Idk.....cheese its Flashcards

1
Q

What is a multi-location system structure that is sometimes called the goldilocks solution because it seeks to balance design trade offs

A

Distributed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of multi location system structure has the fewest problems with input and output bottlenecks?

A

decentralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distributed processing environments are good in what situations?

A

when processing large amounts of data generated at many locations and fast access is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are advantages of decentralized/distributed systems

A

More responsive to the needs of end users
Data transmission costs are reduced
Input/output bottlenecks assoc. with high traffic periods are largely avoided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a disadvantage of decentralized systems

A

Data security is enhanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When are WAN networks best?

A

to connect many sites located across a broad geographical distance. WANs use public or shared lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what kind of lines do LANs use?

A

Dedicated lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should network response time reports be used for?

A

to monitor and manage network traffic and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two types of network operating systems

A

client/server

peer to peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the core data control protocol used to control transmissions on the internet?

A

Transmission control protocol/internet protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do gateways do?

A

connect internet computers of dissimilar networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of tech is designed to exchange financial info over the WWW

A

Extensible business reporting language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Free cash flow equation

A

Net operating income after taxes (NOPAT) + depreciation - change in working capital - capital expenditures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What internal control component includes the principle that the org evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action?

A

monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the “spread”

A

spread = ROI - cost of capital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Checkpoint/restart control

A

reprocess only those transactions that took place after the last valid run. (only used in BATCH runs)

17
Q

What type of system includes redundancy of components?

A

fault tolerant - operate despite component failure

18
Q

Mirroring

A

high cost, high reliability approach to back up that is common in ecommerce. It ensures continuous delivery of services despite a natural disaster

19
Q

Rollback and recovery

A

periodic snapshots are taken of a master file and upon detection of a problem, the system reprocesses all transactions that have occurred since the snapshot. (common in ONLINE REAL TIME SYSTEMS)

20
Q

Storage area networks (SAN)

A

used to provide data backup in case of a disaster. Replicates data from multiple sits. Data immediately available. Efficient storage for servers

21
Q

High availability clusters (HACS)

A

computer clusters designed to improve service availability - in ecommerce

22
Q

What is an electronic device that separates or isolates a network segment from the main network while maintaining the connection between networks

A

Firewall - prevents unauthorized users from accessing a network segment

23
Q

What does data control language in a relational database that includes commands, most likely to control?

A

Which users have various privileges relating to a database

24
Q

what do network firewalls perform?

A

low level filtering capabilities

25
Q

Application firewalls

A

have the ability to do much more sophisticated checks and provide much better control.
Control the execution of programs and examine the handling of data by specific applications

26
Q

What are 3 types of asymmetric encryption protocols?

A

SSL
S-HTTP
SET

27
Q

SSL

A

Secure socket layer

28
Q

S-HTTP

A

Secure hypertext transport protocol

29
Q

SET

A

Secure electronic transactions (protocol)

Common for internet consumer purchases

30
Q

How does a private key work?

A

both the sender and receiver must have the private key before the encryption method will work. (disadvantage bc transmission of the key is inherently insecure)

31
Q

What is the primary purpose of a digital signature?

A

consists of a digest of the original message that is encrypted with the sender’s private key. The private key provides the sender’s authentication and transmission of the encrypted digest (permits the detection of any alterations during transmission.

32
Q

What is the most reliable form of electronic authentication?

A

digital certificate - an independent background check is completed to confirm the identity of the requesting entity (provides a higher level of reliability than a digital signature)

33
Q

What can be used to authenticate messages transmitted in a networked environment

A

digital signature - uses private/public key encryption tech to provide a means of authenticating messages delivered in a networked environment.