final exam Flashcards

1
Q

who owns the internet?

A

Individuals
Universities
Government agencies
Private companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WAN (Wide Area Network) connection point used to obtain access to the WAN
Wired or wireless

A

Point of presence (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collection of large national and international networks

A

Internet backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Initially used for backbone ISP connections

A

T lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Today’s most common backbone ISP connection

A

Optical carrier line (OC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Once known as network access points

A

NAPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exchange data via Internet exchange points

A

IXPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of servers

A

Commerce servers
Web servers
File servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Uses cables, radio waves, or infrared signals
Links computers in a limited geographic area

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Uses long-distance transmission media
Links computer systems a few miles or thousands of miles
Internet is the largest WAN

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Designed for a city
Larger than a LAN, smaller than a WAN

A

MAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Several LANs located in various locations on a college or business campus
Smaller than a WAN
Use devices such as switches, hubs, and routers

A

CAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network of an individual’s own personal devices
Usually within a range of 32 feet
Usually use wireless technology

A

PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Joins multiple computers together in a single network
Does not manage traffic between the connections

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Filter and forward data between nodes
Are similar to routers but work within a single network

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Connect two or more networks
Inspect the source and target of a data package
Determine the best route to transmit data

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rules for electronic information exchange

A

Computer protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Any computer can communicate with other computers using the same protocols

A

Open system protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data is broken into small units (packets)
Packets are sent over various routes to their destination
Packets are reassembled by the receiving computer

A

Packet Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Prepares data for transmission
Provides error checking
Enables resending lost data

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Responsible for sending data from one computer to another

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Unique number that identifies each device connected to the Internet

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Allows a single IP address to represent several unique addresses

A

classless interdomain routing (CIDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Names that take the place of an IP address
Sample domain name: www.mywebsite.com

A

domain names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Internet servers that translate domain names into IP addresses

A

domain name system servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Protocol for transferring hypertext documents
Hypertext documents are linked to other documents through hyperlinks

A

HyperText Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Tags that describe the formatting and layout of a Web page

A

HyperText Markup Language (HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Browsers request that a program file executes (runs)

A

Common Gateway Interface (CGI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Statements that define in a single location how to display HTML/XHTML elements

A

Cascading Style Sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Allows inexpensive or free long-distance phone calls over the Internet

A

Voice over Internet Protocol (VoIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

small files written to your hard disk by websites visited; tracks browsing habits and gathers personal information without your consent; CAN be diabled

A

cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

targeted display ads based on cookies

A

banner ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

identification number produced by software or a piece of hardware; web servers read the GUID

A

global unique indentifier (GUID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

interacting with multiple networked devices; current devices: hold private information that can be exploited if the device is lost or stolen (i.e. smartphones)

A

ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

transmits infared signals to create an electronic trail

A

active badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

uses radio waves to track a chip or tag; used for inventory control in stores; recognizes microchips in pets; may compromise anonymity and privacy if information stored on RFID tags attached to US passports

A

radio frequency identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

unsolicited messages sent in bulk over electronic mailing systems; CAN-SPAM act of 20033 provided tools to combat spammers

A

SPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

-use products such as Anonymous Surfing or IronKey Secure USB flash drive
-use free Web-based throwaway e-mail addresses in chat rooms and for mailinglists
-tell children not to give out personal information
-complete forms only if you see a privacy statement
-turn off cookies

A

How to protect privacy online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

transparent graphic images placed on a website or in an e-mail used thats used to monitor web or email behavior

A

web beacons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

-create logins and passwords for each person using the computer
-do not save account numbers or passwords
-close a secure account site when not using a computer
-use strong passwords

A

how to protect privacy at home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

-do use: difficult to guess passwords; at least 14 characters or mroe long; uppercase letters; lowercase letters, numbers, and special characters
-DONT use: a recognizable word or phrase; name of anything or anyone close to you, including names of family members or pets; recognizable strings of numbers, such as a social security number or birthdates

A

strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

refrain from making personal calls on a work phone
-avoid using company e-mail for personal purposes
-assume you are monitored
-be aware of shoulder surfing
-do not allow others to tailgate

