chapter review questions Flashcards
What is a network?
a group of two or more devices or computers connected together for the exchange of information and for the sharing of resources.
What is internet?
an internet (lowercase āiā) is any group of linked computer networks.
What are the four types of networks?
- personal area network (PAN)
- local area network Lan
- wide area networks
- internets
What is internet protocol?
(IP) specific software used by the Internet to communicate. An IP address is a number assigned to all connection devices.
What is a server?
where data on the Internet is stored.
What is packets?
transferred data from one network to another through this hardware.
What is a router?
transferred data from one network to another through this hardware.
What is a static IP address?
an IP address that is assigned permanently.
What is dynamic Ip address?
a new address is assigned each time a connection is made.
What is domain name system?
translates characters used in IP addresses (either IPv4 or IPv6 format) into words.
What is TCP/IP
stands for Transmission Control Protocol/Internet Protocol. TCP refers to how software applications communicate across networks. IP refers to how to address and route data packets.
What is world wide web
(WWW or the web)is an interconnected system of webpages
What is hypertext transfer protocol
(HTTP) governs the transfer of data between a client and server computer.
What is uniform resource locater?
(URL) is the address of a resource on the web.
What is hyper text markup language?
(HTML) is a commonly used format for publishing web documents and content.
What is web 2.0
the second-generation Internet, based on interactivity and dynamic content.
What are the key features of web 2.0
Interactivity
Folksonomy
User participation
Software as a service SaaS
What is web 3.0
the next evolution in the web and will include many features and tools to allow better use of webpages, smartphone apps, and IoT.
What is internet of things?
(IoT) combines connected devices with automated systems that gather data, analyze the data, and convert the data into usable information.
What is geopgraphic information systems?
(GIS)capture, analysis, use, and management of spatial location information to create maps and 3D scenes.
What are the benefits of Cloud computing?
- flexibility
- Cost savings
- Collaborations
- Disaster recovery
what are the disadvantages of cloud computing?
Downtime
Security
Limited control
Vendor agreements
what is cloud development model
a framework that includes storage capacity, accessibility, computing requirements, and network requirements.
What is community cloud?
infrastructure designed for exclusive use by a specific community of consumers.
what is public cloud?
infrastructure is provisioned for open use by the general public and these are often used for file sharing and email.
What is a content delivery model?
(CDN) geographically distributed network server groups that work together to deliver web content to users.
What is cache?
a storage location where active data is placed to make it easier to access.
What is web services?
a set of software technologies that exchange information with each other using standardized web communication protocols and languages.
What is platform as a serivce?
(PaaS) providers offer hardware and software tools needed for application and software development via the Internet.
What is infrastructure as a service?
(IaaS) an instant computing infrastructure composed of processing, data storage, and other resources provided by a vendor.
What is a serverless computer?
occurs when a Cloud service provider offers backend services on an as-used basis.
what is cloud services security?
(Cloud security) includes policies, procedures, controls, and hardware that work together to ensure that Cloud-based systems are secure.
What is a virtual private network?
(VPN) hides your IP address by running your communications through a secure network.
what is a block chain?
stores transaction data in blocks that are linked together to form a chain.
what is cyrpto currency?
digital currencies that only exist on computers without any intermediary such as a bank or other financial institution.
who was john locke?
John Locke 1632- 1704- John locke is considered the father of liberalism. He developed the labor theory of property
who was adam smith?
Adam Smith 1723-1790- Considered the father of economics. He developed prinicpeles of labor division and free enterprise as the keys to an individuals wealth.
Who was frederick taylor?
Father of scientific management. Wrote a book called the principles of scientific management.
who was henri fayol?
Henri Fayol 1841-1925-
Was a frenchy engineer who delveloped principles of administration. Determined five major roles for managers
who was max weber?
Published the book puritan ethic and the spirit of capitalism in 1905 which aruges the basic tenents of protestantism. Wrote the nine principles of how organizations should be organized.
what are main fram computer?
initially used by businesses for reliable transaction processing systems
what is a client server network?
commonly used in businesses today with a server designed for a specific purpos
What is a POS or point of sale system?
cash registers, square payments
what is Decision Support system DSS
assist middle managers with organizational processes when a large number of inputs are changing rapidly.
What is the bullwhip affect?
(also known as the Forrester effect) a small error in demand forecasting can result in large errors in inventory and production.
What is a marketing information system?
(MKIS) integrate numerous processes related to marketing management into a single computer system.
What is a learning management software?
LMS) used to manage academic processes at nearly all large educational organizations.
what is enterprise resource planning?
incorporates a suite of business applications into a unified system.
What is an executive support system?
(ESS) software (or Executive Information System software, EIS) is used to extract enterprise data and transform it into executive-level reports.
What is flex time?
allowing employees to control their work schedules through flexible start and stop times.
What is a database?
a collection of data organized in a manner that allows a computer to quickly search for and retrieve information.
