final exam Flashcards

1
Q

who owns the internet?

A

Individuals
Universities
Government agencies
Private companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WAN (Wide Area Network) connection point used to obtain access to the WAN
Wired or wireless

A

Point of presence (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collection of large national and international networks

A

Internet backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Initially used for backbone ISP connections

A

T lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Today’s most common backbone ISP connection

A

Optical carrier line (OC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Once known as network access points

A

NAPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exchange data via Internet exchange points

A

IXPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of servers

A

Commerce servers
Web servers
File servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Uses cables, radio waves, or infrared signals
Links computers in a limited geographic area

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Uses long-distance transmission media
Links computer systems a few miles or thousands of miles
Internet is the largest WAN

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Designed for a city
Larger than a LAN, smaller than a WAN

A

MAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Several LANs located in various locations on a college or business campus
Smaller than a WAN
Use devices such as switches, hubs, and routers

A

CAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network of an individual’s own personal devices
Usually within a range of 32 feet
Usually use wireless technology

A

PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Joins multiple computers together in a single network
Does not manage traffic between the connections

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Filter and forward data between nodes
Are similar to routers but work within a single network

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Connect two or more networks
Inspect the source and target of a data package
Determine the best route to transmit data

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rules for electronic information exchange

A

Computer protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Any computer can communicate with other computers using the same protocols

A

Open system protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data is broken into small units (packets)
Packets are sent over various routes to their destination
Packets are reassembled by the receiving computer

A

Packet Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Prepares data for transmission
Provides error checking
Enables resending lost data

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Responsible for sending data from one computer to another

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Unique number that identifies each device connected to the Internet

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Allows a single IP address to represent several unique addresses

A

classless interdomain routing (CIDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Names that take the place of an IP address
Sample domain name: www.mywebsite.com

