Idk.....cheese its Flashcards
What is a multi-location system structure that is sometimes called the goldilocks solution because it seeks to balance design trade offs
Distributed.
What kind of multi location system structure has the fewest problems with input and output bottlenecks?
decentralized
Distributed processing environments are good in what situations?
when processing large amounts of data generated at many locations and fast access is required.
What are advantages of decentralized/distributed systems
More responsive to the needs of end users
Data transmission costs are reduced
Input/output bottlenecks assoc. with high traffic periods are largely avoided.
What is a disadvantage of decentralized systems
Data security is enhanced
When are WAN networks best?
to connect many sites located across a broad geographical distance. WANs use public or shared lines
what kind of lines do LANs use?
Dedicated lines
What should network response time reports be used for?
to monitor and manage network traffic and resources
What are two types of network operating systems
client/server
peer to peer
What is the core data control protocol used to control transmissions on the internet?
Transmission control protocol/internet protocol (TCP/IP)
What do gateways do?
connect internet computers of dissimilar networks
What kind of tech is designed to exchange financial info over the WWW
Extensible business reporting language
Free cash flow equation
Net operating income after taxes (NOPAT) + depreciation - change in working capital - capital expenditures
What internal control component includes the principle that the org evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action?
monitoring
What is the “spread”
spread = ROI - cost of capital
Checkpoint/restart control
reprocess only those transactions that took place after the last valid run. (only used in BATCH runs)
What type of system includes redundancy of components?
fault tolerant - operate despite component failure
Mirroring
high cost, high reliability approach to back up that is common in ecommerce. It ensures continuous delivery of services despite a natural disaster
Rollback and recovery
periodic snapshots are taken of a master file and upon detection of a problem, the system reprocesses all transactions that have occurred since the snapshot. (common in ONLINE REAL TIME SYSTEMS)
Storage area networks (SAN)
used to provide data backup in case of a disaster. Replicates data from multiple sits. Data immediately available. Efficient storage for servers
High availability clusters (HACS)
computer clusters designed to improve service availability - in ecommerce
What is an electronic device that separates or isolates a network segment from the main network while maintaining the connection between networks
Firewall - prevents unauthorized users from accessing a network segment
What does data control language in a relational database that includes commands, most likely to control?
Which users have various privileges relating to a database
what do network firewalls perform?
low level filtering capabilities
Application firewalls
have the ability to do much more sophisticated checks and provide much better control.
Control the execution of programs and examine the handling of data by specific applications
What are 3 types of asymmetric encryption protocols?
SSL
S-HTTP
SET
SSL
Secure socket layer
S-HTTP
Secure hypertext transport protocol
SET
Secure electronic transactions (protocol)
Common for internet consumer purchases
How does a private key work?
both the sender and receiver must have the private key before the encryption method will work. (disadvantage bc transmission of the key is inherently insecure)
What is the primary purpose of a digital signature?
consists of a digest of the original message that is encrypted with the sender’s private key. The private key provides the sender’s authentication and transmission of the encrypted digest (permits the detection of any alterations during transmission.
What is the most reliable form of electronic authentication?
digital certificate - an independent background check is completed to confirm the identity of the requesting entity (provides a higher level of reliability than a digital signature)
What can be used to authenticate messages transmitted in a networked environment
digital signature - uses private/public key encryption tech to provide a means of authenticating messages delivered in a networked environment.