Database management systems (DBMS)
:used to store and classify information.
What is data reduncy?
duplication of data in a database.
What is data inconsistency?
when data is changed in one place in a database but not changed everywhere that data exists or changed incorrectly.
What is data security?
keeps data and users from identity theft, data leaks, and the misuse of data.
What is record
a row in a database table that includes a collection of fields.
What is a field?
a column in a database table that represents a characteristic of something or someone.
What is a foreign key?
is a field linked to another tableās primary key field in a relationship between two tables in a database.
what is a primary key?
unique to each item in each row in a database.
What is referential integrity?
the accuracy and consistency of data within a table relationship.
What is a column?
a column in a database table that represents a characteristic of something or someone.
What is data dictonary?
a file or set of files containing a databaseās metadata.
what is a form?
used to control how data is entered into a database
What is a report?
a way to view, format, and summarize the information in a database.
What is SQL
(structured query langauge) the standard programming database language used for human interface and communication with relational databases.
What is a query
SQL statements that are generated to get information from a database are called a query.
What is normalizaiton?
an organized approach to breaking down and/or simplifying tables to eliminate data redundancy and undesirable data characteristics.
ERD (Entity Relationship Diagram)
a method used to structurally represent a database design via the use of diagrams.
what is NoSQL databases?
designed to handle huge data sets across many platforms.
What is cloud database?
built and accessed via a Cloud platform.
What are the four Vās of big data?
Volume:a characteristic of Big Data, refers to the scale of data.
Variety: a characteristic of Big Data, refers to the different forms of data.
Veracity a characteristic of Big Data, attempts to ensure that the data is meaningful, true, and useful.
Velocity: a characteristic of Big Data, refers to the need of Big Data to analyze data as it is changing with unprecedented speed.
What is business intelligence?
the software and processes that allow organizations to capitalize on the power of big data and predictive analytics.
what is a data warehouse?
a repository of data and information used by organizations for analysis and decision-making.
what is a data mart?
a subsection of a data warehouse designed and built specifically for individual departments or business functions.
what is in memory computing?
uses middleware software to help store data across a group of different computers.
OLAP(Online Analytical Processing)
included in BI software applications for report creation and analysis, complex calculations, forecasting, budgeting, planning, and predictive analysis.
data cubes?
OLAP stores information in these multi-dimensional structures.
slicing?
an OLAP tool that refers to the analysis of one level of information.
analytic platforms
assist large data-driven companies to analyze and interpret data.
data minning?
accessing external databases and internal data.
web minning?
uses the principles of data mining to uncover and extract information from various places on the web.
Web content mining (WCM)
extraction of information from web pages and documents.
Web structure mining(WSM)
analysis of hyperlinks, nodes, and related web pages.
Web usage mining (WUM
analysis of web access logs, the When, How, and Frequency websites are accessed.
Data administration
is responsible for the policies and procedures that are used to manage an organizationās data.
Data governance(DG)
includes the personnel, processes, and technology needed to oversee an organizationās data and data assets.
Database Administrator (DBA)
monitor and troubleshoot the database to ensure it is functional and available when needed.
Data quality (DQ)
the planning, implementation, and control of activities that apply quality management techniques to data, in order to assure it is fit for consumption and meets the needs of data consumers.
quality assesment
part of a quality audit, analyzes the quality of source data.
Data design
part of a quality audit, involves the creation of quality processes used to manage data.
Quality transformation
part of a quality audit, incorporates correction maps that correct issues in source data.
Quality monitoring:
part of a quality audit, examines data over a given amount of time to ensure data rules are being followed and that data is valid.
Data scrubbing:
also known as data cleansing, detects, removes, and corrects errors in data sets to ensure data validity.
Computer:
a digital device that consists of hardware and software that create data and process information.
Hardware:
Hardware: refers to the physical components of any computer or device.
Software:
refers to the programs, applications, and other instructions used by a computer
Four basic computing functions-
- Computers accept input computer accept data from many sources like keyboard microphones and other sources
- Computer compile and transform data into useful information. This is called the process function
- Computers also provide output which means the ability to display information. This comes in the form of video audio and images.
A computer must be able to store data for future use
Embedded computers-
a digital device that accepts inputs processes data information provides output and can store but it is part of a larger device or system. Examples digital watches programable thermostats
servers
a computer system in a network that is shared by multiple users
Two components of the Processor-
- ALU- arithmetic logic unit performs arithmetic, comparison, and logistical operations.
- Control unit
machine cycle?
the four steps that a computer goes through every time a processor executes an instruction.
4 steps of the machine cycle-
4 steps of the machine cycle-
1. Fetch 2. Decode 3. Execute 4. store
clock speed
the speed at which the processor performs operations, measured in the number of machine cycles processed per second.
core
on a CPU refers to the components on the chip that are needed for processing.
single core processor
has one ALU and one CPU
multi core processor
a core with two or more cores for processing.
hyperthreading
execute two or more instructions at the same time has to be done on multi core processor
cache
high-speed storage in a computer.
memory cache
high-speed memory used by the CPU to store frequently accessed instructions.
disk cache
high-speed memory used by the hard drive to store frequently accessed data.