A

protecting privacy at work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

computer-based activities that violate the law

A

computer crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

-crimes perpetuated through the internet
-many websites educate users about cybercrime and cybercriminals

A

cybercrimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

area of law dedicated to computer crime

A

cyberlaw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

criminal access to personal information in order to impersonate someone

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

disgruntled employees or theives go thru a company’s trash to find information that they can steal

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

(similar to phishing) uses targeted fake emails and social engineering to trick recipients into providing personal information to enable identity theft

A

spear phising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

programs that intentionally harm a computer system or allow individuals to gain access without permission

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

software that gathers private information and tracks web use

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

form of spyware that generates annoying popup and banner ads

A

adware

52
Q

records keystrokes to provide criminals with confidential data

A

keyloggers

53
Q

code concealed inside a program that can harm or destroy files; many spread through email attachments

A

computer virus

54
Q

attach themselves to files

A

file infectors

55
Q

refers to the dangerous actions a virus performs

A

payload

56
Q

attach to data files and take advantage of application macros

A

macro viruses

57
Q

execute each time you start the computer

A

boot sector viruses

58
Q

spam text message sent via a cell phone or instant messaging service

A

SPIM

59
Q

hidden computer code that sits dormant on a system until triggered

A

logic bomb

60
Q

virus programs that remains dormant on a computer system until activated

A

time bomb

61
Q

similar to a virus but does not need action of a user to execute

A

worm

62
Q

assaults an internet server with so many requests it can’t function

A

Denial of Service (DoS) attack

63
Q

form of denial of service attack in which synchronization packets are repeatedly sent to every port on the server; uses up all available network connections and locks them out till they time out

A

syn flooding

64
Q

malicious program that is disguised as a useful program; enables attacker to gain administration level access and have repeated and undetected access

A

rootkit

65
Q

normal-looking program that includes concealed instructions to cause harm

A

trojan horse

66
Q

computer hobbyists attempting unauthorized access, generally subscribing to an unwritten code of conduct (hacker ethic)

A

hackers

67
Q

groups of hackers working together to coordinate attacks

A

cybergangs

68
Q

sends a messaage with an IP address disguised as a message from a trusted source

A

IP spoofing

69
Q

computers baited with fake data and purposely left vulnerable to study how intruders operate to prepare stronger defenses

A

honeypots

70
Q

attempt to enter highly secure computer systems to destroy data or steal information

A

crackers (black hats)

71
Q

use expertise to shore up computer system defenses

A

ethical hackers (white hats)

72
Q

any intentional or unintentional action resulting in damaging a computer system or its data; increased by wireless LANs because transmissions occur over shared airwaves instead of dedicated lines

A

computer security

73
Q

wired equivalent privacy

A

WEP

74
Q

WiFi Protected Access

A

WPA

75
Q

tricking travelers into using phony wifi hot spots (Evil twins)

A

vacation hacking

76
Q

unauthorized access of corporate information usually to benefit a competitor

A

corporate espionage

77
Q

using removable storage media to create unauthorized copies of confidential data

A

pod slurping

78
Q

security holes created by employees allowing entry to company systems after leaving the firm

A

trap doors

79
Q

use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure

A

information warfare

80
Q

provides additional power during outages or electrical current fluctuation

A

uninterruptible power supply (UPS)

81
Q

study of transforming information into an encoded or scrambled format

A

cryptography

82
Q

individuals who practice cryptography

A

cryptographers

83
Q

coding or scrambling process that renders a message unreadable by anyone other than the intended recipient

A

encryption

84
Q

readble message that has not been encrypted

A

plaintext

85
Q

formula that makes a plaintext message unreadable

A

encryption key

86
Q

coded message

A

ciphertext

87
Q

uses same key for both encryption and decryption

A

symmetric key encryption

88
Q

occurs when a symmertic key encryption is stolen, allowing others to decrypt messages encrypted with that encryption key

A

key interception

89
Q

uses two keys: public key to encrypt but private key to decrypt; essential for e-commerce

A

public key encryption (asymmetric encryption)

