chapter review questions Flashcards

1
Q

What is a network?

A

a group of two or more devices or computers connected together for the exchange of information and for the sharing of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is internet?

A

an internet (lowercase ā€˜iā€™) is any group of linked computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four types of networks?

A
  1. personal area network (PAN)
  2. local area network Lan
  3. wide area networks
  4. internets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is internet protocol?

A

(IP) specific software used by the Internet to communicate. An IP address is a number assigned to all connection devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a server?

A

where data on the Internet is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is packets?

A

transferred data from one network to another through this hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a router?

A

transferred data from one network to another through this hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a static IP address?

A

an IP address that is assigned permanently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is dynamic Ip address?

A

a new address is assigned each time a connection is made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is domain name system?

A

translates characters used in IP addresses (either IPv4 or IPv6 format) into words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is TCP/IP

A

stands for Transmission Control Protocol/Internet Protocol. TCP refers to how software applications communicate across networks. IP refers to how to address and route data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is world wide web

A

(WWW or the web)is an interconnected system of webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hypertext transfer protocol

A

(HTTP) governs the transfer of data between a client and server computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is uniform resource locater?

A

(URL) is the address of a resource on the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is hyper text markup language?

A

(HTML) is a commonly used format for publishing web documents and content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is web 2.0

A

the second-generation Internet, based on interactivity and dynamic content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the key features of web 2.0

A

Interactivity
Folksonomy
User participation
Software as a service SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is web 3.0

A

the next evolution in the web and will include many features and tools to allow better use of webpages, smartphone apps, and IoT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is internet of things?

A

(IoT) combines connected devices with automated systems that gather data, analyze the data, and convert the data into usable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is geopgraphic information systems?

A

(GIS)capture, analysis, use, and management of spatial location information to create maps and 3D scenes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the benefits of Cloud computing?

A
  • flexibility
    • Cost savings
    • Collaborations
      • Disaster recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the disadvantages of cloud computing?

A

Downtime
Security
Limited control
Vendor agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is cloud development model

A

a framework that includes storage capacity, accessibility, computing requirements, and network requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is community cloud?

A

infrastructure designed for exclusive use by a specific community of consumers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is public cloud?

A

infrastructure is provisioned for open use by the general public and these are often used for file sharing and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a content delivery model?

A

(CDN) geographically distributed network server groups that work together to deliver web content to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is cache?

A

a storage location where active data is placed to make it easier to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is web services?

A

a set of software technologies that exchange information with each other using standardized web communication protocols and languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is platform as a serivce?

A

(PaaS) providers offer hardware and software tools needed for application and software development via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is infrastructure as a service?

A

(IaaS) an instant computing infrastructure composed of processing, data storage, and other resources provided by a vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a serverless computer?

A

occurs when a Cloud service provider offers backend services on an as-used basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what is cloud services security?

A

(Cloud security) includes policies, procedures, controls, and hardware that work together to ensure that Cloud-based systems are secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a virtual private network?

A

(VPN) hides your IP address by running your communications through a secure network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is a block chain?

A

stores transaction data in blocks that are linked together to form a chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what is cyrpto currency?

A

digital currencies that only exist on computers without any intermediary such as a bank or other financial institution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

who was john locke?

A

John Locke 1632- 1704- John locke is considered the father of liberalism. He developed the labor theory of property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

who was adam smith?

A

Adam Smith 1723-1790- Considered the father of economics. He developed prinicpeles of labor division and free enterprise as the keys to an individuals wealth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Who was frederick taylor?

A

Father of scientific management. Wrote a book called the principles of scientific management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

who was henri fayol?

A

Henri Fayol 1841-1925-

Was a frenchy engineer who delveloped principles of administration. Determined five major roles for managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

who was max weber?

A

Published the book puritan ethic and the spirit of capitalism in 1905 which aruges the basic tenents of protestantism. Wrote the nine principles of how organizations should be organized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what are main fram computer?

A

initially used by businesses for reliable transaction processing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

what is a client server network?

A

commonly used in businesses today with a server designed for a specific purpos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a POS or point of sale system?