ROM
(read-only memory)contains the deviceās boot instructions.
protocol
set of rules for communication between devices.
hot spot
a Wi-Fi transmission site.
IRDA
a wireless connection that uses infrared radio waves to transmit data. Used in wireless mouses and TV remotes
graphics
the depiction of image data on a display or output device.
video card
(graphics card or graphics adapter) allows you to see video on a display device.
pixel
the smallest element in an electronic image.
resolution
the clarity of an image with more pixels equaling better clarity.
native resoltion
the maximum resolution of a display device.
byte
a group of 8 bits or a multiple of 8.
hertz
used to measure frequency. One hertz equals one cycle per second
BUS
in a computer it is the channel over which information flows.
Address bus:
transfers information and instructions about where the data should go inside the digital device.
Data bus:
transmits actual data.
Bus width:
the amount of data that can be transmitted at a given time.
ASCII:
(American Standard Code for Information Interchange)this code is capable of representing letters, numbers, and symbols, for a total of 256 characters.
6 major roles of information systems:
- Managing operations- payroll, human resources,
finance- Supporting customer interactions- shopping
cart software, CRM, Information technology
infrastructure library ITIL - Making decisions-
- Collaborating on a team
- Gaining a competitive advantage- how do we
make it strategic, it doesnāt matter, does it matter - Improving individual productivity- productivity
software, office design, internet of things, BYOD
bring your own device
- Supporting customer interactions- shopping
4 components technology-
People
Process
Technology
Data
cyber security
an event or condition that has the potential for accusing set loss and undesirable consequences or impact from such loss
Cybersecurity vulnerabilities
- weaknesses or flaws in the system security procedures design implementation and control that could be compromised accidentally or intentionally
Cyber security exploit.
- identification of a system vulnerability. An exploits is the means for which the vulnerability can be used by a hacker
A cybersecurity breach
occurs when a hacker gains unauthorized access to an organizationās systems, data, and information.
Spyware:
collects information about Internet surfing habits and behaviors.
Adware:
collects a userās web browsing history and displays targeted advertisements, redirects userās searches, and collects marketing-type data.
Bots :
Malicious bots self-propagate malware that infects its host and connects back to a central server.
Ransomware:
malware that makes a computerās data inaccessible until a ransom is paid.
Rootkit:
malware that hides in the operating system and is triggered each time a computer is rebooted.
Keylogger:
(keystroke loggers) spyware/surveillance technology that records all actions typed on a keyboard.
Computer virus:.
a computer program that infects the host
Trojan horse:
a program that appears legitimate but executes an unwanted activity when activated.
MitM(man-in-the-middle) attack
is a general term for when a perpetrator positions himself in a conversation between a user and an application, either to eavesdrop or to impersonate one of the parties.
MitMo:
(man-in-the-phone) attacks uses a mobile device like a MitM attack
CIA triad:
- Confidentiality
- Integrity
- Availability:
Data in transit:
data that is passing through networks or is located in RAM.
Data at rest:
data in computer storage that is rarely or never changed or changed regularly but not constantly.
Data in process:
data that is actively being processed and transmitted and is not stored in permanent memory.
Computer Fraud and Abuse Act (CFAA):
Federal act that prohibits a variety of activities.
Electronic Communications Protection Act (ECPA):
provides protections for communications in storage and transit.
Stored Communications Ac
(Title II of the ECPA) makes the intentional unauthorized access of an organization that provides electronic communication services (ECS) a criminal violation.
National Institute of Standards Technology Cybersecurity Framework (NIST):
assists organizations in the development of cybersecurity policies and procedures.
cybercrime
a crime in which a computer is the object of the crime or is used to commit a criminal or offense.
cyber attack
a deliberate misuse of computers and networks via the Internet.
Cyberwarfare:
refers to cyberattacks that come from a foreign government.
Penetration testing:
involves activities where white hat hackers are paid to hack into private networks and applications.
Crackers:
another word for hackers.
Malware:
(short for malicious software) is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user.
Computer virus:
a computer program that infects the host.
Trojan horse:
a program that appears legitimate but executes an unwanted activity when activated.
Packet sniffers:
(analyzers)capture packets transmitted over a network and can be legitimate for routine examination and problem detection or unauthorized which are used to steal information.
Packet capture:
the process done when packet sniffers record the data packets as they are sent over a network and copy the information to a designated file.
Zombie:
a computer that is controlled by a hacker in a DoS or DDoS attack and is also known as a bot.
Botnet: .
Botnet: a group of computers under the control of a hacker.
Spear phishing:
a type of email scam that is directed toward a specific person or organization.
Risk=
Threat X vulenrabiltiy X asset