Computer Structure Final 2 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

An OS is a program which acts as an…… between what and what ?

A

interface between computer system users and the computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The OS provides a …….in which a user may ……

A

It provides a user friendly environment in which a user may easily develop and execute programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If not for the OS Hardwar knowledge would be….

A

Mandatory for computer programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The OS hides…

A

the complexity of hardware from uninterested users!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Operating System?

A
Software which manages the overall operation of the computer system including:
Hardware( CPU, RAM, I/O)
Security 
System interface
application interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is First Generation ?

A

Vacuum tube, single user, early operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Second Generation?

A

Job scheduling, JCL, faster I/O, spooling, batch, files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Third Generation?

A

Shared processing, multiprogramming, virtual memory, DBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Fourth Generation?

A

Distributed computing, personal computers, high-speed communication, multi-media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the functions of an operation system? name 4

A

Manages and interacts with computer hardware
Provides and manages system security
Provides the system interface
Provides the interface for application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who created Linux

A

Linus Torvalds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tell me three important features of Linux

A
  1. Scientific cooperation model
  2. Open source implications
  3. Matured over 14 years
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the internet?

A

The largest network of networks in the world
Uses TCP/IP protocols and packet switching
Runs on any communications substrate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name two examples of Social engineering

A
  1. An attacker calls a user on a network and claims they are from the computer support division of the network.
  2. The attacker tells the user that they are having trouble with their account and then ask for the user’s name and password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a dictionary attack

A

uses know passwords and many variations (upper and lower case and combinations ) to try to log in to your account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define brute force attack

A

means the attackers uses every possible combination of characters for the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name some ways to prevent password cracking name 6

A

1.Don’t use passwords that are dictionary words
2.Don’t use your user name
3.Don’t use your user name backwards
4Limit the number of log in attempts
5.Make your password sufficiently long with an alpha numeric combination
6. Change passwords often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

name a way to enhance security with strong passwords

A

A sentence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Biometrics technology can be used for what two different purposes

A

Verification and identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name five different biometric verifications

A
  1. Fingerprinting matching
  2. hand geometry
  3. Iris or retinal scans
  4. Speech recognition
  5. Face recognition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Hacker?

A

Anyone who unlawfully accesses a computer system

22
Q

Name the types of Hackers?

A

White hat “ just helping”
Black hat “ give me that”
Script Kiddies “ show me”

23
Q

What do hacker do?

A

Steal information from computers
Internet packer sniffing
Commit identity theft

24
Q

What are some Hacker tool?

A

Worms
Trojan Horses
Bombs

25
Q

Name some Denial of Service Attacks

A

Back door program: Trojan horse-Zombies

Denial of service attacks

26
Q

What is a Virus?

A

A Virus is a piece of malicious piece of code that when run on you machine will open a backdoor to the machine, might start a program that attacks other applications.

27
Q

What are worms?

A

Are a type of computer virus that typical proliferate by themselves

28
Q

Today how are most viruses exchanged?

A

Via attachments via email

29
Q

What is Antivirus Software?

A

Programs designed to detect viruses

detect know viruses

30
Q

What is a Firewall?

A

Acts as a security gateway between two networks: usually between trusted and untrusted networks

31
Q

Why are Firewalls needed?

A

Prevent attacks from untrusted networks
Protect data integrity of critical information
Preserve customer and partner confidence

32
Q

What are the basic components of a network?

A

Connections (Physical Medium)
Protocols (Common Language)
Services ( Clients, Servers, and Files)

33
Q

The Client is……..

A

the computer that requests to use a resource

34
Q

The Server is ……….

A

the computer that provides the resource

35
Q

Name some features Peer-to-Peer network

A

No centralized data access

Security handled by assigning each resource a password

36
Q

Name some features Client/Server network

A

Centralized data access
Centralized security
Centralized administration, record keeping, and control

37
Q

The Physical Media can be:

A

Wire, Fiber Optic Cable, Wireless Link (RF and Infrared)

38
Q

In Networking, Protocols are: (Names three)

A

Agreements that describe how things work
Industry-wide frameworks that describe every aspect of communications between computers
Grouped together into Protocols Suites

39
Q

What are the Main Protocol Suites:

A

NetBEUI- Small Microsoft networks
SPX/IPX- Primarily Novell networks
TCP/IP- Must be used if the network is to connect to the internet

40
Q

What is one of the basic ways to classify networks?

A

by their topology

41
Q

Topology refers to…………

A

the way the computers in the network are connected to each other

42
Q

What are the most common topologies:

A

Bus, Star, Ring, Mesh

43
Q

What is another way to classify networks

A

by their size or geographical span

44
Q

Name the most common size classifications:

A

Local Area Network- LAN
Metropolitan Area Network- MAN
Wide Area Network- WAN

45
Q

Name Some components?

A

Network Operating System
Interface Cards
Cables

46
Q

What are the Major Network Operating Systems?

A

Unix (Linux)
Novell NetWare
Windows Server

47
Q

What does NIC stand for

A

Network Interface Card

48
Q

The NIC is the main interface between the ________ and the _______

A

The NIC is the main interface between the computer and the network cable

49
Q

What is the NIC also called: (Name three)

A

The Network Card
Network Adapter
Network Adapter Card

50
Q

Name three types of cables

A

Twisted-Pair
Coax
Fiber Optic

51
Q

Name two types of Twisted-Pair cables

A

UTP- Unshielded Twisted-Pair

STP- Shielded Twisted-Pair