A

cash registers, square payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what is Decision Support system DSS

A

assist middle managers with organizational processes when a large number of inputs are changing rapidly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the bullwhip affect?

A

(also known as the Forrester effect) a small error in demand forecasting can result in large errors in inventory and production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a marketing information system?

A

(MKIS) integrate numerous processes related to marketing management into a single computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a learning management software?

A

LMS) used to manage academic processes at nearly all large educational organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

what is enterprise resource planning?

A

incorporates a suite of business applications into a unified system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is an executive support system?

A

(ESS) software (or Executive Information System software, EIS) is used to extract enterprise data and transform it into executive-level reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is flex time?

A

allowing employees to control their work schedules through flexible start and stop times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a database?

A

a collection of data organized in a manner that allows a computer to quickly search for and retrieve information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Database management systems (DBMS)

A

:used to store and classify information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is data reduncy?

A

duplication of data in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is data inconsistency?

A

when data is changed in one place in a database but not changed everywhere that data exists or changed incorrectly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is data security?

A

keeps data and users from identity theft, data leaks, and the misuse of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is record

A

a row in a database table that includes a collection of fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a field?

A

a column in a database table that represents a characteristic of something or someone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is a foreign key?

A

is a field linked to another tableā€™s primary key field in a relationship between two tables in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

what is a primary key?

A

unique to each item in each row in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is referential integrity?

A

the accuracy and consistency of data within a table relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is a column?

A

a column in a database table that represents a characteristic of something or someone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is data dictonary?

A

a file or set of files containing a databaseā€™s metadata.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

what is a form?

A

used to control how data is entered into a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is a report?

A

a way to view, format, and summarize the information in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is SQL

A

(structured query langauge) the standard programming database language used for human interface and communication with relational databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is a query

A

SQL statements that are generated to get information from a database are called a query.

67
Q

What is normalizaiton?

A

an organized approach to breaking down and/or simplifying tables to eliminate data redundancy and undesirable data characteristics.

68
Q

ERD (Entity Relationship Diagram)

A

a method used to structurally represent a database design via the use of diagrams.

69
Q

what is NoSQL databases?

A

designed to handle huge data sets across many platforms.

70
Q

What is cloud database?

A

built and accessed via a Cloud platform.

71
Q

What are the four Vā€™s of big data?

A

Volume:a characteristic of Big Data, refers to the scale of data.

Variety: a characteristic of Big Data, refers to the different forms of data.

Veracity a characteristic of Big Data, attempts to ensure that the data is meaningful, true, and useful.

Velocity: a characteristic of Big Data, refers to the need of Big Data to analyze data as it is changing with unprecedented speed.

72
Q

What is business intelligence?

A

the software and processes that allow organizations to capitalize on the power of big data and predictive analytics.

73
Q

what is a data warehouse?

A

a repository of data and information used by organizations for analysis and decision-making.

74
Q

what is a data mart?

A

a subsection of a data warehouse designed and built specifically for individual departments or business functions.

75
Q

what is in memory computing?

A

uses middleware software to help store data across a group of different computers.

76
Q

OLAP(Online Analytical Processing)

A

included in BI software applications for report creation and analysis, complex calculations, forecasting, budgeting, planning, and predictive analysis.

77
Q

data cubes?

A

OLAP stores information in these multi-dimensional structures.

78
Q

slicing?

A

an OLAP tool that refers to the analysis of one level of information.

79
Q

analytic platforms

A

assist large data-driven companies to analyze and interpret data.

80
Q

data minning?

A

accessing external databases and internal data.

81
Q

web minning?

A

uses the principles of data mining to uncover and extract information from various places on the web.

82
Q

Web content mining (WCM)

A

extraction of information from web pages and documents.

83
Q

Web structure mining(WSM)

A

analysis of hyperlinks, nodes, and related web pages.

84
Q

Web usage mining (WUM

A

analysis of web access logs, the When, How, and Frequency websites are accessed.

85
Q

Data administration

A

is responsible for the policies and procedures that are used to manage an organizationā€™s data.

86
Q

Data governance(DG)

A

includes the personnel, processes, and technology needed to oversee an organizationā€™s data and data assets.