A

domain names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Internet servers that translate domain names into IP addresses
domain name system servers
26
Protocol for transferring hypertext documents Hypertext documents are linked to other documents through hyperlinks
HyperText Transfer Protocol (HTTP)
27
Tags that describe the formatting and layout of a Web page
HyperText Markup Language (HTML)
28
Browsers request that a program file executes (runs)
Common Gateway Interface (CGI)
29
Statements that define in a single location how to display HTML/XHTML elements
Cascading Style Sheets
30
Allows inexpensive or free long-distance phone calls over the Internet
Voice over Internet Protocol (VoIP)
31
small files written to your hard disk by websites visited; tracks browsing habits and gathers personal information without your consent; CAN be diabled
cookies
32
targeted display ads based on cookies
banner ads
33
identification number produced by software or a piece of hardware; web servers read the GUID
global unique indentifier (GUID)
34
interacting with multiple networked devices; current devices: hold private information that can be exploited if the device is lost or stolen (i.e. smartphones)
ubiquitous computing
35
transmits infared signals to create an electronic trail
active badge
36
uses radio waves to track a chip or tag; used for inventory control in stores; recognizes microchips in pets; may compromise anonymity and privacy if information stored on RFID tags attached to US passports
radio frequency identification (RFID)
37
unsolicited messages sent in bulk over electronic mailing systems; CAN-SPAM act of 20033 provided tools to combat spammers
SPAM
38
-use products such as Anonymous Surfing or IronKey Secure USB flash drive -use free Web-based throwaway e-mail addresses in chat rooms and for mailinglists -tell children not to give out personal information -complete forms only if you see a privacy statement -turn off cookies
How to protect privacy online
39
transparent graphic images placed on a website or in an e-mail used thats used to monitor web or email behavior
web beacons
40
-create logins and passwords for each person using the computer -do not save account numbers or passwords -close a secure account site when not using a computer -use strong passwords
how to protect privacy at home
41
-do use: difficult to guess passwords; at least 14 characters or mroe long; uppercase letters; lowercase letters, numbers, and special characters -DONT use: a recognizable word or phrase; name of anything or anyone close to you, including names of family members or pets; recognizable strings of numbers, such as a social security number or birthdates
strong passwords
42
refrain from making personal calls on a work phone -avoid using company e-mail for personal purposes -assume you are monitored -be aware of shoulder surfing -do not allow others to tailgate
protecting privacy at work
43
computer-based activities that violate the law
computer crimes
44
-crimes perpetuated through the internet -many websites educate users about cybercrime and cybercriminals
cybercrimes
45
area of law dedicated to computer crime
cyberlaw
46
criminal access to personal information in order to impersonate someone
identity theft
47
disgruntled employees or theives go thru a company's trash to find information that they can steal
dumpster diving
48
(similar to phishing) uses targeted fake emails and social engineering to trick recipients into providing personal information to enable identity theft
spear phising
49
programs that intentionally harm a computer system or allow individuals to gain access without permission
malware
50
software that gathers private information and tracks web use
spyware
51
form of spyware that generates annoying popup and banner ads
adware
52
records keystrokes to provide criminals with confidential data
keyloggers
53
code concealed inside a program that can harm or destroy files; many spread through email attachments
computer virus
54
attach themselves to files
file infectors
55
refers to the dangerous actions a virus performs
payload
56
attach to data files and take advantage of application macros
macro viruses
57
execute each time you start the computer
boot sector viruses
58
spam text message sent via a cell phone or instant messaging service
SPIM
59
hidden computer code that sits dormant on a system until triggered
logic bomb
60
virus programs that remains dormant on a computer system until activated
time bomb
61
similar to a virus but does not need action of a user to execute
worm
62
assaults an internet server with so many requests it can't function
Denial of Service (DoS) attack
63
form of denial of service attack in which synchronization packets are repeatedly sent to every port on the server; uses up all available network connections and locks them out till they time out
syn flooding
64
malicious program that is disguised as a useful program; enables attacker to gain administration level access and have repeated and undetected access
rootkit
65
normal-looking program that includes concealed instructions to cause harm
trojan horse
66
computer hobbyists attempting unauthorized access, generally subscribing to an unwritten code of conduct (hacker ethic)
hackers
67
groups of hackers working together to coordinate attacks
cybergangs
68
sends a messaage with an IP address disguised as a message from a trusted source
IP spoofing
69
computers baited with fake data and purposely left vulnerable to study how intruders operate to prepare stronger defenses
honeypots
70
attempt to enter highly secure computer systems to destroy data or steal information
crackers (black hats)
71
use expertise to shore up computer system defenses
ethical hackers (white hats)
72
any intentional or unintentional action resulting in damaging a computer system or its data; increased by wireless LANs because transmissions occur over shared airwaves instead of dedicated lines
computer security
73
wired equivalent privacy
WEP
74
WiFi Protected Access
WPA
75
tricking travelers into using phony wifi hot spots (Evil twins)
vacation hacking
76
unauthorized access of corporate information usually to benefit a competitor
corporate espionage
77
using removable storage media to create unauthorized copies of confidential data
pod slurping
78
security holes created by employees allowing entry to company systems after leaving the firm
trap doors
79
use of information technologies to corrupt or destroy an enemy's information and industrial infrastructure
information warfare
80
provides additional power during outages or electrical current fluctuation
uninterruptible power supply (UPS)
81
study of transforming information into an encoded or scrambled format
cryptography
82
individuals who practice cryptography
cryptographers
83
coding or scrambling process that renders a message unreadable by anyone other than the intended recipient
encryption
84
readble message that has not been encrypted
plaintext
85
formula that makes a plaintext message unreadable
encryption key
86
coded message
ciphertext
87
uses same key for both encryption and decryption
symmetric key encryption
88
occurs when a symmertic key encryption is stolen, allowing others to decrypt messages encrypted with that encryption key
key interception
89
uses two keys: public key to encrypt but private key to decrypt; essential for e-commerce
public key encryption (asymmetric encryption)
90
guarantees messages are secure
digital signatures
91
validate identity
digital certificates
92
uses digital certificates;enables parties engaged in internet-mediated transactions to confirm each others identities
secure electronic transaction (SET)
93
uniform set of encryption standards; no dominant standard; public fear of a monopoly if a PKIis chosen
public key infrastructure (PKI)
94
collection of related data organized so it is easy to: access, manage, update, group, summarize
database
95
smallest unit of data stored by a computer; contains either a 0 or a 1
bit
96
a letter, number, or symbol made of bytes (group of 8 bits)
character
97
single unit of relative information;has afield name and identifies content-data type that includes items as text, number, currency, date/time
field
98
includes a group of related fields; containted intables or data files; has a primary key (unique identifier for each record)
record
99
collection of records
data file (table)
100
one or more data files
database
101
generates a flat file (means there is no relationship with fields in other files); useful for personal or small business needs
file management program
102
manage multiple tables or files; connects several files or tables; able to present information in reports and other formats
database management systems (DBMs)
103
microsoft access, ibm DB2 etc
popular DBMs software
104
flat, relational, object oriented, multidimensional
DBMs classifications
105
most widely used class of DBMS; primary key field used as key to locate records; data dictionary lists all tables in database
relational database management systems (RDBMS)
106
more expensive, more difficult to learn, better at controlling data redundancy, better at preventing potential data errors
compared to file managemtn programs, RDBMS is
107
suits media applications; data represents as objects, incorporate sound,video, text, and graphics; well suited for applications such as: financial portfolios risk analysis, design and manufacturing systems, hospital patient record systems,
Object-oriented database managemnt systems (ODBMS)
108
depicted as data cube, dimensions typically categories(time, products, sales, customers, budgets, and markets), choice for online analytical processing, MDX query language can access multiple dimensions
multidimensional databases
109
central location capable of storing all corporate information; data availablefor analysis; helps executives make decisions; data marts similar but supporta departmentor division
data warehouses
110
explores and analyzes, determines data patterns helpfiul for making decisions; managers better understand customers and market; can help predict future trends; variation is web mining
data mining
111
use database server software-responds to remote users requests for information;use database/client software-provides an interface with the user; use queries to request information from the database server (I.E. ATMandonline baking)
client/server database systems
112
taking database information and making it accessible via the internet (google, yahoo, wikipedia)
web database integration
113
integrate: people, hardware, software, data, procedures; perform many functions:accepts input, processed data into information, stores data, disseminates information throughout .organization
information systems
114
route to appropriate users, summarize, provide information to selected people with specific needs, eliminate unnecessary information
reduce information overload
115
manage core functions of an organization
functional divisions
116
accounting, finance, marketing and sales, human resources, production/operation, information systems
typical functional divisions
117
analyze market, provide analysis and summary of market, review and adjust strategies, influence competition
business units use of information systems to:
118
handle day-to-day accountig needs keeps record of every transaction involving money, save money by automating routine nand record keeping, batch online processing
transaction processing systems
119
provide information needed to make decisions, generate predefined reports
management information systems
120
produce more specific than management information systems reports; enable managersto create smulations OLAP (online analytical processing)
decision support systems
121
help top-level managers make strategic decisions; filter critical information to show trends
executive information systems
122
use information from books and experienced individuals to assist decision making
knowledge management systems
123
rely on detailed and in-depth knowledge of experts in a specific field; use knowledge base to generate answers
expert systems
124
computers and databases not only used for traditionl applications
retail sector
125
credit card authorization, inventory check, check screening system, signature capture system, photo checkout system, marketing devices
point of sale (POS)