmission, home networks, LANS and WANS
less reliable than wired connections
what kind of line does LAN use?
dedicated line
What do SANs do?
connect storage devices to servers and other devices
T/F SANs are local only
F - can be on a cloud purchased from a third party vendor
Match the crimes to the definitions:
Email bombing
Denial of Service Attack
logic bomb
Backdoor
Man in the middle
A. Hacker establishes a connection between two devices than then pretends to be each party thereby intercepting and interfering with messages.
B. Attacking a computer by sending thousands of identical emails
C. software allowing unauthorized access to a system by omitting normal logon procedures
D. prevents legitimate user access by taking over zombie computers and flooding the system with incomplete requests to tie up the system
E. Program planted in a system that is dormant until an event or a particular time
Man in the middle A, Email bombing B, Backdoor C, DOS D, logic bomb E,
Virus
form of malware that replicates itself within a system and may damage data
Worm
worm can replicate across many systems via email
T/F Viruses replicate over one system
T
T/F Viruses come through emails
F - worms do
What is a method of man in the middle attack?
eavesdropping
packet sniffer
formatted blocks of data carried by computer networks to monitor network packages or troubleshoot problems with network performance, but criminals can determine which packets may contain unsername and passwords
T/F accounting systems are always software based
F - way of getting raw data into FS
what does a well designed AIS need?
Audit trail
Put the steps of an AIS in order
- transactions are posted to general and subsidiary ledger
- original paper source documents are filed
3.transaction data from source documents is entered into the AIS by end user - transactions are recorded in appropriate journal
- trial balances are prepared
- financial reports are generated
3, 2, 1, 4, 5, 6
T/F information produced by AIS is made some levels of management for use in planning and controlling an organization’s activities
F - available to all
T/F AIS is best suited to solve problems where there is ambiguity
F - requires certainty and clearly defined reporting processes
What is the AIS for revenue cycle focused on?
transactions associated with sales of goods or services that produce cash or other assets
Data addition
process of adding new records to a database
Updating
Revisions to an already existing file
What are the two ways to update a database?
OLRT processing
Batch processing
Batch processing
Master files are only updated periodically
T/F batch processing has a timing delay
T