87
Q

Database Administrator (DBA)

A

monitor and troubleshoot the database to ensure it is functional and available when needed.

88
Q

Data quality (DQ)

A

the planning, implementation, and control of activities that apply quality management techniques to data, in order to assure it is fit for consumption and meets the needs of data consumers.

89
Q

quality assesment

A

part of a quality audit, analyzes the quality of source data.

90
Q

Data design

A

part of a quality audit, involves the creation of quality processes used to manage data.

91
Q

Quality transformation

A

part of a quality audit, incorporates correction maps that correct issues in source data.

92
Q

Quality monitoring:

A

part of a quality audit, examines data over a given amount of time to ensure data rules are being followed and that data is valid.

93
Q

Data scrubbing:

A

also known as data cleansing, detects, removes, and corrects errors in data sets to ensure data validity.

94
Q

Computer:

A

a digital device that consists of hardware and software that create data and process information.

95
Q

Hardware:

A

Hardware: refers to the physical components of any computer or device.

96
Q

Software:

A

refers to the programs, applications, and other instructions used by a computer

97
Q

Four basic computing functions-

A
  1. Computers accept input computer accept data from many sources like keyboard microphones and other sources
    1. Computer compile and transform data into useful information. This is called the process function
    2. Computers also provide output which means the ability to display information. This comes in the form of video audio and images.
      A computer must be able to store data for future use
98
Q

Embedded computers-

A

a digital device that accepts inputs processes data information provides output and can store but it is part of a larger device or system. Examples digital watches programable thermostats

99
Q

servers

A

a computer system in a network that is shared by multiple users

100
Q

Two components of the Processor-

A
  1. ALU- arithmetic logic unit performs arithmetic, comparison, and logistical operations.
  2. Control unit
101
Q

machine cycle?

A

the four steps that a computer goes through every time a processor executes an instruction.

102
Q

4 steps of the machine cycle-

A

4 steps of the machine cycle-

1. Fetch
2. Decode
3. Execute
     4. store
103
Q

clock speed

A

the speed at which the processor performs operations, measured in the number of machine cycles processed per second.

104
Q

core

A

on a CPU refers to the components on the chip that are needed for processing.

105
Q

single core processor

A

has one ALU and one CPU

106
Q

multi core processor

A

a core with two or more cores for processing.

107
Q

hyperthreading

A

execute two or more instructions at the same time has to be done on multi core processor

108
Q

cache

A

high-speed storage in a computer.

109
Q

memory cache

A

high-speed memory used by the CPU to store frequently accessed instructions.

110
Q

disk cache

A

high-speed memory used by the hard drive to store frequently accessed data.

111
Q

ROM

A

(read-only memory)contains the deviceā€™s boot instructions.

112
Q

protocol

A

set of rules for communication between devices.

113
Q

hot spot

A

a Wi-Fi transmission site.

114
Q

IRDA

A

a wireless connection that uses infrared radio waves to transmit data. Used in wireless mouses and TV remotes

115
Q

graphics

A

the depiction of image data on a display or output device.

116
Q

video card

A

(graphics card or graphics adapter) allows you to see video on a display device.

117
Q

pixel

A

the smallest element in an electronic image.

118
Q

resolution

A

the clarity of an image with more pixels equaling better clarity.

119
Q

native resoltion

A

the maximum resolution of a display device.

120
Q

byte

A

a group of 8 bits or a multiple of 8.

121
Q

hertz

A

used to measure frequency. One hertz equals one cycle per second

122
Q

BUS

A

in a computer it is the channel over which information flows.

123
Q

Address bus:

A

transfers information and instructions about where the data should go inside the digital device.

124
Q

Data bus:

A

transmits actual data.

125
Q

Bus width:

A

the amount of data that can be transmitted at a given time.

126
Q

ASCII:

A

(American Standard Code for Information Interchange)this code is capable of representing letters, numbers, and symbols, for a total of 256 characters.