90
Q

guarantees messages are secure

A

digital signatures

91
Q

validate identity

A

digital certificates

92
Q

uses digital certificates;enables parties engaged in internet-mediated transactions to confirm each others identities

A

secure electronic transaction (SET)

93
Q

uniform set of encryption standards; no dominant standard; public fear of a monopoly if a PKIis chosen

A

public key infrastructure (PKI)

94
Q

collection of related data organized so it is easy to: access, manage, update, group, summarize

A

database

95
Q

smallest unit of data stored by a computer; contains either a 0 or a 1

A

bit

96
Q

a letter, number, or symbol made of bytes (group of 8 bits)

A

character

97
Q

single unit of relative information;has afield name and identifies content-data type that includes items as text, number, currency, date/time

A

field

98
Q

includes a group of related fields; containted intables or data files; has a primary key (unique identifier for each record)

A

record

99
Q

collection of records

A

data file (table)

100
Q

one or more data files

A

database

101
Q

generates a flat file (means there is no relationship with fields in other files); useful for personal or small business needs

A

file management program

102
Q

manage multiple tables or files; connects several files or tables; able to present information in reports and other formats

A

database management systems (DBMs)

103
Q

microsoft access, ibm DB2 etc

A

popular DBMs software

104
Q

flat, relational, object oriented, multidimensional

A

DBMs classifications

105
Q

most widely used class of DBMS; primary key field used as key to locate records; data dictionary lists all tables in database

A

relational database management systems (RDBMS)

106
Q

more expensive, more difficult to learn, better at controlling data redundancy, better at preventing potential data errors

A

compared to file managemtn programs, RDBMS is

107
Q

suits media applications; data represents as objects, incorporate sound,video, text, and graphics; well suited for applications such as: financial portfolios risk analysis, design and manufacturing systems, hospital patient record systems,

A

Object-oriented database managemnt systems (ODBMS)

108
Q

depicted as data cube, dimensions typically categories(time, products, sales, customers, budgets, and markets), choice for online analytical processing, MDX query language can access multiple dimensions

A

multidimensional databases

109
Q

central location capable of storing all corporate information; data availablefor analysis; helps executives make decisions; data marts similar but supporta departmentor division

A

data warehouses

110
Q

explores and analyzes, determines data patterns helpfiul for making decisions; managers better understand customers and market; can help predict future trends; variation is web mining

A

data mining

111
Q

use database server software-responds to remote users requests for information;use database/client software-provides an interface with the user; use queries to request information from the database server (I.E. ATMandonline baking)

A

client/server database systems

112
Q

taking database information and making it accessible via the internet (google, yahoo, wikipedia)

A

web database integration

113
Q

integrate: people, hardware, software, data, procedures; perform many functions:accepts input, processed data into information, stores data, disseminates information throughout .organization

A

information systems

114
Q

route to appropriate users, summarize, provide information to selected people with specific needs, eliminate unnecessary information

A

reduce information overload

115
Q

manage core functions of an organization

A

functional divisions

116
Q

accounting, finance, marketing and sales, human resources, production/operation, information systems

A

typical functional divisions

117
Q

analyze market, provide analysis and summary of market, review and adjust strategies, influence competition

A

business units use of information systems to:

118
Q

handle day-to-day accountig needs keeps record of every transaction involving money, save money by automating routine nand record keeping, batch online processing

A

transaction processing systems

119
Q

provide information needed to make decisions, generate predefined reports

A

management information systems

120
Q

produce more specific than management information systems reports; enable managersto create smulations OLAP (online analytical processing)

A

decision support systems

121
Q

help top-level managers make strategic decisions; filter critical information to show trends

A

executive information systems

122
Q

use information from books and experienced individuals to assist decision making

A

knowledge management systems

123
Q

rely on detailed and in-depth knowledge of experts in a specific field; use knowledge base to generate answers

A

expert systems

124
Q

computers and databases not only used for traditionl applications

A

retail sector

125
Q

credit card authorization, inventory check, check screening system, signature capture system, photo checkout system, marketing devices

A

point of sale (POS)