127
Q

6 major roles of information systems:

A
  1. Managing operations- payroll, human resources,
    finance
    1. Supporting customer interactions- shopping
      cart software, CRM, Information technology
      infrastructure library ITIL
    2. Making decisions-
    3. Collaborating on a team
    4. Gaining a competitive advantage- how do we
      make it strategic, it doesnā€™t matter, does it matter
    5. Improving individual productivity- productivity
      software, office design, internet of things, BYOD
      bring your own device
128
Q

4 components technology-

A

People
Process
Technology
Data

129
Q

cyber security

A

an event or condition that has the potential for accusing set loss and undesirable consequences or impact from such loss

130
Q

Cybersecurity vulnerabilities

A
  • weaknesses or flaws in the system security procedures design implementation and control that could be compromised accidentally or intentionally
131
Q

Cyber security exploit.

A
  • identification of a system vulnerability. An exploits is the means for which the vulnerability can be used by a hacker
132
Q

A cybersecurity breach

A

occurs when a hacker gains unauthorized access to an organizationā€™s systems, data, and information.

133
Q

Spyware:

A

collects information about Internet surfing habits and behaviors.

134
Q

Adware:

A

collects a userā€™s web browsing history and displays targeted advertisements, redirects userā€™s searches, and collects marketing-type data.

135
Q

Bots :

A

Malicious bots self-propagate malware that infects its host and connects back to a central server.

136
Q

Ransomware:

A

malware that makes a computerā€™s data inaccessible until a ransom is paid.

137
Q

Rootkit:

A

malware that hides in the operating system and is triggered each time a computer is rebooted.

138
Q

Keylogger:

A

(keystroke loggers) spyware/surveillance technology that records all actions typed on a keyboard.

139
Q

Computer virus:.

A

a computer program that infects the host

140
Q

Trojan horse:

A

a program that appears legitimate but executes an unwanted activity when activated.

141
Q

MitM(man-in-the-middle) attack

A

is a general term for when a perpetrator positions himself in a conversation between a user and an application, either to eavesdrop or to impersonate one of the parties.

142
Q

MitMo:

A

(man-in-the-phone) attacks uses a mobile device like a MitM attack

143
Q

CIA triad:

A
  1. Confidentiality
  2. Integrity
  3. Availability:
144
Q

Data in transit:

A

data that is passing through networks or is located in RAM.

145
Q

Data at rest:

A

data in computer storage that is rarely or never changed or changed regularly but not constantly.

146
Q

Data in process:

A

data that is actively being processed and transmitted and is not stored in permanent memory.

147
Q

Computer Fraud and Abuse Act (CFAA):

A

Federal act that prohibits a variety of activities.

148
Q

Electronic Communications Protection Act (ECPA):

A

provides protections for communications in storage and transit.

149
Q

Stored Communications Ac

A

(Title II of the ECPA) makes the intentional unauthorized access of an organization that provides electronic communication services (ECS) a criminal violation.

150
Q

National Institute of Standards Technology Cybersecurity Framework (NIST):

A

assists organizations in the development of cybersecurity policies and procedures.

151
Q

cybercrime

A

a crime in which a computer is the object of the crime or is used to commit a criminal or offense.

152
Q

cyber attack

A

a deliberate misuse of computers and networks via the Internet.

153
Q

Cyberwarfare:

A

refers to cyberattacks that come from a foreign government.

154
Q

Penetration testing:

A

involves activities where white hat hackers are paid to hack into private networks and applications.

155
Q

Crackers:

A

another word for hackers.

156
Q

Malware:

A

(short for malicious software) is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user.

157
Q

Computer virus:

A

a computer program that infects the host.

158
Q

Trojan horse:

A

a program that appears legitimate but executes an unwanted activity when activated.

159
Q

Packet sniffers:

A

(analyzers)capture packets transmitted over a network and can be legitimate for routine examination and problem detection or unauthorized which are used to steal information.

160
Q

Packet capture:

A

the process done when packet sniffers record the data packets as they are sent over a network and copy the information to a designated file.

161
Q

Zombie:

A

a computer that is controlled by a hacker in a DoS or DDoS attack and is also known as a bot.

162
Q

Botnet: .

A

Botnet: a group of computers under the control of a hacker.

163
Q

Spear phishing:

A

a type of email scam that is directed toward a specific person or organization.

164
Q

Risk=

A

Threat X vulenrabiltiy X asset